2020
DOI: 10.3390/en13061382
|View full text |Cite
|
Sign up to set email alerts
|

A Self-Learning Detection Method of Sybil Attack Based on LSTM for Electric Vehicles

Abstract: Electric vehicles (EVs) are the development direction of new energy vehicles in the future. As an important part of the Internet of things (IOT) communication network, the charging pile is also facing severe challenges in information security. At present, most detection methods need a lot of prophetic data and too much human intervention, so they cannot do anything about unknown attacks. In this paper, a self-learning-based attack detection method is proposed, which makes training and prediction a closed-loop … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The methods we used in our comparison were as follows: SVM [36], which uses support vector machines, a traditional machine learning method, to classify packets as trusted or malicious; CNN [37], which uses only convolutional neural network performs spatial feature extraction and uses the loss function and redundant error items designed by the spatial characteristics of the link load to achieve intrusion detection; LSTM [38], which only uses long short-term Memory network training to obtain the characteristics of traffic data changes in the time dimension In order to achieve intrusion detection; and CNN-BiSRU [39], which uses two deep learning models for serial feature extraction, with the first being convolutional neural network to extract the spatial features of the original data and the other being bidirectional simple recurrent unit to extract the temporal features based on it. Finally, the classification results were output through softmax to achieve the purpose of intrusion detection.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…The methods we used in our comparison were as follows: SVM [36], which uses support vector machines, a traditional machine learning method, to classify packets as trusted or malicious; CNN [37], which uses only convolutional neural network performs spatial feature extraction and uses the loss function and redundant error items designed by the spatial characteristics of the link load to achieve intrusion detection; LSTM [38], which only uses long short-term Memory network training to obtain the characteristics of traffic data changes in the time dimension In order to achieve intrusion detection; and CNN-BiSRU [39], which uses two deep learning models for serial feature extraction, with the first being convolutional neural network to extract the spatial features of the original data and the other being bidirectional simple recurrent unit to extract the temporal features based on it. Finally, the classification results were output through softmax to achieve the purpose of intrusion detection.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…a Markov model-based attack mitigation method is proposed to evaluate the security state of relay protection system using multi-source data of relay protection device [26]. As to the detection schemes against cyber attacks on the charging pile of power systems, a self-learning detection method based on long short-term memory (LSTM) is proposed to extract the unknown malicious behavior characteristics [27]. In [28], an artificial neural network with nonlinear autoregressive exogenous is used to identify the compromised signals in power system state estimation (PSSE).…”
Section: Related Workmentioning
confidence: 99%
“…In [32], a DC microgrid network attack detection method and a distributed generator set were proposed. In [33], based on broadcasting many false information messages to the communication network, a self-learn-based attack detection method was proposed, which turned training and prediction into a closed-loop system. In [34], the economic efficiency of the whole system was considered, and the elastic distributed coordination of PEV charging against network attacks was studied, and the detection, isolation, update, and recovery steps were designed comprehensively.…”
Section: Introductionmentioning
confidence: 99%