2023
DOI: 10.1109/tpel.2023.3263728
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcement Learning-Based Method to Exploit Vulnerabilities of False Data Injection Attack Detectors in Modular Multilevel Converters

Abstract: Implementing control schemes for modular multilevel converters (M2Cs) involves both a cyber and a physical level, leading to a cyber-physical system (CPS). At the cyber level, a communication network enables the data exchange between sensors, control platforms, and monitoring systems. Meanwhile, at the physical level, the semiconductor devices that comprise the M2C are switched ON/OFF by the control system. In this context, almost all published works in this research area assume that the CPS always reports cor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 70 publications
0
5
0
Order By: Relevance
“…Recently, some efforts were conducted to exploit vulnerabilities of established countermeasures of cybersecurity for GCPEC. Paper [45] of 2023 proposed a reinforcement learning (RL)-based method to uncover the deficiencies of existing false data injection attack (FDIA) detectors used for modular multilevel converters (M2C) applications, a prominent solution for high-efficient longdistance high-voltage direct current (HVdc) transmission systems. Depending on the defined RL scheme, it is necessary define the following elements to use the RL technique for obtaining the FDIA attacker: 1) the inputs of the actor, which is the neural network (NN) that will define the attack, and the critic, another NN that evaluates the cost; 2) the output of the actor; 3) the reward function that drives the training; 4) the experiment design [45].…”
Section: ) Intrusion Detection Based On Pqv Limitsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, some efforts were conducted to exploit vulnerabilities of established countermeasures of cybersecurity for GCPEC. Paper [45] of 2023 proposed a reinforcement learning (RL)-based method to uncover the deficiencies of existing false data injection attack (FDIA) detectors used for modular multilevel converters (M2C) applications, a prominent solution for high-efficient longdistance high-voltage direct current (HVdc) transmission systems. Depending on the defined RL scheme, it is necessary define the following elements to use the RL technique for obtaining the FDIA attacker: 1) the inputs of the actor, which is the neural network (NN) that will define the attack, and the critic, another NN that evaluates the cost; 2) the output of the actor; 3) the reward function that drives the training; 4) the experiment design [45].…”
Section: ) Intrusion Detection Based On Pqv Limitsmentioning
confidence: 99%
“…Paper [45] of 2023 proposed a reinforcement learning (RL)-based method to uncover the deficiencies of existing false data injection attack (FDIA) detectors used for modular multilevel converters (M2C) applications, a prominent solution for high-efficient longdistance high-voltage direct current (HVdc) transmission systems. Depending on the defined RL scheme, it is necessary define the following elements to use the RL technique for obtaining the FDIA attacker: 1) the inputs of the actor, which is the neural network (NN) that will define the attack, and the critic, another NN that evaluates the cost; 2) the output of the actor; 3) the reward function that drives the training; 4) the experiment design [45]. The effectiveness of this RL method was verified in HIL studies, which found that the attack sequences depend on the characteristics of the FDIA detector studies, i.e., the more sophisticated the FDIA detectors, the more complex attack sequences will be generated by the proposed RL-method.…”
Section: ) Intrusion Detection Based On Pqv Limitsmentioning
confidence: 99%
“…In follow-up studies, ref. [27] presents a reinforcement learning-based method to exploit the vulnerabilities of FDIA detectors in the MMC. The proposed method reveals the weakness of the fault detector given in [26] and provides a solution for researchers to motivate future research in this area.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, refs. [25][26][27] are all the related publications regarding the topic of cyber-attack in the MMC.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation