4.3 Article

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning

出版社

WILEY
DOI: 10.1002/ett.4062

关键词

-

向作者/读者索取更多资源

Smart grid systems are vulnerable to cyber-attacks, thus requiring the use of IDS for security. This article proposes a feature-based IDS, with random forest and neural network classifiers outperforming others. The average DR and testing accuracy for both datasets reach 99%.
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to different types of cyber-attacks. These vulnerabilities could cause attackers to crash into the network breaching the integrity and confidentiality of the smart grid systems. Therefore, an intrusion detection system (IDS) becomes an important way to provide a secure and reliable services in a smart grid environment. This article proposes a feature-based IDS for smart grid systems. The proposed system performance is evaluated in terms of accuracy, intrusion detection rate (DR), and false alarm rate (FAR). The obtained results show that the random forest and neural network classifiers have outperformed other classifiers. We have achieved a 0.5% FAR on KDD99 dataset and a 0.08% FAR on the NSLKDD dataset. The DR and the testing accuracy on average are 99% for both datasets.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

A novel solution for finding postpartum haemorrhage using fuzzy neural techniques

V. D. Ambeth Kumar, S. Sharmila, Abhishek Kumar, A. K. Bashir, Mamoon Rashid, Sachin Kumar Gupta, Waleed S. Alnumay

Summary: Postpartum haemorrhage (PPH) is a significant and potentially fatal complication of childbirth worldwide. This research proposes an automation system using wearable devices to predict the risk of PPH in pregnant women by measuring various parameters. Based on the predicted risk, medical attention is provided through an Internet of Things infrastructure.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Engineering, Civil

Swarm Learning-Based Dynamic Optimal Management for Traffic Congestion in 6G-Driven Intelligent Transportation System

Yibing Liu, Lijun Huo, Jun Wu, Ali Kashif Bashir

Summary: As city boundaries expand and vehicles increase, the transportation system faces increasing overload, which has negative effects on people's commutes and overall work and life. However, with the development of 6G-driven Intelligent Transportation Systems (ITS), it becomes possible to alleviate urban congestion. Existing solutions are limited in their ability to optimize traffic efficiently. Therefore, we propose the Direction Decide as a Service (DDaaS) scheme, which incorporates a novel three-layer service architecture, improved modeling and aggregation methods, and a dynamic traffic control algorithm to effectively reduce traffic congestion.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

Lidar Point Cloud Compression, Processing and Learning for Autonomous Driving

Rashid Abbasi, Ali Kashif Bashir, Hasan J. Alyamani, Farhan Amin, Jaehyeok Doh, Jianwen Chen

Summary: This paper provides a comprehensive analysis of 3D Point-Cloud (3DPC) processing and learning in AV systems, highlighting its importance in smart mobility and autonomous driving, as well as the need to address open problems in this field.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems

Yi Sun, Keping Yu, Ali Kashif Bashir, Xin Liao

Summary: This article focuses on the issue of protecting image privacy in intelligent transportation systems. It introduces a Rearrangement-Arnold Cat Map (R-ACM) algorithm and proposes an efficient Bit-level Image Encryption Algorithm (Bl-IEA) based on R-ACM. Experimental results demonstrate that Bl-IEA has a strong ability to resist different attacks, making it suitable for time-limited intelligent transportation applications.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Review Chemistry, Analytical

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

Usman Tariq, Irfan Ahmed, Ali Kashif Bashir, Kamran Shaukat

Summary: The emergence of IoT technology has brought both vast possibilities and new vulnerabilities to connected systems. Developing a secure IoT ecosystem requires a systematic approach to identify and mitigate security threats, with cybersecurity research playing a critical role. The primary challenge is defending against both known and unknown attacks, and concerns regarding connectivity, communication, and management protocols need to be addressed. This research paper provides a comprehensive review of current IoT security concepts, analyzing prevalent security concerns and establishing security goals for specific IoT use cases.

SENSORS (2023)

Article Computer Science, Information Systems

Conditional Anonymous Remote Healthcare Data Sharing Over Blockchain

Jingwei Liu, Weiyang Jiang, Rong Sun, Ali Kashif Bashir, Mohammad Dahman Alshehri, Qiaozhi Hua, Keping Yu

Summary: Electronic Medical Records (EMRs) are valuable research materials for AI and machine learning. Traditional centralized data sharing architectures cannot balance privacy and traceability effectively. Our proposed scheme using decentralized blockchain allows trackable anonymous remote healthcare data storing and sharing, providing efficient overall performance.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Green & Sustainable Science & Technology

Efficient lossless based secure communication in 6G Internet-of-Things environments

Rashid Abbasi, Ali Kashif Bashir, Alaa Omran Almagrabi, Md Belal Bin Heyat, Ge Yuan

Summary: Future sustainable energy-efficient computing solutions in e-healthcare, smart cities, and intelligent robotics applications benefit from the internet of things and cloud computing. Reversible Data Hiding in Encrypted Images (RDHEI) is being used in 6G technology for privacy protection. In this research, a sustainable, energy-efficient, multi-MSB-based dynamic quadtree partition with enhanced Huffman coding is proposed, resulting in optimum embedding capacity.

SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS (2023)

Article Chemistry, Analytical

Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm

Himanshi Babbar, Shalli Rani, Dipak Kumar Sah, Salman A. Alqahtani, Ali Kashif Bashir

Summary: Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be achieved by applying various machine-learning techniques. This study proposes an internet-based framework for predicting and recommending Android malware on IoT devices. The suggested system utilizes static analysis and the K-Nearest Neighbor machine-learning model, achieving a prediction rate of 93% in real-world applications to minimize energy utilization.

SENSORS (2023)

Article Computer Science, Information Systems

Low-Latency Federated Learning via Dynamic Model Partitioning for Healthcare IoT

Peng He, Chunhui Lan, Ali Kashif Bashir, Dapeng Wu, Ruyan Wang, Rupak Kharel, Keping Yu

Summary: In this article, a three-layer federated learning architecture is proposed to reduce training latency and improve efficiency in medical image classification while ensuring data privacy.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Computer Science, Hardware & Architecture

Secure Digital Twin Migration in Edge-Based Autonomous Driving System

Yi Zhou, Jun Wu, Xi Lin, Ali Kashif Bashir, Yasser D. Al-Otaibi, Hansong Xu

Summary: Digital twin (DT) technology is increasingly used in the Internet of Vehicles environment, but efficiency and security remain major challenges. Existing research on efficient migration methods of DT models in the field of DT-based autonomous driving treats the migration process as a blackbox. This study proposes three different migration strategies for efficient migration of DT models between edge computing nodes, and evaluates their efficiency in terms of migration time using the autonomous driving simulation platform CARLA in different network environments. Additionally, the study analyzes potential security issues during the migration process and proposes corresponding defense methods against cyberattacks.

IEEE CONSUMER ELECTRONICS MAGAZINE (2023)

Article Engineering, Electrical & Electronic

Privacy-Preserving Federated Learning of Remote Sensing Image Classification With Dishonest Majority

Jiang Zhu, Jun Wu, Ali Kashif Bashir, Qianqian Pan, Wu Yang

Summary: This paper proposes a blockchain-empowered privacy-preserving federated learning method for remote sensing image classification, which can defend against encrypted model poisoning attacks. By using the methods of proof of accuracy and secure aggregation, the proposed scheme achieves high accuracy even in the presence of malicious attackers. Experimental results demonstrate the superiority of the scheme in defending against model poisoning attacks.

IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING (2023)

Article Telecommunications

EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

Chintan Patel, Ali Kashif Bashir, Ahmad Ali AlZubi, Rutvij Jhaveri

Summary: Industrial Internet of Things (IIoT) aims to improve services in various industries. Security, especially authentication and access control, is a major challenge for IIoT. This paper presents a secure authentication scheme based on Elliptic Curve Cryptography (ECC) that is efficient, reliable, and trustworthy compared to existing schemes. The proposed scheme is evaluated based on communication cost, computation cost, and security index and shows superior performance.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Engineering, Electrical & Electronic

Software-Defined GPU-CPU Empowered Efficient Wireless Federated Learning With Embedding Communication Coding for Beyond 5G

Zihong Li, Yang Hong, Ali Kashif Bashir, Yasser D. Al-Otaibi, Jun Wu

Summary: With the widespread use of the intelligent Internet of Things (IoT) in beyond 5G, wireless federated learning (WFL) has gained attention for enabling knowledge sharing among distributed edge devices. However, existing WFL schemes face challenges under unstable wireless channel conditions, including parameter disturbance, low efficiency in traditional edge devices, and inability to optimize complex operations. To address these challenges, a software-defined GPU-CPU empowered efficient WFL architecture with embedding LDPC communication coding is proposed, which shows improved anti-interference ability and GPU-CPU acceleration during wireless transmission.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2023)

Article Computer Science, Cybernetics

AI-Assisted Deep NLP-Based Approach for Prediction of Fake News From Social Media Users

Ganesh Gopal Devarajan, Senthil Murugan Nagarajan, Sardar Irfanullah Amanullah, S. A. Sahaaya Arul Mary, Ali Kashif Bashir

Summary: Social networking websites are the best platforms for news dissemination, but they also lead to the spread of fake news. Traditional detection methods focus on content analysis, while current researchers explore the social features of news. We propose an AI-assisted fake news detection model using deep natural language processing. The model includes four layers: publisher layer, social media networking layer, enabled edge layer, and cloud layer. Our model achieves an average accuracy of 99.72% and an F1 score of 98.33%, outperforming existing methods, based on evaluation using three datasets (Buzzface, FakeNewsNet, and Twitter).

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Telecommunications

Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective

Muhammad Ali Naeem, Yousaf Bin Zikria, Rashid Ali, Usman Tariq, Yahui Meng, Ali Kashif Bashir

Summary: This paper comprehensively discusses fog computing, Internet of Things (IoTs), and the issues of data security and dissemination in fog computing. Various caching schemes are proposed to address the problems in fog computing, and machine learning-based approaches for cache security and management are explored, as well as potential future research directions.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

暂无数据