DEEP LEARNING TECHNIQUE FOR IDENTIFYING FALSE DATA INJECTION THREATS IN SMART GRID SYSTEMS
DOI:
https://doi.org/10.4314/njt.v44i2.14Keywords:
Smart Grid (SG), State Vector Estimator (SVE), False Data Injection (FDI), Cuttlefish Optimization Coupled With Enriched Recurrent Neural Network (CO-ERNN), Cyberattack, Bus systemAbstract
The integration of computers and artificial intelligence (AI) improves SG management and monitors were considered significant. More reliance on technological devices renders one more susceptible to dangerous assaults. The confidentiality of data has been put at risk due to the growing vulnerability of the supervisory control and data acquisition (SCADA) framework towards False Data Injection (FDI) assaults. The behavioral traits of FDI assaults are identified in this work by using historical measurement data and deep learning (DL) techniques. The z-score normalization approach was used for cleansing the historical data and converting continuous-time signals towards discrete form and the discrete wavelet transform (DWT) technique was utilized for data extraction. To find the best FDI assaults in the SG, cuttlefish optimization is combined with enriched recurrent neural network (CO-ERNN) technology. By efficiently reducing assumptions about possible attack scenarios, the suggested cyber-attack detection system exhibits outstanding dependability. Furthermore, an optimization model is put out to describe the behavior of a certain kind of FDI functioning, specifically in situations when accessible restricted positioning measures for power theft in energy systems are at risk. Based on the IEEE 118-bus test system, the versatility of the CO-ERNN proposed attack recognition mechanism is assessed, and the results of the simulation demonstrate the effectiveness of the proposed strategy.
References
[1] Unsal, D. B., Ustun, T. S., Hussain, S. S., and Onen, A. “Enhancing cyber security in SG: false data injection and its mitigation”, Energies, 14(9), p.2657; 2021. https://www.md pi.com/1996-1073/14/9/2657#
[2] Sengan, S., Subramaniyaswamy, V., Indragandhi, V., Velayutham, P. and Ravi, L. “Detection of false data cyber-attacks for the assessment of security in SG using deep learning”, Computers & Electrical Engineer-ing, 93, p.107211; 2021. https://doi.org/10.1 016/j.compeleceng.2021.107211
[3] Kandasamy, V., and Roseline, A. A. “Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks”, Sci Rep 15, P.1697-1712 (2025). https://doi.org/10.1038/s4 1598-025-85547-5
[4] Reda, H. T., Anwar, A., Mahmood, A. N. and Tari, Z. “A Taxonomy of Cyber Defence Strategies Against False Data Attacks in SG”,. ACM Computing Surveys, 55(14s), pp.1-37; 2023. https://doi.org/10.1145/3592797
[5] Algarni, A., and Thayananthan, V. “Autonomous vehicles: The cyber security vulnerabilities and countermeasures for big data communication”, Symmetry, 14(12), p.2494. 2022. https://doi.org/10.3390/sym1412 2494
[6] Cui, L., Qu, Y., Gao, L., Xie, G., and Yu, S. “Detecting false data attacks using machine learning techniques in SG: A survey”, Journal of Network and Computer Applications, 170, p.102808. 2020. https://doi.org/10.1016/j.jnca. 2020.102808
[7] Stoustrup, J., Annaswamy, A., Chakrabortty, A. and Qu, Z. “SG control”, Springer International Publishing, 10, pp.978-3. 2019. https://doi.org/10.1007/978-3-319-98310-3
[8] Niu, X., Li, J., Sun, J. and Tomsovic, K. “Dynamic detection of false data injection attack in SG using deep learning”, In 2019 IEEE Power & Energy Society Innovative SG Technologies Conference (ISGT), pp. 1-6; 2019 February. https://doi.org/10.1109/ISGT.2019.8 791598
[9] Mahi-Al-Rashid, A., Hossain, F., Anwar, A. and Azam, S. “False data injection attack detection in SG using energy consumption forecasting”, Energies, 15(13), p.4877. 2022. https://doi.org/10.3390/en15134877
[10] Al Siam, A., Alazab, M., Awajan, A., and Faruqui, N. "A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity," in IEEE Access, vol. 13, pp. 14029-14050, 2025, doi: 10.1109/ACCESS. 2025.3528114.
[11] Gupta, R., Kumari, A. and Tanwar, S. “Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications”, Transactions on Emerging Telecommunications Technologies, 32(1), p.e4176. 2021. https://doi.org/10.1007/978-981-99-2115-7_16
[12] Vivek Menon, U., Vinoth Babu Kumaravelu, Vinoth Kumar, C., Rammohan, A., Sunil Chinnadurai, and Rajeshkumar Venkatesan, "AI-Powered IoT: A Survey on Integrating Artificial Intelligence With IoT for Enhanced Security, Efficiency, and Smart Applications," IEEE Access, vol. 13, pp. 50296–50339, 2025, doi: 10.1109/ACCESS.2025.3551750.
[13] Krishnamoorthy, R., Kamala, K., Soubache, I. D., Karthik, M. V. and Begum, M. A. “Integration of blockchain and artificial intelligence in smart city perspectives”, Smart City Infrastructure: The Blockchain Perspec-tive, pp.77-112. 2022. https://doi.org/10.1002/ 9781119785569.ch3
[14] Amin, B. R., Taghizadeh, S., Rahman, M. S., Hossain, M. J., Varadharajan, V. and Chen, Z. “Cyber attacks in SG–dynamic impacts, analyses, and recommendations”, IET Cyber‐Physical Systems: Theory & Applications, 5(4), pp.321-329. 2020. https://doi.org/10.1049/iet-cps.2019.0103
[15] Habib, A. A., Hasan, M. K., Alkhayyat, A., Islam, S., Sharma, R. and Alkwai, L. M. “False data injection attack in SG cyber-physical system: Issues, challenges, and future direction”, Computers and Electrical Enginee-ring, 107, p.108638. 2023. https://doi.org/10.10 16/j.compeleceng.2023.108638
[16] Nawaz, R., Akhtar, R., Shahid, M. A., Qureshi, I. M., and Mahmood, M. H. “Machine learning-based false data injection in SG”, International Journal of Electrical Power & Energy Systems, 130, p.106819. 2021. https://doi.org/10.1016/j.i jepes.2021.106819
[17] Li, Y., Wei, X., Li, Y., Dong, Z. and Shahidehpour, M. “Detection of false data injection attacks in SG: A secure federated deep learning approach”, IEEE Transactions on SG, 13(6), pp.4862-4872. 2022. https://doi.org/10.1 109/TSG.2022.3204796
[18] Mohammadpourfard, M., Weng, Y., Pechenizkiy, M., Tajdinian, M., and Mohammadi-Ivatloo, B. “Ensuring cyber security of SG against data integrity attacks under concept drift”, International Journal of Electrical Power & Energy Systems, 119, p.105947. 2020. https://doi.org/10.1016/j.ijepe s.2020.105947
[19] Akbarian, F., Ramezani, A., Hamidi‐Beheshti, M. T. and Haghighat, V. “Advanced algorithm to detect stealthy cyber-attacks on automatic generation control in SG”, IET Cyber‐Physical Systems: Theory & Applications, 5(4), pp.351-358. 2020. https://doi.org/10.1049/iet-cps.2019 .0074
[20] Muthubalaji, S., Muniyaraj, N. K., Rao, S. P. V. S., Thandapani, K., Mohan, P. R., Somasundaram, T. and Farhaoui, Y. “An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from SG Systems”, Big Data Mining and Analytics, 7(2), pp.399-418. 2024. https://doi.org/10.26599/BDMA.2023.9020022
[21] Nijim, M., Kanumuri, V., Al Aqqad, W., and Albataineh, H. March. “Machine Learning-Based Analysis of Cyber-Attacks Targeting SG Infrastructure”, In International Conference on Advances in Computing Research, Cham: Springer Nature Switzerland, pp. 334-349; 2024, March. https://doi.org/10.1007/978-3-031 -56950-0_28
[22] Zhang, Y., Wang, J., and Chen, B. “Detecting false data injection attacks in SG: A semi-supervised deep learning approach”, IEEE Transactions on SG, 12(1), pp.623-634. 2020. https://doi.org/10.1109/TSG.2020.3010510
[23] Mukherjee, D. “Detection of data-driven blind cyber-attacks on SG: A deep learning approach”, Sustainable Cities and Society, 92, p.104475. 2023. https://doi.org/10.1016/j.scs.2 023.104475
[24] Ismail, M., Shaaban, M. F., Naidu, M. and Serpedin, E. “Deep learning detection of electricity theft cyber-attacks in renewable distributed generation”, IEEE Transactions on SG, 11(4), pp.3428-3437. 2020. https://doi.o rg/10.1109/TSG.2020.2973681
[25] Ashrafuzzaman, M., Das, S., Chakhchoukh, Y., Shiva, S., and Sheldon, F. T. “Detecting stealthy false data injection attacks in the SG using ensemble-based machine learning”, Computers & Security, 97, p.101994. 2020. https://doi.org/10.1016/j.cose.2020.101994
[26] Koyuncu, H. and Yang, S. H. “Improved adaptive localisation approach for indoor positioning by using environmental thresholds with wireless sensor nodes”, IET Wireless Sensor Systems, 5: 157–165; 2015. https://doi. org/10.1049/iet-wss.2013.0100
[27] Koyuncu, H., and Yang, S. H. "Improved Fingerprint Localization by Using Static and Dynamic Segmentation," 2014 International Conference on Computational Science and Computational Intelligence, Las Vegas, NV, USA, 2014, pp. 149–156. https://doi.org/ 10.1109/CSCI.2014.32
[28] Koyuncu, H., and Yang, S. H. "Indoor Positioning with Virtual Fingerprint Mapping by Using Linear and Exponential Taper Functions," IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK, 2013, pp. 1052–1057. https://doi.org/10.1 109/SMC.2 013.183
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nigerian Journal of Technology

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The contents of the articles are the sole opinion of the author(s) and not of NIJOTECH.
NIJOTECH allows open access for distribution of the published articles in any media so long as whole (not part) of articles are distributed.
A copyright and statement of originality documents will need to be filled out clearly and signed prior to publication of an accepted article. The Copyright form can be downloaded from http://nijotech.com/downloads/COPYRIGHT%20FORM.pdf while the Statement of Originality is in http://nijotech.com/downloads/Statement%20of%20Originality.pdf
For articles that were developed from funded research, a clear acknowledgement of such support should be mentioned in the article with relevant references. Authors are expected to provide complete information on the sponsorship and intellectual property rights of the article together with all exceptions.
It is forbidden to publish the same research report in more than one journal.