Professional Documents
Culture Documents
A Smart Digital Twin Enabled Security Framework For Vehicle-to-Grid Cyber-Physical Systems
A Smart Digital Twin Enabled Security Framework For Vehicle-to-Grid Cyber-Physical Systems
18, 2023
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5259
sensing devices. However, it has been observed from recent reinforcement learning (DRL) algorithm, namely LSTM-DRL,
studies that intelligently created false data injection attacks is incorporated in a virtual replica of V2G-CPSs. The LSTM
(FDIAs) could bypass the current bad data detection models. algorithm is responsible for estimation the actual states of
In FDIA, the adversary tampers the data so that detection V2G-CPS. Based on the estimated states, the DRL algorithm
algorithms cannot recognize the corrupted data [5], [6] and trains its agent and detects the abnormal behavior in V2G-
would mislead the control operator to take wrong actions, CPSs followed by taking actions to mitigate the corresponding
leading to system instability. impact. Furthermore, the actor-critic technique is adopted to
Due to the development of various cyber attack strategies, further improve the system performance and the convergence
research works have also been carried out to improve the time of the proposed LSTM-DRL algorithm.
defense of V2G-CPSs against potential attacks such as FDIA In summary, the key contributions of this paper are:
and SA [7], [8]. For instance, the authors in [9] investigated • proposing a smart DT framework for a secure and safe
how the FDIA would manipulate the electricity market by operation of V2G-CPSs under CCAs, such as FDIAs and
tampering with the price parameters. In there the authors pro- SAs,
vide countermeasures by securing some critical state variables. • formulating a mathematical model of the smart DT for
Moreover, the research works that are dedicated to securing V2G-CPSs incorporating V2G connections and RESs as
the smart meters and PMUs measurements against FDIA can wind turbines (WT), and
be found in [10] and [11]. However, studies dealing with cyber • developing and incorporating an LSTM-DRL algorithm
attacks on DT from physical processes, data transmission, in the smart DT for fast detection and mitigation of CCAs.
and to decision control are limited. For instance, the effects The rest of the paper is organized as follows. In Section II,
of unbalanced voltage distribution on the system network the comparative literature review is presented. Section III
under inadequate control action by the operator were presented includes the information about V2G and threats model.
in [12]. Here, the adversary deployed false control signals Section IV describes the mathematical model of the LSTM-
in the control channel to operate the circuit breakers in the DRL framework. Section V includes results, discussion, and
network. Moreover, the impact of coordinated cyber attacks testing of the LSTM-DRL algorithm under different cyber
(CCAs) on V2G-CPSs has not been fully studied yet. CCAs threats. Section VI concludes the paper.
can easily disturb the information flow, power flow, or even
both of them. Furthermore, shuffling the attacks, such as
removing or isolating the attacked equipment, among the II. R ELATED W ORK
sensor network, controller, and communication channel will Among various types of cyber attacks, one of the most
harm the security of the network [13]. This scenario becomes threatening attacks is FDIA, which mostly happens in smart
more severe when the information of physical processes and grids and is discussed in the literature. FDIAs, were identified
the availability of V2G devices, transferred to the DT replica in [14], in which a methodology was introduced to detect this
of the V2G-CPSs, are tampered with by CCAs. In addition, type of attack even though it by-pass the bad data detection
CCAs have the potential of causing N − K contingencies in process in weighted least square state estimation. The authors
communication and power networks, whereas N − K contin- adopted in [14] adopted the Kullback-Leibler distance (KLD)
gencies mean the successive tripping of circuit breakers in algorithm, which is used to measure the distance between two
power networks or interruptions in communication networks. probability values of measurements. In the event if attacks
The physical impact of N − K contingencies is in the form happens, the algorithm will produce larger KLD values, which
of blackouts. Similarly, if the DT, which is responsible for shows that measurements are being compromised. In addition,
providing secure and safe operation of the V2G-CPSs, is an attack on embedded electronics systems was discussed
tempered, then there is a need for some intelligent algorithms in [15], in which a torjan attacks were used to compromise
deployed in the DT replica of V2G-CPSs. Those algorithms the intelligent electronics devices. Similarly, FDIAs were also
will be dedicated to not only detecting CCAs on the physical identified by authors in [16], who revealed that traditional bad
processes as identification of malicious V2G nodes and SAs, data detection could not detect the corrupted measurements
and data transmission as false information transferred to DT, during state estimation. A more severe case of FDIA is
but also mitigating the impact of CCAs that will be in the discussed in [17] and [18] where the attack causes cascaded
form of N − K contingencies by adaptive control strategies. outages in power grids.
This paper addresses the gap in the existing literature Inspired by [16], new cyber threats where the attacker
by developing a robust detection and mitigation mechanism tampered with the transformer taps have been extensively
against the CCAs on V2G-CPSs. In particular, the main aim investigated, which also increased the researchers’ interest in
of this paper is to identify malicious users, which can launch devising robust detection and mitigation techniques. Early,
FDIAs and manipulate the actual information of physical state estimation algorithms are developed that are based on
processes transmitted to the SCADA system, or SAs that the DC power flow model to detect data attacks on smart
inject the false control signals through the communication grids in [19]. Several techniques are then available that cover
channel for the false operation of the circuit breakers. In this the area of state estimation for complex systems like V2G-
regard, a smart DT replica of V2G-CPSs is proposed to detect CPSs. For instance, the authors of [20] adopted the Kalman
and mitigate CCAs in the system. In the proposed smart DT filter to detect FDIAs. In addition, an optimization technique
framework, the long short-term memory (LSTM) based deep to cluster vulnerable nodes is proposed in [21]. However,
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
5260 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 18, 2023
the algorithm mentioned in [21] involves a computationally process takes place, the authors in [31], [32], and [33] did
detection process. Moreover, the major drawback associated not provide any action to countermeasure such attacks.
with the Kalman filter is the creation of the Jacobian and Based on the above comprehensive review and analysis,
error covariance matrices, which increases complexity as the it has been observed that most CCAs detection methods are
number of buses increases. Furthermore, if there is high specifically for state estimators, and the mitigation methods
nonlinearity observed in a network, then Kalman filter do are developed to isolate or remove the attacked nodes in
not yield better results and these techniques need an accurate systems. However, there are almost no studies on the use
knowledge model to perform precise state estimations [22]. of DT for CCAs detection and mitigation. In other words,
A simpler non-iterative method is proposed in [23] for FDIA the potential of DTs for CCAs detection and mitigation has
detection based on measurements obtained from SCADA and not been fully explored. To this purpose, we proposed a DT-
PMUs. The advanced form of cyber attacks on V2G-CPSs, enabled intelligent framework to detect and mitigate CCAs
that is, CCAs, has been discussed in [24]. In this work, the in V2G-CPSs. One of the important features of this work
attack vectors are created coordinately to avoid the bad data is to show how the smart DT model can provide fast attack
detection algorithm. In addition, the countermeasure approach detection and timely control strategies to prevent the N − K
is also proposed for attack detection by monitoring secure contingencies in V2G-CPSs.
PMU measurements and line impedance. However, SAs on
generation nodes and on DT was not considered. III. S YSTEM M ODEL
Aside from FDIA, another noteworthy type of cyber attack, A. Vehicle-to-Grid Cyber-Physical System (V2G-CPS)
namely SA, can cause an abnormal topology configuration A schematic of the V2G-CPS studied in this paper is
leading to cascading contingencies in power grids. To counter shown in Fig. 1 with its corresponding DT. The V2G-CPS
the abnormalities due to SA, the authors in [25] proposed a operates as a closed-loop control system and comprised of
multi-agent system (MAS) technique for mitigating cascading EVs, WTs, and generation plants along with the dynamic
failures. The algorithm chose an optimal combination from the varying load. The diversified energy sources make the V2G-
number of combinations presented to dispatch the power from CPS more flexible and reliable to satisfy the various demand
a generator. The optimal generator combination is selected by requirements. However, hsving multiple energy sources also
computing sensitivities gain, which is based on giving rewards makes system operations, such as power flow control and
and penalties for different load flow patterns. Moreover, the energy dispatch, more complex. Moreover, with the increase
algorithm in [25] provides effective solutions if contingencies of energy sources, especially EV nodes, V2G-CPS becomes
occur due to natural phenomena. If initial contingencies are more vulnerable to various adversaries and attacks. The DT
not tackled in time, they may expand to N − K contingencies of V2G-CPS has the capability to reduce the heavy burden of
that can cause the network unstable resulting in blackouts. system operation, but it is inevitable to security threats such as
Considering the complexity of V2G-CPSs, the control CCAs. This is due to the fact that the reliability of DT relies
strategies of system operation should be coordinated and on the accuracy of information updated from the physical
distributed to ensure economic communication bandwidth process of V2G-CPS. For instance, adversaries can launch
utilization and flexible operation of the network components. FDIAs on the amount of information on connected EVs, or can
However, coordinated distributed control structures are also release SAs on the status of critical circuit breakers. The
vulnerable to cyber attacks [26], [27], [28]. To prevent and malicious information will be communicated with the DT of
mitigate CCAs, there have been many effects on secured and V2G-CPS, and may affect the decision-making process of the
distributed control strategies in V2G-CPSs. In this regard, the DT to take inappropriate actions leading to system instability.
authors in [29] proposed a resilient coordinated control system Stability of power system refers to the ability to regain its
for the packet loss problem, while in [30], a hierarchical dis- normal operational equilibrium after being subjected to cyber
tributed control scheme was proposed. The primary function or physical attacks [35], [36]. In a V2G-CPS, the power and
of the proposed algorithm in [30] was to detect the attacked current of system is monitored and the system is declared as
controller agent and isolate it from the network. In addition, stable system if these parameters are within thresholds and are
the dynamic behavior of the various agents is studied using discussed in detail in next section.
morphology strategies in order to identify the agent, which is To detect and mitigate CCAs on the V2G-CPS and the
attacked and then devise a methodology based on graph theory corresponding DT, in this paper, we develop a security check
to mitigate the attack [31]. For the synchronized operation of framework in the DT virtual replica based on the LSTM-
the sensors in the network under attack, compensator-based DRL method. Before giving more details on the proposed
control strategies were adopted in [32], [33]. The authors framework and LSTM-DRL method, the DT model of V2G-
in [31], [32], [33], and [34] have observed the fluctuation CPS and the threat model of CCA are first described in the
in the voltage in order to identify the attack and enable following sections.
synchronization among different devices by detecting the mali-
cious power system control and operating devices. However,
such algorithms are computationally expensive and the effect B. Digital Twin of V2G-CPS
of CCAs on DTs was not discussed. Besides, if cyberspace To make the DT model more realistic, a strict mathematical
is compromised where the whole detection and mitigation model to represent the physical characteristics of V2G-CPS
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5261
P need (t).
where, IkL and PkL are the actual current and power of The following constraints on the generation buses, load
the k th transmission line while Ik,max
L L
and Pk,max are the buses, and transmission line will be considered so that no
corresponding maximum current and power limits respectively. individual bus observes any stress in the N-K contingencies
G
Pi,min G
and Pi,max are the minimum and maximum output mitigation, as power is being rerouted from RERs along with
power of the generator on the i th bus, and Pi,min
D D
and Pi,max are its generations, so the need of monitoring the thresholds limits
the minimum and maximum load capabilities of the i th bus, of power lines must be considered.
respectively. Furthermore, the real power flow will be balanced P i,k capacity, G = min(PiG , P G k,max − P k G ), (10)
at each bus i, that is,
P i,k capacity, L
= min(P i , P k ),
G L
(11)
N
X P i,k capacity, power line = min(|P L i,max | − |P i L |), (12)
PiG − PiD − |Vi ||V j ||Y ij |cos(φ ij − δ i − δ j ) = 0, (4)
j=1 P i,k total allowed
= min(P i capacity, G
, Pi capacity, L
), (13)
where |V | and δ are respectively the magnitude and phase where PiG and PkG are the powers to be dispatched at the buses
angles of voltage, and N is the total number of buses in the i and k, respectively. P G k,max is the total power available at
V2G-CPS. |Y ij | and φ ij are the magnitude and angle of the bus k and PkL is the net demand at bus k. Moreover, P L i,max
Y-bus matrix of the system, respectively [37]. and PiL are the total capacity and the actual power flow in line
However, some current and power flow may violate the i. To fill up the unexpected gap of generation and demand,
safety constraints in the case of CCAs, such as that is Pneed (t), we consider the contribution of RESs as the
reserve power generation. Here,
IkL , PkL > Ik,max
L
, Pk,max
L
. (5) [Pneed (t) < Pmax
R
(t)], (14)
Considering such overloading flow may cause N − K contin- where Pmax R (t) is the maximum output capacity of RERs
gencies leading to cascading failures, the proposed security at time slot t. If Pneed (t) satisfies the above constraint, the
framework is first activated by observing any unexpected proposed method will only reroute the power from RESs to
variations in the power flow, and then, continuously monitors meet Pneed (t). Otherwise, V2G mode, described in the next
the constraints of (1), (2), and (3) to detect CCAs and mitigate section, will also be active to reduce the amount of Pneed (t).
N − K contingencies due to CCAs. Furthermore, the proposed In this paper, we focus on WTs RERs. The aerodynamics of
algorithm also tackles the actual power demand of each bus the blades are characterized using different coefficients such
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
5262 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 18, 2023
Td
as C p (β, λ) and Cq (β, λ), which represents power aerody- Xj
j P j (t) 1T ] = w j − w j , ∀ j.
[ηev ev d c
namics coefficients. Here, β stands for the pitch angle of the (22)
blade while λ stands for the speed ratio and is computed t=T jc
as λ = Rwr /Vr . While R and wr are blade length and its
corresponding angular speed while Vr is the effective wind Here, 1T is the interval of a time slot, T jc and T jd are the
speed at the rotor plane. Based on the coefficients discussed time slots of V2G connected and disconnected to V2G-CPSs,
overall power Pa and torque Ta of the wind turbine will be; respectively. ηcj and ηdj show the efficiency of charging and
1 discharging for j th EV, respectively. wcj is the initial power
Ta = ρ A RVr2 Cq (β, λ), (15) capacity when j th EV is connected to the system network, and
2
1 wdj is the end power capacity when j th EV is disconnected.
Pa = ρ A RVr3 C p (β, λ), (16)
2 Finally, S OC j (t) indicates the state of charge of j th EV at
where, ρ is the air density and A corresponds to the blade the time slot t.
area which is equal to π R 2 . Considering the thrust factor, the
relative velocity of wind can be represented as, Vr = Vw − Vn ,
C. Threat Model
where Vw and Vn are the free wind speed and nacelle velocity
in direction of wind turbines, respectively. There are two representative CCAs studied in this paper,
2) Physical Twin Model for V2G: There is an obvious which are false data injection attacks (FDIA) and switching
impact on the V2G-CPS by integrating V2G module into the attacks (SA). In particular, we study the impact of FDIAs on
system network through household devices or other electronic the malicious V2G nodes and the impact of SAs on the circuit
interfaces. This is due to the fact that the output of V2G is breakers of generators. In most of the CCA studies, there is
not regular and uninterrupted which will introduce unexpected a common implicit assumption that the adversary would try
harmonics into the power profile of V2G-CPS. Therefore, there to tamper with full network parameters via CCAs. However,
is a need for a reliable V2G model for control and operation in realistic scenarios, the adversary has limited resources
that can improve the stability and reliability of the V2G-CPS. and information about the entire network, thus limiting the
To ease of understanding the V2G model, we assume that each attack range. Consequently, before describing the CCA models
bus has installed a V2G aggregator, namely V2G node, and the studied in this paper, certain assumptions are made from the
number of EVs at each bus i is m i , that is M = {m i |i ∈ N }. attacker’s perspective:
According to [38], the model of V2G node in each bus can • The adversary does not have the ability to fully access
be expressed as: all points connected in the V2G-CPSs.
mi • The adversary has limited resources to launch CCAs.
X
Pio (t) + ηev
j P j (t) = Pi (t) , t = 1, · · · , T,
ev D
(17) In the other words, the attackers will target critical points
j=1 closely related to the generator circuit breakers.
• The adversary will tamper with the information of the
where Pio and P jev are the base load excluded EV demand and
sensor connected to the generator circuit breakers and
the power demand of the j th EV in the i th bus, respectively. initiate FDIA in the communication channel connecting
ηev th
j represents the charger efficiency of the j EV depended the sensors that transmit information to the DT to update
on charging or discharging modes and T is the total number itself.
of time slots. It can be observed from (17) that the V2G • The adversary can inject malicious V2G nodes by altering
mechanism plays an important role in helping stabilize the the amount of EV connected with the network to corrupt
V2G-CPS. In particular, the EVs are able to supply and absorb the system states.
the shortage and excess of power through V2G mode in the • The adversary will only tamper with the voltage V and
emergency situation as CCAs and the corresponding mitigation phase angle θ state parameters of the attacked breakers
processes. only.
Furthermore, there are some essential constraints for the
operation of V2G, followed in [38]. In the V2G-CPS, the magnitude and phase angles of voltage at
each bus are considered primary state parameters. These state
P jev (t) ≤ P j,max
ev
, t = T jc · · · T jd , ∀ j. (18) variables x are expressed as follows;
S OC j, min ≤ S OC j (t) ≤ S OC j, max , t = T jc · · · T jd , x = [|V1 |, . . . , |VN |, θ2 , · · · , θ N ]T . (23)
× ∀ j. (19)
( The measurement vector mv in state estimation usually
ηcj , P jev (t) ≥ 0 includes different parameters, such as; voltage and current
ηj =
ev
(20)
ηdj , P jev (t) < 0. measurement values from PMUs, power flows related infor-
wc +ηev P ev (t)1T mation, and power injection data from V2G and smart
i j
cj
j
, t = T jc meters [39]. For most cases, the most significant normalized
SOC j(t) = S OC j (t) + j P j (t)1T ,
ηev ev
t = T jc residuals-based state estimation is adopted for bad data detec-
cj
tion in network parameters, which occurs due to cyberattacks
+1 · · · T jd
and measurements devices errors [40]. The residual vector
(21) Res calculated through the largest normalized residuals-based
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5263
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
5264 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 18, 2023
TABLE I
C OMPARISON OF C OMMON T HREAT M ETHOD IN S MART G RID
the presence of CCAs. LSTM is a modified recurrent neural Algorithm 1 V2G-CPS State Variable Estimation by
network (RNN). It is able to learn from time series data LSTM for DRL
and the vanishing gradient issue in RNN is resolved using Input 1: Random initialization hst , weights and Ct
LSTM, which is why LSTM is used in this paper to predict Input 2: Voltage, current, real and reactive power
state variables [47]. The LSTM utilizes the DT data, such as Input 3: Specified convergence tolerance ϵ, Er , R L,
current, voltage, frequency, and statistical data, to predict the T D and E S
state variables. The DT data, which varies dynamically with Output : Estimated voltage V and phase angle θ states
time, is collected by the internet of things (IoT) sensor devices while (E S > ϵ) do
installed in the V2G-CPS. LSTM gives a good approximation Prediction of V and θ ;
of state variables because of its ability to handle time series for (T D presented to network) do
and an immense amount of data. In this paper, we consider the The three prediction steps are performed using
voltage magnitude |V | and phase angles θ of each bus as the (28), (29), (30), (31), (32), (33);
state variables, and refer to the estimated state as the output Compute Er ;
of the LSTM algorithm. The data of current, voltage, real and if (Er > ϵ) then
reactive power generated with different load patterns are to Update weights by back propagation
be referred as the input of the LSTM algorithm. Once LSTM through gradient descent algorithm;
is trained offline, the refine estimated states are then utilized else
for online training of the DRL in the smart DT replica of Ouput the, V and θ;
V2G-CPSs. This reduces the convergence time of the DRL end
algorithm and increases its accuracy. The proposed LSTM If error between actual and estimates is greater,
consists of the following steps for the state estimation [22]. then send variations V , and θ as an input to
Estimation Step-1: In this step, the LSTM decides what nec- Algorithm 1 for further tuning;
essary information is needed and what needs to be discarded end
from memory cells, which is why this step is called forget end
step. The function vt computed at the forget step is:
vt = σ (W ei v .[hst t-1 , xt ] + biav ). (28) Estimation Step-3: The filtered output is displayed. At first,
hst t-1 and xt are passed through the sigmoid layer and current
where vt is the forget function, which looks at the previously cell state Ct is passed through tanh to finally compute the final
hidden state hst t-1 and current input xt to decide whether to output hstt of a single LSTM cell at the current time instant
keep or discard the stored data. as follows,
Estimation Step-2: In this step, the cell updates itself with
ou t = σ (W ei ou .[hst t-1 , xt ] + bia ou ), (32)
new data that it receives at each time step. The sigmoid layer
σ in a single LSTM cell will decide what new values to be hstt = ou t ∗ tanh(Ct ), (33)
added, then the new state C̃t that will be added to the old state n
1X
of the cell C t-1 is created by tanh activation function, which Er = (r eal − hstt )2 . (34)
2
only depends upon current input xt and hidden state hst t-1 . 1
i.e., where, W ei v , W ei in , W ei c , W ei ou , bia v bia in , bia c , bia ou are
the weights and biases of the neural network layer. While the
in t = σ (W ei in .[hst t-1 , xt ] + bia in ), (29) index v, in, c, and ou present the forget function, inputs, cell
C̃t = tanh(W ei c .[hst t-1 , xt ] + biac ), (30) state, and outputs, respectively. The mean square error Er is
computed using (34). At the start of the algorithm, the vectors
Ct = vt ∗ C t-1 + in t ∗ C̃t . (31) hstt and Ct are initialized to zero. Afterward, the weights
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5265
of the LSTM network are updated using a gradient descent The main aim of reinforcement learning is to find an optimal
algorithm that error is propagated backward through back- policy that maximizes the overall rewards accumulated over
propagation through the time algorithm [22]. The proposed time, which is,
framework is presented in Algorithm 1, where T D, R L, and
E S stand for the training data, learning rate, and estimated Q U* = max Q U (St, Ac). (38)
U
states, respectively.
By finding the optimal policy, the optimal action for the
B. Deep Reinforcement Learning given state can be founded as,
This paper adopts a deep deterministic policy gradient
(DDPG) to detect and mitigate CCAs using the smart DT Ac∗ = arg max Q ∗ (St, Ac). (39)
U
for V2G-CPSs. The DDPG can detect the variation in state
variables in a short time, which decreases the time to provide The amount of state information collected through sensors
countermeasures [48]. This reduces the chances of N − K in the V2G-CPS, including those estimated by the LSTM,
contingencies in the proposed smart DT for V2G-CPSs due to is massive, and therefore, the set of state space is enormous.
its inability to adopt the model-free approach and to model the Moreover, the dimension of the V2G-CPSs increases as the
dynamic state variables from the power system environment. system under consideration grows. As a result, the actions that
As mentioned earlier, we consider the WTs and V2G mode are needed for identifying the CCAs and mitigating them faster
as the reserve energy sources for the V2G-CPS. However, the cannot be achieved, despite the filtered states obtained through
adversary can tamper with the information about the available LSTM provided to the reinforcement learning algorithm.
V2G devices connected at the current time. This will cause Reaching an optimal policy through reinforcement learning
deviations in power availability. For this purpose, the agent in is not feasible, and algorithm convergence takes more time.
DRL observes the system state of V2G-CPS and decides either In this regard, we adopted an actor-critic-based DRL
to reroute the power from the RERs devices or do nothing in approach for finding optimal policies for state-action pairs.
case of false attacks. The proposed LSTM-DRL techniques for CCAs detection and
The energy accommodation in V2G-CPSs can be formulated mitigation work even for dynamic and extensive networks,
using the Markov decision process (MDP), where different and the agent can provide suitable action with a small delay.
constraints due to RERs and CCAs are considered. The MDP The actor-critic comprises fully connected neural networks
model is defined as a set of 5-tuple having different model in the LSTM-DRL algorithm, where the actor-network is
parameters such as (St, Ac, Pr, Re, γ ). Here, St denotes the used to learn the optimal action following the optimal policy
state space available for an agent, Ac is the set of possible Act = U (Stt′ |W i U ), while the critic network is used to find
actions, Pr is the transition probability between states, Re is optimal Q values for state and action pair Q(Stt′ , Act |W i Q ).
the reward for a state action pair, and γ is the discount factor. Here, W i U and W i Q stand for the weights associated with
At a certain time t, the state for the agent in the environment actor and critic networks, respectively, while Stt′ stands for the
are Stt = (Pt , Ik , V ′ , θ ′ ). Based on the filtered estimated states next expected state from the environment. The agent in LSTM-
V and θ obtain through LSTM and power Pt and current Ik DRL learns through exploration and exploitation. After an
that are taken in real-time, the agent takes an action to identify agent takes action, some award Ret is given to the respective
and mitigate CCAs in smart DT for V2G-CPSs. The action action, and the agent’s experience is stored in the memory
vector Ac = (P t,bus , I bus , Vc , θc , P RERs ), where Vc and θc replay buffer, which is,
stand for estimated correct states that are tampered with by the
adversary under FDIA or SA. If the tampered states show the Rm = {Stt′ , Act , Ret , St ′ t+1 }. (40)
behavior of SA, that is by monitoring abnormal fluctuations in
For learning purposes, a mini-batch from the replay buffer is
power and current level on attack buses, then, it is mitigated by
randomly selected to train the network. Moreover, the random
rerouting power from P RERs . The proposed algorithm detects
selection of batch from the data available in the replay memory
the nature of the attack from states available in action space
enhances the generalization capability of the algorithm. The
and mitigates it by rerouting the power from RERs. The state
overall objective function of the algorithm is,
transition from Stt to St t+1 can be represented as,
n
St t+1 = f (Stt , Act ). (35) X
R Et = γ t Ret , (41)
The reward for a state action pair is, t=0
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
5266 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 18, 2023
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5267
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
5268 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 18, 2023
launches an SA at a circuit breaker installed on the bus that C. Mitigating N − K Contingencies Under CCAs Using
connects G1 to the V2G-CPSs at 9 sec and disconnects the LSTM-DRL Based Smart DT for V2G-CPSs
major source of power from the network as shown in Fig.6(a). This study adopts a sophisticated LSTM-DRL to mitigate
As G1 gets tripped, all the demand is distributed among other CCAs leading to N − K contingencies. The system operates
buses. Now, the generation capacity falls by 1000MW, and under the proposed LSTM-DRL-based smart DT for V2G-
Ac G(t) will now be 2000MW. In addition, the adversary does CPSs during N − K contingencies, which are due to CCAs
not stop at that, and trips G4 using SA at 9.5 sec, as shown in and high load, as shown in Fig. 8. As mentioned earlier, a SAs
Fig.6(b), however, as the demand is much more than the actual happens at 8 sec, due to which G1 trips. This makes the actual
generation and to save the generator from getting damaged, demand more than the actual generation and variation in power
the protective system gets activated and trips G7 at 10 sec, profile is observed in Fig.6. However, the adversary further
and all other generation sources afterward. This ultimately launches another SA to trip G2 and the period of attack will
causes N − K contingencies that lead to blackout between continue till a blackout occurs. These actual demand variations
9 sec and 12 sec, as shown in Fig.6. It is depicted in Fig. 6 ultimately induce P need (t) in the power system. The agent in
that the adversary maintained the SA for almost 3 sec, but LSTM-DRL algorithm monitors these variations in the state
when the SA is removed, the system stabilizes within 3 sec, parameters. As a result, the agent takes the corresponding
but the blackout is still present from 9 sec to 12 sec. The actions to mitigate SAs by routing the reserve from WTs
variation in power profile after 12 sec is all due to unbalanced and V2G devices to make up the extra power needed by the
demand distribution. V2G-CPSs, and these mitigating actions satisfy the network
The current profile at respective buses during FDIAs and constraints in check within 3 sec, as shown in Fig. 8. The
under SAs can be observed in Fig. 7. The maximum current power from RERs will provide the backup unless the CCA is
limits for the transmission lines are 13 A. However, the not fully taken care of. Furthermore, it is observed from Fig. 8
adversary communicates false information about the network’s that V2G-CPS restores to its original state when the SAs are
current thresholds overshoot, that is normal current values countered at 14 sec.
are communicated to the operator that prevents the operator To demonstrate how effectively the proposed LSTM-DRL
from taking appropriate action, and at the same time SAs are algorithm mitigates the N − K contingencies, we compare the
initiated due to which G1 gets tripped at 6 sec, as shown in proposed algorithm with the algorithm in [25], which uses
Fig.7(a). In addition to the current thresholds, the adversary a MAS to mitigate the N − K contingencies. The algorithm
also tampered with the power availability due to V2G device’s proposed in [25] provided several combinations for individual
connectivity to the system. As a result, the operator is not lines to prevent N − K contingencies, but it took time to miti-
able to balance the demand requirements and current profile gate them, as shown in Fig. 9(a). When two transmission lines
overshoots due to which G4 trips at 9 sec and G7 at 10 sec, get tripped due to faults, the current profile on the other lines
as shown in Fig.7(a) and Fig.7(b), respectively. exceeds their current-carrying limit. The algorithm in [25]
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5269
VI. C ONCLUSION
In this paper, a comprehensive smart DT-enabled security
framework for V2G-CPSs has been presented. The LSTM-
DRL techniques have been incorporated into the proposed
framework to detect and mitigate CCAs in V2G-CPSs. In pres-
ence of CCAs, the actual system states have been estimated
through the LSTM algorithm, which is further fed into the
DRL network to identify the nature of CCAs. Moreover,
the proposed LSTM-DRL method has the ability to identify
Fig. 8. N − K contingency mitigation under proposed LSTM-DRL algorithm. malicious V2G nodes and recover the actual power availability
of V2G devices connected. In the case studies, various CCA
cases, including SA, FDIA, and combined were considered to
demonstrate the effectiveness and practicality of the proposed
framework. The results show that even a simple CCA is able
to cause N − K contingencies if it is not tackled in time, and
consequently, may lead to a potential blackout in the network.
The proposed smart DT-based framework can detect the CCAs
in time, and mitigate them by rerouting the power from WTs
and V2G nodes connected to the V2G-CPSs while keeping the
network constraints in check. In future, we will be extending
this work to more extensive network i.e, IEEE 118 or 300 bus
system and will also implement it on real network to show the
generalization capability of proposed algorithm.
R EFERENCES
[1] Y. Liu, H. Xin, Z. Qu, and D. Gan, “An attack-resilient cooperative con-
trol strategy of multiple distributed generators in distribution networks,”
IEEE Trans. Smart Grid, vol. 7, no. 6, pp. 2923–2932, Nov. 2016.
[2] W.-T. Li, C.-K. Wen, J.-C. Chen, K.-K. Wong, J.-H. Teng, and C. Yuen,
“Location identification of power line outages using PMU measurements
with bad data,” IEEE Trans. Power Syst., vol. 31, no. 5, pp. 3624–3635,
Sep. 2016.
[3] C. Zhao, J. He, P. Cheng, and J. Chen, “Consensus-based energy
management in smart grid with transmission losses and directed com-
munication,” IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2049–2061,
Sep. 2017.
[4] A. A. Babalola, R. Belkacemi, S. Zarrabian, and R. Craven, “Adap-
Fig. 9. Comparison between the proposed LSTM-DRL algorithm and tive immune system reinforcement learning-based algorithm for real-
MAS [25]. time cascading failures prevention,” Eng. Appl. Artif. Intell., vol. 57,
pp. 118–133, Jan. 2017.
[5] A. Monticelli, “Electric power system state estimation,” Proc. IEEE,
makes the current profile on an overloaded line return to its vol. 88, no. 2, pp. 262–282, Feb. 2000.
original state, but it takes 30 seconds to do so. Furthermore, [6] R. Deng, P. Zhuang, and H. Liang, “False data injection attacks against
state estimation in power distribution systems,” IEEE Trans. Smart Grid,
the algorithm did not provide any countermeasures for when vol. 10, no. 3, pp. 2871–2881, May 2019.
CCAs fall on the network. In contrast, the proposed LSTM- [7] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
DRL algorithm keeps the current profiles within their threshold state estimation in electric power grids,” ACM Trans. Inf. Syst. Secur.,
limits. At 5 seconds, CCA happens in the network, due to vol. 14, no. 1, pp. 1–33, May 2011.
[8] G. Hug and J. A. Giampapa, “Vulnerability assessment of AC state
which G1 gets tripped and the load distribution is disturbed. estimation with respect to false data injection cyber-attacks,” IEEE
As a result, N − K contingency occurs in the V2G-CPS as Trans. Smart Grid, vol. 3, no. 3, pp. 1362–1370, Sep. 2012.
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
5270 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 18, 2023
[9] R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, “False [31] A. A. Saad, S. Faddel, and O. Mohammed, “A secured distributed control
data injection on state estimation in power systems—Attacks, impacts, system for future interconnected smart grids,” Appl. Energy, vol. 243,
and defense: A survey,” IEEE Trans. Ind. Informat., vol. 13, no. 2, pp. 57–70, Jun. 2019.
pp. 411–423, Apr. 2017. [32] N. M. Dehkordi and S. Z. Moussavi, “Distributed resilient adaptive
[10] R. Deng and H. Liang, “False data injection attacks with limited control of islanded microgrids under sensor/actuator faults,” IEEE Trans.
susceptance information and new countermeasures in smart grid,” IEEE Smart Grid, vol. 11, no. 3, pp. 2699–2708, May 2020.
Trans. Ind. Informat., vol. 15, no. 3, pp. 1619–1628, Mar. 2019. [33] S. Abhinav, H. Modares, F. L. Lewis, F. Ferrese, and A. Davoudi,
[11] J. Zhang, Z. Chu, L. Sankar, and O. Kosut, “False data injection attacks “Synchrony in networked microgrids under attacks,” IEEE Trans. Smart
on power system state estimation with limited information,” in Proc. Grid, vol. 9, no. 6, pp. 6731–6741, Nov. 2018.
IEEE Power Energy Soc. Gen. Meeting (PESGM), Jul. 2016, pp. 1–5. [34] A. H. Khan et al., “Blockchain and 6G: The future of secure and
[12] Y. Isozaki et al., “Detection of cyber attacks against voltage control in ubiquitous communication,” IEEE Wireless Commun., vol. 29, no. 1,
distribution power grids with PVs,” IEEE Trans. Smart Grid, vol. 7, pp. 194–201, Feb. 2022.
no. 4, pp. 1824–1835, Jul. 2016. [35] B. Chen, S. Mashayekh, K. L. Butler-Purry, and D. Kundur, “Impact of
cyber attacks on transient stability of smart grids with voltage support
[13] A. Saad, S. Faddel, T. Youssef, and O. A. Mohammed, “On the
devices,” in Proc. IEEE Power Energy Soc. Gen. Meeting, Jul. 2013,
implementation of IoT-based digital twin for networked microgrids
pp. 1–5.
resiliency against cyber attacks,” IEEE Trans. Smart Grid, vol. 11, no. 6,
pp. 5138–5150, Nov. 2020. [36] M. Blanke, M. Kinnaert, J. Lunze, M. Staroswiecki, and J. Schröder,
Diagnosis and Fault-Tolerant Control, vol. 2. Berlin, Germany: Springer,
[14] G. Chaojun, P. Jirutitijaroen, and M. Motani, “Detecting false data 2006.
injection attacks in AC state estimation,” IEEE Trans. Smart Grid, vol. 6, [37] X. Yu and C. Singh, “A practical approach for integrated power system
no. 5, pp. 2476–2483, Sep. 2015. vulnerability analysis with protection failures,” IEEE Trans. Power Syst.,
[15] A. Chattopadhyay, A. Ukil, D. Jap, and S. Bhasin, “Toward threat vol. 19, no. 4, pp. 1811–1820, Nov. 2004.
of implementation attacks on substation security: Case study on fault [38] C. Liu, K. T. Chau, D. Wu, and S. Gao, “Opportunities and challenges of
detection and isolation,” IEEE Trans. Ind. Informat., vol. 14, no. 6, vehicle-to-home, vehicle-to-vehicle, and vehicle-to-grid technologies,”
pp. 2442–2451, Jun. 2018. Proc. IEEE, vol. 101, no. 11, pp. 2409–2427, Nov. 2013.
[16] S. Chakrabarty and B. Sikdar, “Detection of hidden transformer tap [39] Y. Zhang, J. Wang, and Z. Li, “Interval state estimation with uncertainty
change command attacks in transmission networks,” IEEE Trans. Smart of distributed generation and line parameters in unbalanced distribu-
Grid, vol. 11, no. 6, pp. 5161–5173, Nov. 2020. tion systems,” IEEE Trans. Power Syst., vol. 35, no. 1, pp. 762–772,
[17] L. Che, X. Liu, Z. Li, and Y. Wen, “False data injection attacks induced Jan. 2020.
sequential outages in power systems,” IEEE Trans. Power Syst., vol. 34, [40] G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of
no. 2, pp. 1513–1523, Mar. 2019. false data injection attacks against modern power systems,” IEEE Trans.
[18] T. Aziz, N.-A. Masood, S. R. Deeba, W. Tushar, and C. Yuen, Smart Grid, vol. 8, no. 4, pp. 1630–1638, Jul. 2017.
“A methodology to prevent cascading contingencies using BESS in [41] M. Ali, M. Adnan, M. Tariq, and H. V. Poor, “Load forecasting through
a renewable integrated microgrid,” Int. J. Electr. Power Energy Syst., estimated parametrized based fuzzy inference system in smart grids,”
vol. 110, pp. 737–746, Sep. 2019. IEEE Trans. Fuzzy Syst., vol. 29, no. 1, pp. 156–165, Jan. 2021.
[19] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, “Malicious data attacks [42] Y. Zhang, J. Wang, and B. Chen, “Detecting false data injection attacks
on the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658, in smart grids: A semi-supervised deep learning approach,” IEEE Trans.
Dec. 2011. Smart Grid, vol. 12, no. 1, pp. 623–634, Jan. 2021.
[20] D. B. Rawat and C. Bajracharya, “Detection of false data injection [43] H.-M. Chung, W.-T. Li, C. Yuen, W.-H. Chung, Y. Zhang, and
attacks in smart grid communication systems,” IEEE Signal Process. C.-K. Wen, “Local cyber-physical attack for masking line outage and
Lett., vol. 22, no. 10, pp. 1652–1656, Oct. 2015. topology attack in smart grid,” IEEE Trans. Smart Grid, vol. 10, no. 4,
pp. 4577–4588, Jul. 2019.
[21] R. Xu, R. Wang, Z. Guan, L. Wu, J. Wu, and X. Du, “Achieving efficient [44] A. K. Farraj and D. Kundur, “On using energy storage systems in
detection against false data injection attacks in smart grid,” IEEE Access, switching attacks that destabilize smart grid systems,” in Proc. IEEE
vol. 5, pp. 13787–13798, 2017. Power Energy Soc. Innov. Smart Grid Technol. Conf. (ISGT), Feb. 2015,
[22] M. Tariq, M. Ali, F. Naeem, and H. V. Poor, “Vulnerability assessment pp. 1–5.
of 6G-enabled smart grid cyber-physical systems,” IEEE Internet Things [45] J. Qi, A. Hahn, X. Lu, J. Wang, and C. Liu, “Cybersecurity for
J., vol. 8, no. 7, pp. 5468–5475, Apr. 2021. distributed energy resources and smart inverters,” IET Cyber-Phys. Syst.,
[23] R. J. R. Kumar and B. Sikdar, “Efficient detection of false data injection Theory Appl., vol. 1, no. 1, pp. 28–39, Dec. 2016.
attacks on AC state estimation in smart grids,” in Proc. IEEE Conf. [46] H. Suleiman, I. Alqassem, A. Diabat, E. Arnautovic, and D. Svetinovic,
Commun. Netw. Secur. (CNS), Oct. 2017, pp. 411–415. “Integrated smart grid systems security threat model,” Inf. Syst., vol. 53,
[24] R. Deng, P. Zhuang, and H. Liang, “CCPA: Coordinated cyber-physical pp. 147–160, Oct. 2015.
attacks and countermeasures in smart grid,” IEEE Trans. Smart Grid, [47] N. Sahani, R. Zhu, J.-H. Cho, and C.-C. Liu, “Machine learning-based
vol. 8, no. 5, pp. 2420–2430, Sep. 2017. intrusion detection for smart grid computing: A survey,” ACM Trans.
[25] A. A. Babalola, R. Belkacemi, and S. Zarrabian, “Real-time cascading Cyber-Phys. Syst., vol. 7, no. 2, pp. 1–31, Apr. 2023.
failures prevention for multiple contingencies in smart grids through a [48] L. Lin, X. Guan, B. Hu, J. Li, N. Wang, and D. Sun, “Deep reinforcement
multi-agent system,” IEEE Trans. Smart Grid, vol. 9, no. 1, pp. 373–385, learning and LSTM for optimal renewable energy accommodation in 5G
Jan. 2018. Internet of Energy with bad data tolerant,” Comput. Commun., vol. 156,
[26] S. Sahoo and S. Mishra, “An adaptive event-triggered communication- pp. 46–53, Apr. 2020.
based distributed secondary control for DC microgrids,” IEEE Trans.
Smart Grid, vol. 9, no. 6, pp. 6674–6683, Nov. 2018.
[27] M. Rahnamay-Naeini, Z. Wang, N. Ghani, A. Mammoli, and
M. M. Hayat, “Stochastic analysis of cascading-failure dynamics in
Mansoor Ali (Member, IEEE) received the B.S.
power grids,” IEEE Trans. Power Syst., vol. 29, no. 4, pp. 1767–1779,
degree in electrical engineering from the National
Jul. 2014.
University of Computer and Emerging Sciences
[28] M. B. Mollah et al., “Blockchain for the Internet of Vehicles towards (NUCES), Pakistan, in 2013, the M.S. degree
intelligent transportation systems: A survey,” IEEE Internet Things J., in electrical engineering from CECOS University,
vol. 8, no. 6, pp. 4157–4185, Mar. 2021. Peshawar, Pakistan, in 2016, and the Ph.D. degree
[29] D. Zhang, L. Liu, and G. Feng, “Consensus of heterogeneous linear in electrical engineering from NUCES in 2020. Cur-
multiagent systems subject to aperiodic sampled-data and DoS attack,” rently, he is a Post-Doctoral Research Fellow with
IEEE Trans. Cybern., vol. 49, no. 4, pp. 1501–1511, Apr. 2019. the Electrical Engineering Department, École de
[30] L. Meng, T. Dragicevic, J. Roldán-Pérez, J. C. Vasquez, and Technologie Supérieure (ÉTS), University of Que-
J. M. Guerrero, “Modeling and sensitivity study of consensus algorithm- bec, Montreal, Canada. His current research interests
based distributed hierarchical control for DC microgrids,” IEEE Trans. include load forecasting in power system networks, fuzzy control, smart grids,
Smart Grid, vol. 7, no. 3, pp. 1504–1515, May 2016. security and privacy for cyber-physical systems, and digital twins.
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.
ALI et al.: SMART DT ENABLED SECURITY FRAMEWORK FOR V2G CYBER-PHYSICAL SYSTEMS 5271
Georges Kaddoum (Senior Member, IEEE) Chau Yuen (Fellow, IEEE) received the B.Eng. and
received the bachelor’s degree in electrical Ph.D. degrees from Nanyang Technological Uni-
engineering from École Nationale Supérieure de versity, Singapore, in 2000 and 2004, respectively.
Techniques Avancées (ENSTA Bretagne), Brest, He was a Post-Doctoral Fellow with Lucent Tech-
France, the M.S. degree in telecommunications nologies Bell Labs, Murray Hill, in 2005, and a
and signal processing (circuits, systems, and Visiting Assistant Professor with The Hong Kong
signal processing) from Université de Bretagne Polytechnic University in 2008. From 2006 to 2010,
Occidentale and Telecom Bretagne (ENSTB), he was with the Institute for Infocomm Research,
Brest, in 2005, and the Ph.D. degree (Hons.) in Singapore. From 2010 to 2023, he was with the
signal processing and telecommunications from Engineering Product Development Pillar, Singapore
the National Institute of Applied Sciences (INSA), University of Technology and Design. Since 2023,
University of Toulouse, Toulouse, France, in 2009. He is currently a Professor he has been with the School of Electrical and Electronic Engineering, Nanyang
and the Tier 2 Canada Research Chair with École de Technologie Supérieure Technological University. He has three U.S. patents and published more than
(ÉTS), Université du Québec, Montreal, Canada, and a Faculty Fellow with 500 research papers in international journals or conferences. He received the
the Cyber Security Systems and Applied AI Research Center, Lebanese IEEE ICC Best Paper Award in 2023, the IEEE Communications Society Fred
American University. Since 2010, he has been a scientific consultant in the W. Ellersick Prize in 2023, the IEEE Marconi Prize Paper Award in Wireless
field of space and wireless telecommunications for several U.S. and Canadian Communications in 2021, and EURASIP Best Paper Award for Journal on
companies. He has published more than 300 journals, conference papers, Wireless Communications and Networking in 2021. He was a recipient of
two chapters in books, and has eight pending patents. His current research the Lee Kuan Yew Gold Medal, the Institution of Electrical Engineers Book
interests include wireless communication networks, tactical communications, Prize, the Institute of Engineering of Singapore Gold Medal, the Merck Sharp
resource allocations, and security. In 2014, he was awarded the TS Research and Dohme Gold Medal, and twice a recipient of the Hewlett Packard Prize.
Chair of Physical-Layer Security for Wireless Networks. He received He received the IEEE Asia–Pacific Outstanding Young Researcher Award
the best papers awards at the 2014 IEEE International Conference on in 2012 and the IEEE VTS Singapore Chapter Outstanding Service Award
Wireless and Mobile Computing, Networking, and Communications, with in 2019. He is a Distinguished Lecturer of the IEEE Vehicular Technology
three coauthors, and the 2017 IEEE International Symposium on Personal Society, the Top 2% Scientists by Stanford University, and a Highly Cited
Indoor and Mobile Radio Communications, with four coauthors. Moreover, Researcher by Clarivate Web of Science.
he received the IEEE T RANSACTIONS ON C OMMUNICATIONS Exemplary
Reviewer Award in 2015, 2017, and 2019. In addition, he received the Muhammad Tariq (Senior Member, IEEE) received
Research Excellence Award of the Université du Québec in 2018. In 2019, the M.Sc. degree from Hanyang University, Seoul,
he received the Research Excellence Award from ÉTS in recognition of his South Korea, and the Ph.D. degree from Waseda
outstanding research outcomes. Finally, he received the IEEE TCSC Award University, Japan, in 2012. He was the Campus
for Excellence in Scalable Computing in 2022. He is currently serving as Director of the National University of Computer
an Area Editor for the IEEE T RANSACTIONS ON M ACHINE L EARNING IN and Emerging Sciences, Islamabad, Pakistan. His
C OMMUNICATIONS AND N ETWORKING and an Associate Editor for IEEE academic journey includes a Fulbright Scholarship
T RANSACTIONS ON I NFORMATION F ORENSICS AND S ECURITY, IEEE sponsored by a Post-Doctoral Fellowship at Prince-
T RANSACTIONS ON C OMMUNICATIONS, and IEEE C OMMUNICATIONS ton University in 2016, under the mentorship of Prof.
L ETTERS. H. Vincent Poor. He received the HEC Scholarship
for the M.Sc. degree and the Japanese Government
(MEXT) Scholarship for the Ph.D. degree. He is currently a Professor and
the Head of the Department of Electrical Engineering, National University of
Computer and Emerging Sciences. His distinguished academic and research
contributions are exemplified by his authorship or coauthorship of more than
80 research articles, boasting a cumulative impact factor exceeding 320.
His outstanding accomplishments have been acknowledged through numerous
awards. As a testament to his global impact, he collaborated with esteemed
researchers from Europe, China, Japan, and the USA to co-author a seminal
book on smart grids. The reach of his work extends across international
borders, as evidenced by his role as a guest, an invited, and a keynote speaker.
He has delivered research talks at prestigious forums and universities situated
in Pakistan, China, Saudi Arabia, and the USA.
Authorized licensed use limited to: EASWARI COLLEGE OF ENGINEERING. Downloaded on April 01,2024 at 03:13:09 UTC from IEEE Xplore. Restrictions apply.