Skip to main content

Showing 1–11 of 11 results for author: Maple, C

Searching in archive eess. Search in all archives.
.
  1. arXiv:2404.10520  [pdf, ps, other

    eess.SY

    A Game-Theoretic Approach for PMU Deployment Against False Data Injection Attacks

    Authors: Sajjad Maleki, Subhash Lakshminarayana, E. Veronica Belmega, Carsten Maple

    Abstract: Phasor Measurement Units (PMUs) are used in the measurement, control and protection of power grids. However, deploying PMUs at every bus in a power system is prohibitively expensive, necessitating partial PMU placement that can ensure system observability with minimal units. One consequence of this economic approach is increased system vulnerability to False Data Injection Attacks (FDIAs). This pa… ▽ More

    Submitted 18 April, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

  2. arXiv:2310.18820  [pdf, other

    cs.CR cs.IT eess.SY

    Demand-Side Threats to Power Grid Operations from IoT-Enabled Edge

    Authors: Subhash Lakshminarayana, Carsten Maple, Andrew Larkins, Daryl Flack, Christopher Few, Anurag. K. Srivastava

    Abstract: The growing adoption of Internet-of-Things (IoT)-enabled energy smart appliances (ESAs) at the consumer end, such as smart heat pumps, electric vehicle chargers, etc., is seen as key to enabling demand-side response (DSR) services. However, these smart appliances are often poorly engineered from a security point of view and present a new threat to power grid operations. They may become convenient… ▽ More

    Submitted 28 October, 2023; originally announced October 2023.

  3. arXiv:2209.02809  [pdf, other

    cs.CR eess.SY

    Localizing Load-Altering Attacks Against Power Grids Using Deep Capsule Nets

    Authors: Hamidreza Jahangir, Subhash Lakshminarayana, Carsten Maple

    Abstract: Recent research has shown that the security of power grids can be seriously threatened by botnet-type cyber attacks that target a large number of high-wattage smart electrical appliances owned by end-users. Accurate detection and localization of such attacks is of critical importance in limiting the damage. To this end, the paper proposes a novel technique using capsule networks (CNs) tailored to… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  4. arXiv:2110.00667  [pdf, ps, other

    eess.SY cs.CR cs.IT

    Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids

    Authors: Subhash Lakshminarayana, Saurav Sthapit, Hamidreza Jahangir, Carsten Maple, H Vincent Poor

    Abstract: Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large-scale IoT-based load-altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification of any compromised nodes are essential to minimise… ▽ More

    Submitted 22 March, 2022; v1 submitted 1 October, 2021; originally announced October 2021.

  5. arXiv:2107.03762  [pdf, ps, other

    eess.SY

    A Comparison of Data-Driven Techniques for Power Grid Parameter Estimation

    Authors: Subhash Lakshminarayana, Saurav Sthapit, Carsten Maple

    Abstract: Power grid parameter estimation involves the estimation of unknown parameters, such as inertia and dam** coefficients, using observed dynamics. In this work, we present a comparison of data-driven algorithms for the power grid parameter estimation problem. First, we propose a new algorithm to solve the parameter estimation problem based on the Sparse Identification of Nonlinear Dynamics (SINDy)… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

  6. arXiv:2012.11524  [pdf, other

    cs.LG eess.SY

    A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations

    Authors: Yexiang Chen, Subhash Lakshminarayana, Carsten Maple, H. Vincent Poor

    Abstract: Recently, there has been a surge of interest in adopting deep neural networks (DNNs) for solving the optimal power flow (OPF) problem in power systems. Computing optimal generation dispatch decisions using a trained DNN takes significantly less time when compared to using conventional optimization solvers. However, a major drawback of existing work is that the machine learning models are trained f… ▽ More

    Submitted 27 September, 2021; v1 submitted 21 December, 2020; originally announced December 2020.

  7. arXiv:2009.13352  [pdf, other

    cs.CR cs.IT eess.SY

    Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems

    Authors: Subhash Lakshminarayana, Sondipon Adhikari, Carsten Maple

    Abstract: Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid's control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load altering attacks (S/DLAAs) on the power grid's dynamic re… ▽ More

    Submitted 28 March, 2021; v1 submitted 28 September, 2020; originally announced September 2020.

    Journal ref: IEEE Trans. on Smart Grids, 2021

  8. arXiv:2006.14890  [pdf

    cs.CR cs.CY cs.RO eess.SY

    CyRes -- Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract)

    Authors: Carsten Maple, Peter Davies, Kerstin Eder, Chris Hankin, Greg Chance, Gregory Epiphaniou

    Abstract: Existing approaches to cyber security and regulation in the automotive sector cannot achieve the quality of outcome necessary to ensure the safe mass deployment of advanced vehicle technologies and smart mobility systems. Without sustainable resilience hard-fought public trust will evaporate, derailing emerging global initiatives to improve the efficiency, safety and environmental impact of future… ▽ More

    Submitted 3 July, 2020; v1 submitted 26 June, 2020; originally announced June 2020.

    Comments: 7 pages, extended abstract

    ACM Class: K.4.4; K.6.5

  9. arXiv:2005.04731  [pdf

    cs.NI eess.SP

    Fogbanks: Future Dynamic Vehicular Fog Banks for Processing, Sensing and Storage in 6G

    Authors: A. A. Alahmadi, M. O. I. Musa, T. E. H. El-Gorashi, J. M. H. Elmirghani, S. Grant-Muller, D. Hutchison, A. Mauthe, M. Dianati, C. Maple, L. Lefevre, A. Lason

    Abstract: Fixed edge processing has become a key feature of 5G networks, while playing a key role in reducing latency, improving energy efficiency and introducing flexible compute resource utilization on-demand with added cost savings. Autonomous vehicles are expected to possess significantly more on-board processing capabilities and with improved connectivity. Vehicles continue to be used for a fraction of… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

  10. arXiv:1908.01146  [pdf, other

    cs.LG eess.SY stat.ML

    Develo** an Unsupervised Real-time Anomaly Detection Scheme for Time Series with Multi-seasonality

    Authors: Wentai Wu, Ligang He, Weiwei Lin, Yi Su, Yuhua Cui, Carsten Maple, Stephen Jarvis

    Abstract: On-line detection of anomalies in time series is a key technique used in various event-sensitive scenarios such as robotic system monitoring, smart sensor networks and data center security. However, the increasing diversity of data sources and the variety of demands make this task more challenging than ever. Firstly, the rapid increase in unlabeled data means supervised learning is becoming less s… ▽ More

    Submitted 23 April, 2021; v1 submitted 3 August, 2019; originally announced August 2019.

    Comments: 14 pages, 11 figures. IEEE Transactions on Knowledge and Data Engineering (2020)

  11. arXiv:1904.01551  [pdf

    cs.CR cs.NI eess.SY

    A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape

    Authors: Uchenna D Ani, Jeremy D McK. Watson, Jason R. C. Nurse, Al Cook, Carsten Maple

    Abstract: As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infrastructures (CNI), new cybersecurity threats emerge that require specific security solutions. Approaches used for analysis include the modelling and simulation of critical infrastructure systems using attributes, functionalities, operations, and behaviours to support various security analysis viewpoi… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT 2019