Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems

This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly gui...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Xiao, Qi, Song, Lidong, Woo, Jongha, Hu, Rongxing, Xu, Bei, Ye, Kai, Lu, Ning
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Xiao, Qi
Song, Lidong
Woo, Jongha
Hu, Rongxing
Xu, Bei
Ye, Kai
Lu, Ning
description This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly guide the engineering system toward a predetermined operational state without detection. Using the battery energy management system (BEMS) as a case study, we employ deep reinforcement learning (DRL) to generate synthetic measurements, such as battery voltage and current, that align closely with actual measurements. These synthetic measurements, falling within the acceptable error margin of residual-based bad data detection algorithm provided by state estimation, can evade detection and mislead Extended Kalman-filter-based State of Charge estimation. Subsequently, considering the deceptive data as valid inputs, the BEMS will operate the BESS towards the attacker desired operational states when the targeted time period come. The use of the DRL-based scheme allows us to covert an online optimization problem into an offline training process, thereby alleviating the computational burden for real-time implementation. Comprehensive testing on a high-fidelity microgrid real-time simulation testbed validates the effectiveness and adaptability of the proposed methods in achieving different attack objectives.
doi_str_mv 10.48550/arxiv.2410.17402
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2410_17402</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2410_17402</sourcerecordid><originalsourceid>FETCH-arxiv_primary_2410_174023</originalsourceid><addsrcrecordid>eNqFjs0OwUAUhWdjIXgAK_MCaGnD1k-FhI3aN1ddNTG9auZqzNtry97qJCfnO_mE6PveKJiHoTcG81blaBJUhT8LvElbPHdUKqvOGuUBSBUvDaweJNeIhTyiouvDpJgjsdwjGFKUyYhuQCleZMwImm9OLpghvVtZgUtgRuOqEZrM1aeQffnYWcbcdkXrCtpi75cdMdhEp9V22MglhVE5GJfUkkkjOf2_-ADGykk_</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems</title><source>arXiv.org</source><creator>Xiao, Qi ; Song, Lidong ; Woo, Jongha ; Hu, Rongxing ; Xu, Bei ; Ye, Kai ; Lu, Ning</creator><creatorcontrib>Xiao, Qi ; Song, Lidong ; Woo, Jongha ; Hu, Rongxing ; Xu, Bei ; Ye, Kai ; Lu, Ning</creatorcontrib><description>This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly guide the engineering system toward a predetermined operational state without detection. Using the battery energy management system (BEMS) as a case study, we employ deep reinforcement learning (DRL) to generate synthetic measurements, such as battery voltage and current, that align closely with actual measurements. These synthetic measurements, falling within the acceptable error margin of residual-based bad data detection algorithm provided by state estimation, can evade detection and mislead Extended Kalman-filter-based State of Charge estimation. Subsequently, considering the deceptive data as valid inputs, the BEMS will operate the BESS towards the attacker desired operational states when the targeted time period come. The use of the DRL-based scheme allows us to covert an online optimization problem into an offline training process, thereby alleviating the computational burden for real-time implementation. Comprehensive testing on a high-fidelity microgrid real-time simulation testbed validates the effectiveness and adaptability of the proposed methods in achieving different attack objectives.</description><identifier>DOI: 10.48550/arxiv.2410.17402</identifier><language>eng</language><subject>Computer Science - Systems and Control</subject><creationdate>2024-10</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2410.17402$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2410.17402$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Xiao, Qi</creatorcontrib><creatorcontrib>Song, Lidong</creatorcontrib><creatorcontrib>Woo, Jongha</creatorcontrib><creatorcontrib>Hu, Rongxing</creatorcontrib><creatorcontrib>Xu, Bei</creatorcontrib><creatorcontrib>Ye, Kai</creatorcontrib><creatorcontrib>Lu, Ning</creatorcontrib><title>Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems</title><description>This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly guide the engineering system toward a predetermined operational state without detection. Using the battery energy management system (BEMS) as a case study, we employ deep reinforcement learning (DRL) to generate synthetic measurements, such as battery voltage and current, that align closely with actual measurements. These synthetic measurements, falling within the acceptable error margin of residual-based bad data detection algorithm provided by state estimation, can evade detection and mislead Extended Kalman-filter-based State of Charge estimation. Subsequently, considering the deceptive data as valid inputs, the BEMS will operate the BESS towards the attacker desired operational states when the targeted time period come. The use of the DRL-based scheme allows us to covert an online optimization problem into an offline training process, thereby alleviating the computational burden for real-time implementation. Comprehensive testing on a high-fidelity microgrid real-time simulation testbed validates the effectiveness and adaptability of the proposed methods in achieving different attack objectives.</description><subject>Computer Science - Systems and Control</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNqFjs0OwUAUhWdjIXgAK_MCaGnD1k-FhI3aN1ddNTG9auZqzNtry97qJCfnO_mE6PveKJiHoTcG81blaBJUhT8LvElbPHdUKqvOGuUBSBUvDaweJNeIhTyiouvDpJgjsdwjGFKUyYhuQCleZMwImm9OLpghvVtZgUtgRuOqEZrM1aeQffnYWcbcdkXrCtpi75cdMdhEp9V22MglhVE5GJfUkkkjOf2_-ADGykk_</recordid><startdate>20241022</startdate><enddate>20241022</enddate><creator>Xiao, Qi</creator><creator>Song, Lidong</creator><creator>Woo, Jongha</creator><creator>Hu, Rongxing</creator><creator>Xu, Bei</creator><creator>Ye, Kai</creator><creator>Lu, Ning</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20241022</creationdate><title>Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems</title><author>Xiao, Qi ; Song, Lidong ; Woo, Jongha ; Hu, Rongxing ; Xu, Bei ; Ye, Kai ; Lu, Ning</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-arxiv_primary_2410_174023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science - Systems and Control</topic><toplevel>online_resources</toplevel><creatorcontrib>Xiao, Qi</creatorcontrib><creatorcontrib>Song, Lidong</creatorcontrib><creatorcontrib>Woo, Jongha</creatorcontrib><creatorcontrib>Hu, Rongxing</creatorcontrib><creatorcontrib>Xu, Bei</creatorcontrib><creatorcontrib>Ye, Kai</creatorcontrib><creatorcontrib>Lu, Ning</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xiao, Qi</au><au>Song, Lidong</au><au>Woo, Jongha</au><au>Hu, Rongxing</au><au>Xu, Bei</au><au>Ye, Kai</au><au>Lu, Ning</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems</atitle><date>2024-10-22</date><risdate>2024</risdate><abstract>This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly guide the engineering system toward a predetermined operational state without detection. Using the battery energy management system (BEMS) as a case study, we employ deep reinforcement learning (DRL) to generate synthetic measurements, such as battery voltage and current, that align closely with actual measurements. These synthetic measurements, falling within the acceptable error margin of residual-based bad data detection algorithm provided by state estimation, can evade detection and mislead Extended Kalman-filter-based State of Charge estimation. Subsequently, considering the deceptive data as valid inputs, the BEMS will operate the BESS towards the attacker desired operational states when the targeted time period come. The use of the DRL-based scheme allows us to covert an online optimization problem into an offline training process, thereby alleviating the computational burden for real-time implementation. Comprehensive testing on a high-fidelity microgrid real-time simulation testbed validates the effectiveness and adaptability of the proposed methods in achieving different attack objectives.</abstract><doi>10.48550/arxiv.2410.17402</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2410.17402
ispartof
issn
language eng
recordid cdi_arxiv_primary_2410_17402
source arXiv.org
subjects Computer Science - Systems and Control
title Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T08%3A57%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Invisible%20Manipulation%20Deep%20Reinforcement%20Learning%20Enhanced%20Stealthy%20Attacks%20on%20Battery%20Energy%20Management%20Systems&rft.au=Xiao,%20Qi&rft.date=2024-10-22&rft_id=info:doi/10.48550/arxiv.2410.17402&rft_dat=%3Carxiv_GOX%3E2410_17402%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true