Skip to main content

ORIGINAL RESEARCH article

Front. Comput. Neurosci., 14 April 2022
This article is part of the Research Topic Towards Neuroscience-Inspired Intelligent Computing: Theory, Methods, and Applications View all 11 articles

An Adaptive Information Security System for 5G-Enabled Smart Grid Based on Artificial Neural Network and Case-Based Learning Algorithms

\nChengzhi Jiang,
Chengzhi Jiang1,2*Hao Xu,
Hao Xu1,2*Chuanfeng HuangChuanfeng Huang1Qiwei HuangQiwei Huang1
  • 1School of Economics and Management, Nanjing Institute of Technology, Nanjing, China
  • 2School of Information Management, Nanjing University, Nanjing, China

With the deployment of 5G Internet of Things (IoT) in the power system, the efficiency of smart grid is improved by increasing two-way interactions in different layers in smart grid. However, it introduces more attack interfaces that the traditional information security system in smart grid cannot response in time. The neuroscience-inspired models have shown their effectiveness in solving security and optimization problems in smart grid. How to improve the security mechanism in smart grid while taking into account the optimization of data transmission efficiency using neuroscience-inspired algorithms is the problem to be solved in this study. Therefore, an information security system based on artificial neural network (ANN) and improved multiple protection model is proposed. Based on the ANN algorithm, the link state sample space is used to train the model to obtain the optimal transmission path in 5G power communication network. Integrating the intelligent link state module, the zero-trust security protection platform using case-based learning algorithm is designed and taken as the first protection, the network security logical isolation facility is taken as the second protection, and the forward and backward isolation facilities are set as the third protection to achieve the strengthened security of 5G IoT in smart grid. The experimental results show the efficiency and effectiveness of the proposed algorithms. In addition, the experimental results also show that the proposed system can resist malicious terminal access, terminal hijacking, data tampering and eavesdropping, protocol fuzzy, and denial-of-service attacks, so as to reduce the security risks of 5G IoT in smart grid. Since the proposed system can be easily integrated into the existing smart grid structure in China, the proposed system can provide a reference for the design and implementation of 5G IoT in smart grid.

Introduction

The development of smart grid depends on the intelligent infrastructure to enable a control-feedback loop. With the expansion to distribution side and user load side in the smart grid, the deep integration of 5G technology into the smart grid becomes an inevitable trend (Ma et al., 2021). The 5G technology including 5G network slicing technology can be advantageous in supporting the services of the smart grid such as grid monitoring, precise load control, intelligent distribution automation, and advanced metering infrastructure (AMI) (Matinkhah and Shafik, 2019; Forcan et al., 2020; Liu R. et al., 2021). A 5G communication has the characteristics of high bandwidth, low delay, high reliability, and low power consumption (Zhang et al., 2019). The 5G communication technology has great application potential in scenarios such as enhanced mobile bandwidth, large-scale terminal access, and ultra-low delay communication (Zhang, 2021). Using the advantages of 5G communication technology can not only facilitate the collection and analysis of power consumption data, but also improve the accuracy of power load control. In the power Internet of Things (IoT), building 5G cognitive radio network model and applying it to traditional collection and inspection services can improve the perception and transmission performance of a large number of user nodes (She et al., 2021). The advantages of 5G technology in future smart grid may include that it provides the data acquisition and visualization ability for multiple layers of smart grid (Ahmadzadeh et al., 2021).

At present, the power optical fiber private network communication is mainly used in the power system in China, which has high security and reliability. Due to the limited cost, fiber core resources and mobile operations, it is unable to cover a large number of power business terminals, so that 5G and other wireless communication methods need to be used as a supplement to the optical fiber private network (Wu et al., 2020; Li et al., 2021). However, the 5G networks do not provides end-to-end security for applications in smart grid where new types of threats may be introduced including security misconfiguration at mobile edge computing host (MECH) and IoT device security problems (Borgaonkar and Jaatun, 2019). The critical applications in smart grid requires additional measures against unauthorized access to the network while wireless technology such as 5G is applied (Ghanem et al., 2021). In addition, denial-of-service (DoS) or false data injection attacks may be launched against different parts of AMI using 5G in smart grid, leading to financial losses or even physical damages (Saghezchi et al., 2017). Therefore, the security of power terminal side is very important for the normal operation of power system communication network. Whether the service terminal of power system in China can be safely connected has become an important research direction of researchers in the field of power safety. Meanwhile, to facilitate the deployment of 5G applications, the security measures need to be easily integrated into the existing power industry security protection strategies (Li et al., 2020).

The current research on 5G IoT in smart grid mainly focuses on meeting different business needs, improving business processing efficiency and network scalability. In terms of security protection, it is mainly based on the existing security protection strategies and equipment that can no longer meet the security requirements in the IoT and 5G era. Therefore, to strengthen its security protection mechanism while improving the efficiency of 5G IoT, this study proposes an improved information system based on ANN and improved multiple protection mechanism, which can be easily integrated into the existing smart grid security architecture. The proposed method evaluates, learns, and predicts the link states in the process of 5G power communication (Hu et al., 2019), and adopts the multiple security protection method in combination with the idea of double isolation power security access area (Cao et al., 2019a) and the encryption, authentication method (Zhao, 2020) to improve the transmission efficiency of power 5G communication while meeting the security requirements in the process of power 5G communications.

Related Work

Scholars in related fields have studied the power communication access scheme and achieved some research results. Li et al. (2018) designed an intelligent power distribution terminal access architecture based on the integration of multiple technologies such as wireless sensor network (WSN), wireless local area network (WLAN) and wired private network, and adopted data hierarchical encryption, access network security classification and isolation to ensure network security. The architecture can effectively meet a variety of business needs of power distribution terminals. Chen et al. designed a joint deployment architecture based on multi-access edge computing (MEC), and designed a task scheduling mechanism by deploying MEC network elements on the access side and the core network side (Chen et al., 2018). The deployment architecture can effectively allocate MEC processing nodes and effectively improve scalability. Saghezchi et al. proposed a security architecture incorporating intrusion detection system (IDS) into AMI to protect the integrity of the information exchanged (Saghezchi et al., 2017).

The neuroscience-inspired methods [including artificial neural network (ANN)] have shown the effectiveness in solving security and optimization problems in smart grid. To mitigate the false data injection attacks in smart grid, the graph neural network (GNN) based detector incorporating physical connections and exploiting spatial correlations (Boyaci et al., 2022) or the detector combining predictions of Kalman filter and recurrent neural network (RNN) (Wang et al., 2022) can be effective methods. The RNN can also be applied to classify multiclass attacks for power systems with high accuracy (Hong et al., 2020). In addition, neuroscience-inspired methods can be applied to optimization problems in smart grid such as link quality estimation in smart grid WSN (Sun et al., 2017), load monitoring (Zhou et al., 2022), short-term load forecasting (Deng et al., 2021), and power user behavior feature classification (Deng et al., 2022).

As the organizational boundaries have become blurred, the zero-trust architecture has been attracting information security researches and is expected to be further explored and implemented in future digital systems (Wylde, 2021). The power grid security architecture can be established based on zero-trust architecture to provide dynamic security policies according to the trust of the access entities (Liu T. et al., 2021). The specific implementation of zero-trust architecture is considered as the improvement on continuous risk management. The intelligent decision support system using case-based reasoning (CBR) and rule-based machine learning may be used to significantly reduce the risks in software development (Asif and Ahmed, 2020).

Inspired by the adaptive ability and effectiveness of neuroscience-inspired methods and zero-trust models in the above researches, we attempt to design algorithms using ANN and case-based learning to improve the security and communication efficiency in 5G IoT environment of smart grid.

System Model

According to the power security regulations and current implementation of smart grid information infrastructure in China, an information security system model is proposed as shown in Figure 1.

FIGURE 1
www.frontiersin.org

Figure 1. Adaptive information security system model.

As shown in Figure 1, the adaptive information security system is implemented in the secure access area in the power information network, which consists of a zero-trust protection module based on case-based learning and an intelligent link module based on ANN. The details of those two main components will be described in Sections Related Work and System Model. The power intranet area I represents the network area where power production and control related software and hardware are implemented such as supervisory control and data acquisition (SCADA) and energy management system (EMS). Servers and equipment running these applications are represented by intranet application hosts I. The power intranet area II represents the network area where power management related data is processed such as office automation (OA) and enterprise resource planning (ERP). Servers and equipment running these applications are represented by intranet application hosts II. The power intelligent terminal and other equipment that implement in-field monitoring or control functions via public network such as 5G/4G, narrow band internet of things (NB-IoT), and long range radio (LoRA) can be represented by 5G extranet host.

Since the security level and requirements of power intranet area I and II are different, customized security policies and measures should be made. The overall secure communication process is shown in Figure 2.

FIGURE 2
www.frontiersin.org

Figure 2. Overall process of the system.

It can be seen from Figure 2 that the initialization of the proposed system is completed by offline training while acquiring status of connections and hosts for a period. First, 5G extranet host initiates a connection request to proposed system that verifies the identity of 5G extranet host. If the identification process succeeds, the appropriate authority is configured to extranet host. Then, 5G extranet host sends a request for data transmission path with its status and requested time slot. The proposed system produces a suggested path for extranet host and the data transmission is processed. The states of links between the proposed system and 5G extranet host are updated periodically so that an up-to-date suggested path can be produced by the proposed system. The security risks in intranet and extranet are continuously monitored by the proposed system and the credibility of each active user in the network is evaluated accordingly. The authority for each active user may be adjusted according to its real-time credibility so that the multiple security protection is strengthened.

The following sections will describe the intelligent link state module and improved multiple protection model in details.

Intelligent Link Module Based on ANN

In the intelligent link module, an ANN algorithm is applied to design an adaptive routing algorithm to obtain the link states in 5G communication network. The 5G and 4G communication modes are both supported in the communication network. Through the forward conduction and the backward conduction, the deep neural network operation is completed (Liu et al., 2020).

Suppose there is a 5G power communication network with N nodes, {D1, D2, ⋯ , DN} represents the node set. The loads of the network nodes are collected during the collection time period Δt of the cognitive plane, while the packet loss rates of the transmission paths from the source node to the target node are calculated. According to the transmission performance requirements of power services, the packet loss rates of the transmission paths are divided into four categories from low to high as {0: Ultra low; 1: Low; 2: Average; 3: High}. We can use l=(xi,j,tsi,j,yi,j) as a data sample where xi,j = { Di,Di+1,,Dj},tsi,j represents the collection time span, yi,j represents the categorized packet loss rate from node i to node j, and yi,j ∈ {0, 1, 2, 3}. Hence, the sample space including the data label yi,j is represented as follows:

Y={(xi,j,1,tsi,j,1,yi,j,1),(xi,j,2,tsi,j,2,yi,j,2),          ,(xi,j,n,tsi,j,n,yi,j,n),}    (1)

The forward conduction that outputs link state prediction value is completed based on the non-linear function formed by each layer node in the deep neural network. The forward conduction expression is as follows:

Y(l,k)(x)=F (i=1n(wi,kl×xi+bil))    (2)

where k = 1, 2, ⋯ , n, wi,kl represents the weight from neuron k of layer (l+1) to neuron i of layer l, F and w denote the non-linear function and the weight matrix, respectively, and bil represents the bias of neuron i of layer l.

The loss function is used to express the error between the sample space and the output value of neural network. The loss function is shown as follows:

J(w,b;x,y)=12ni=1nY(w,b,xi)-yi2    (3)

where b represents the square loss, xi represents the absolute value loss, and w represents the mean square error loss.

The gradient descent method is selected to reduce the error between the calculated sample value and the predicted value. Using the gradient descent method and step-by-step iterative solution, the predicted value of link state, the minimum value of sample space loss function and model parameters can be obtained after completing the backward conduction. The backward function is shown as follows where i = l − 1.

δi,l=(wl+1)T×δi,l+1×Y(i,l)    (4)

The updating formulas of w and b are shown as follows:

wl=wl-αi=1nδi,l×(Yi,l-1)T    (5)
bl=bl-αi=1nδi,l    (6)

where α represents the iteration step. We can set the threshold value as ε. When the updated value of w and b are less than the threshold value, the calculation will be terminated. Input the test set samples into the model, and count the error between the model output results and the sample values. Repeating the above process until the error is lower than the predefined threshold, the accuracy test is completed.

The ANN algorithm can be applied to 5G power communication with complex changes, and output the results most consistent with the current environment according to the real-time change of link state in the network (Ge et al., 2020). The link state sample space is input into the model. After the model passes the hidden layer operation, select the softmax function to apply to the output layer, output the probability value of each path (Zhu et al., 2020).

The application plane includes network applications such as routing and network virtualization. The cognitive plane is composed of switches and other devices, and the control plane refers to the controller in the logic set. After receiving the service request sent by the control plane, the application plane forwards it to the cognitive plane. When the output path of the cognitive plane is still the original path, the decision information is set according to the initial routing information table. When the output path of the cognitive plane changes, the new transmission path is sent back to the control plane, and the routing information table is updated by the control plane in real time.

After a fixed interval, the control plane needs to reset the network route. It updates the routing table information in real time (Xu et al., 2018) and transmits the updated routing table to the control layer that controls the cognitive plane to retrain the model, and updates the model in real time after training. Through the above steps, an adaptive routing algorithm is designed using neural network model. Through the forward conduction and the backward conduction, the deep neural network operation is completed to obtain the optimal transmission path in 5G communication network.

Improved Multiple Protection Model Base on Case-Based Learning

As shown in Figure 3, the improved multiple protection model is composed of the zero-trust protection module, network security logical isolation facility, forward and backward network isolation facility. At present, the power terminals mainly focus on the realization of business functions, and their security functions generally are not fully considered. They need to be improved in terms of access authorization, audit, and network attack protection (Cheng et al., 2020). Therefore, the zero-trust protection module in the secure access area not only serves as a boundary isolation facility, but also carries out continuous trust and risk assessment for 5G external network hosts. The zero-trust protection module integrates the lightweight encryption and authentication center that uses the identity-based cryptosystem (IBC) or combined public key (CPK) system to generate and distribute the keys to the 5G external network hosts. The network security logical isolation facility in the security access area mainly implements the gate isolation function and the power protocol data security filtering function (Han et al., 2019). The forward and backward network isolation facilities in the secure access area use the existing devices or use the enhanced forward and backward isolation devices (Cao et al., 2019b).

FIGURE 3
www.frontiersin.org

Figure 3. Improved multiple protection model.

The zero-trust architecture can provide active defense ability and end-to-end security enforcement in a 5G smart application environment where a four-dimensional framework may be designed including subject, object, environment, and behavior (Chen et al., 2021). In power industry of China, the credit management and risk assessment are also paid attentions, considering the risks in the power market transactions (Cai et al., 2020). Thus, a CBR algorithm is proposed in the zero-trust protection module to implement the continuous credit and risk management.

The operational process of improved multiple protection model includes the following steps:

Step 1. The 5G extranet host establishes a network connection with the zero-trust protection module that verifies its identity information. If it is a legal terminal, an encrypted transmission channel is established and access rights are configured. The 5G extranet host requests the optimal path from the 5G communication link optimization service that then returns the result after calculating the predicted value of the optimal path. The zero-trust protection module evaluates the trust and risk value of the extranet host by monitoring the status and the behavior of the extranet host in real time, and adjusts the access authority of the extranet host according to the CBR algorithm that will be described later in this section.

Step 2. After receiving the cipher text sent by 5G power communication network, the zero-trust protection module decrypts the cipher text and transmits the plaintext to the network security isolation facility.

Step 3. After receiving plaintext data, the network security isolation facility implements network protocol stripping (Wang, 2018), and performs security filtering on the obtained data based on pattern matching and feature filtering methods. The plaintext is then signed after security filtering. If the extranet host needs to access the service application of Intranet area II, go to Step 4. If the extranet host needs to access the service application of Intranet area I, go to Step 5.

Step 4. Send the signed data to the access gateway of Intranet area II, encapsulate the network protocol and send the message to the intranet application host II, and the communication of Intranet area II host ends.

Step 5. Convert the signed data into private protocol message of backward isolation facility and output it to backward isolation facility.

Step 6. After receiving the private protocol message, the backward isolation facility performs signature verification, data content filtering and validity check, and sends the data to the access gateway of Intranet area I.

Step 7. The access gateway of Intranet area I encapsulates the data with network protocol and sends it to the intranet application host I, and the communication of Intranet area I host ends.

Step 8. The communication process between the intranet host and the extranet host is opposite to the above process.

The architecture of zero-trust protection module is shown in Figure 4.

FIGURE 4
www.frontiersin.org

Figure 4. Architecture of zero trust protection module.

As shown in Figure 4, the zero-trust security platform is comprised of a case module, a dynamic access control module and a zero-trust engine. The operational process of the platform will be described following the design and implementation of CBR method. The CBR method is a recycling process including five phases: modeling, search, reuse, review, and retain (Chourib et al., 2020). Each case (casei) in the case base of case module is modeled in Formula (7).

casei   ={caseIDi,statei,eventi,crediti,groupi}statei  ={ID_Ei,ID_Ui,typei,bizi,ipi}event i{timei,freqi,tgti,voli,cfgi,warni,usrei}    (7)
crediti{credi,1,credi,2,,credi,n}effei   {ei,1,2,ei,2,3,ei,n-1,n}groupi{CaseID1,,CaseIDi-1,CaseIDi+1,CaseIDn}

where statei represents the status of 5G extranet host in casei where ID_Ei is the unique identity name of the 5G extranet host if IBC system is adopted or the equipment certificate otherwise. Here, ID_Ui is the user identity certificate in the host, typei is the type of the host, bizi is the power business running in the host, and ipi is the IP address of the corresponding host. Also, eventi represents the events encountered that may be the abnormal behaviors in terms of data transmission time (timei), data transmission frequency (freqi), data transmission target (tgti), data transmission volume (voli), configuration change (cfgi), and user defined event (usrei). Now, crediti is the credits record of the last n credits of ID_Ei and ID_Ui. records the effectiveness evaluated for each change in crediti. Lastly, groupi represents the set of case IDs related to casei.

The knowledge base is comprised of power business templates and rule sets as defined in Formula (8).

      Templatei={bizIDi,bizTexti,timei,freqi,tgti,voli}Ruledefault={bizID,event,meadefault}    (8)
                Rulei={eventi,meai}

where Templatei represents a template for a specific power business. Here, bizIDi and bizTexti denote the identity number and description of a power business, respectively. Also, timei, freqi, tgti, voli are the data transmission time, frequency, target, and volume, respectively, defined by business personnel based on the regular operations of business applications. Now, Ruledefault defines the default measures when an event occurs in a business application environment. Also, Rulei represents a rule defined in the rule sets that decides which measures in meai can be adopted when an event in eventi occurs. Therefore, the recycling five phases in CBR may include the following steps:

Step 1. Modeling. The case to be solved can be modeled as {stai, evti}. evti can be collected by zero-trust engine from security facilities such as IDS, firewall, and UTM. Then, the stai can be collected by zero-trust engine from security agents installed in related extranet host and the identity and authority management center.

Step 2. Search. First, stai and evti are searched in the case base. If staicasei AND evticasei, go to Step 3.1. If staicasei AND evticasei, go to Step 3.2. Otherwise, go to Step 3.3.

Step 3. Reuse. The information and knowledge from similar case are used to form the solution for encountered case.

Step 3.1. If the ei,n − 1, n in effei is positive, reuse the last credit change measure (credi,ncredi,n−1} in crediti of casei. Go to Step 4. Otherwise, go to Step 3.3.

Step 3.2. If typei, biz in stai equals to typei, biz in statei of casei, go to Step 3.1. Otherwise, go to Step 3.3.

Step 3.3. Execute Ruledefault.

Step 4. Review. The zero-trust engine collects the information from security devices to evaluate the effectiveness of the reused solution.

Step 5. Retain. Update casei or add a new case to the case base.

In summary, the improved multiple protection model implements the triple security protection from the following aspects:

(1) The zero-trust protection module in the secure access area implements the first boundary security isolation. The zero-trust security protection platform monitors the data access, configuration update, and other behaviors of 5G extranet hosts in real time, dynamically evaluates the security risks of 5G extranet hosts and controls the dynamic access rights. The advantage of using zero-trust protection module that integrates lightweight encryption and authentication module is that it reduces the computing capability requirements of 5G external network host, and can continuously monitor and control the security of 5G terminals, which can effectively reduce the access risk of extranet host. The zero-trust protection module avoids the security risk caused by the traditional one-time authorization and permanent effectiveness so as to improve the traditional security model.

(2) As the second protection of the model, the network security logical isolation facility implements data security filtering and network logic isolation, and ensures the encryption and authentication of data interaction between the zero-trust security protection platform and the network security isolation facility.

(3) As the third protection of the model, the forward and backward isolation facilities are used to block the TCP connection, control the information flow access process, and implement the content filtering in the communication process.

Experiments and Results Analysis

To verify the improvement of communication efficiency and the network security of the proposed system based on ANN and multiple protection model, a test and verification environment combining virtual and reality based on OPNET and security equipment is built as shown in Figure 5. The environment is implemented in an experimental 5G power IoT scenario of State Grid Corporation of China (SGCC).

FIGURE 5
www.frontiersin.org

Figure 5. Test environment.

First, through experiment 1, the effectiveness and efficiency of the link state algorithm are verified. The dataset is acquired in experimental 5G power IoT scenario for 2 days from Friday to Saturday and then it is marked manually. The ratio of training set to test set of deep learning network is 7:3, and the number of nodes in input layer and output layer are set to 19 and 4, respectively. The full connection mode is adopted, and the softmax function is set as the activation function of the model. The number of iterations and learning rate are 1,000 and 0.1, respectively. The statistical results of deep learning output accuracy under different training times are shown in Figure 6.

FIGURE 6
www.frontiersin.org

Figure 6. Accuracy test of deep learning method.

It can be seen from Figure 6 that the output accuracy of the proposed method is higher than 92% after multiple tests, indicating that the parameters of the deep learning method set by the proposed method can meet the requirements of output accuracy. The convergence of the algorithm when the proposed method is randomly selected for single training is shown in Figure 7.

FIGURE 7
www.frontiersin.org

Figure 7. Convergence performance of the algorithm.

It can be seen from Figure 7 that when the data space samples are set, the proposed method has fast convergence speed, and the training accuracy can reach about 95% when the algorithm tends to be stable.

A 5G extranet host is set as the data sending node and the zero-trust platform is set as the data receiving node. The communication quality of each link is randomly set. The hierarchical iteration algorithm as provided in Hu et al. (2019) and powerline intelligent metering evolution (PRIME) algorithm as provided in Aruzuaga et al. (2010) are selected as the comparison method. The average packet loss rate of 5G power communication network is calculated where noise interference is randomly added to a link node at 60s. The results are shown in Figure 8.

FIGURE 8
www.frontiersin.org

Figure 8. Average packet loss rate.

It can be seen from Figure 8 that the average packet loss rate of the proposed algorithm is lower than the other two algorithms and is ~0.6% lower than the hierarchical iteration algorithm. When noise interference is added, the proposed and hierarchical iteration algorithm both can adjust adaptively and reduce the packet loss rate.

Second, through experiment 2, the performance of 5G power communication security system is tested and verified. The test results are shown in Table 1.

TABLE 1
www.frontiersin.org

Table 1. Security performance test results of proposed system.

As shown in Table 1, the authentication, encryption, and decryption delay between 5G extranet host and zero-trust platform is <6 ms each time, accounting for a small proportion in the overall communication delay. In the proposed system, the time delay mainly lies in the time delay of isolation facilities in the power system. Due to its data security filtering functions and technical architecture, the time delay of network security logical isolation device is greater than that of the forward and backward isolation devices. The overall bandwidth limitation in the proposed system mainly lies in the backward isolation device (Boyaci et al., 2022). The bandwidth between 5G extranet host and zero-trust platform can meet the large bandwidth requirements of video monitoring and other applications.

Finally, according to the security risks identified in 5G power communication scenario, the IXIA PerfectStorm ONE testbed is used to verify the security of the proposed system through experiment 3. The test results are shown in Table 2.

TABLE 2
www.frontiersin.org

Table 2. Security test of the proposed system.

According to Table 2, the proposed system can resist malicious terminal access, terminal hijacking, data tampering and eavesdropping, protocol fuzzy and DoS attacks, so as to reduce the security risk of 5G power communication.

In summary, experiment 1 verified the efficiency and performance of the intelligent link state algorithm, experiment 2 verified the secure communication performance of the proposed system, and experiment 3 verified the security of the proposed system. From these three experiments, it can be seen that the intelligent link state algorithm and improved multiple protection model proposed in this system demonstrated satisfied transmission efficiency and security performance, which may meet the demands of power 5G applications.

Conclusions

In this study, a 5G power security system is proposed where an intelligent link state algorithm and an improved multiple protection model are designed. The intelligent link state algorithm is based on the deep learning method so as to suggest the optimal data transmission path between the 5G extranet host and the zero-trust security platform. The multiple protection model is improved via adopting the zero-trust architecture and CBR methodology. The details and operational process of the proposed system including link state algorithm and CBR algorithm are described. Three experiments are established to validate the efficiency and effectiveness of the proposed system. The future research directions may reside in the further improvement of the efficiency of the multiple protection model in the era of big data and IoT where millions of terminals will be connected.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available upon request to corresponding authors.

Author Contributions

CJ and CH contributed to conception and design of the study. HX organized the database. QH performed the statistical analysis. CJ wrote the first draft of the manuscript. CJ, HX, CH, and QH wrote sections of the manuscript. All authors contributed to manuscript revision, read, and approved the submitted version.

Funding

This research was supported by the Science and Technology Project of State Grid Jiangsu Electric Power Co., Ltd. (Grant No. J2021125), Jiangsu Provincial Social Science Foundation Youth Project (Grant No. 21TQC003), Major Project of Philosophy, and Social Science Research in Universities of Jiangsu Province Education Department (Grant No. 2020SJZDA069).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Ahmadzadeh, S., Parr, G., and Zhao, W. (2021). A review on communication aspects of demand response management for future 5G IoT- based smart grids. IEEE Access. 9, 77555–77571. doi: 10.1109/ACCESS.2021.3082430

CrossRef Full Text | Google Scholar

Aruzuaga, A., Berganza, I., Sendin, A., Sharma, M., and Varadarajan, B. (2010). “PRIME interoperability tests and results from field,” in 2010 First IEEE International Conference on Smart Grid Communications (Gaithersburg, MD), 126–130.

Asif, M., and Ahmed, J. (2020). A novel case base reasoning and frequent pattern based decision support system for mitigating software risk factors. IEEE Access. 8, 102278–102291. doi: 10.1109/ACCESS.2020.2999036

CrossRef Full Text | Google Scholar

Borgaonkar, R., and Jaatun, M. G. (2019). “5G as an enabler for secure IoT in the smart grid: invited paper,” in 2019 First International Conference on Societal Automation (SA) (Krakow), 1–7.

Boyaci, O., Umunnakwe, A., Sahu, A., Narimani, M. R., Ismail, M., Davis, K. R., et al. (2022). Graph neural networks based detection of stealth false data injection attacks in smart grids. IEEE Systems J (in press). doi: 10.1109/JSYST.2021.3109082

CrossRef Full Text | Google Scholar

Cai, Y., Chen, Q., and Zhang, W. (2020). “Credit and risk management of electricity transaction: a real case based on Guangdong electricity market rules,” in 2020 5th Asia Conference on Power and Electrical Engineering (ACPEE) (Chengdu), 994–999.

Cao, X., Hu, S., Zhang, Y., Lin, Q., Tang, Z., and Zhang, C. (2019a). Design and implementation of power universal security access zone based on dual isolation. Electr. Power Eng. Technol. 38, 152–158. doi: 10.19464/j.cnki.cn32-1541/tm.2019.02.024

CrossRef Full Text | Google Scholar

Cao, X., Zhang, Y., Song, L., Hu, S., Tang, Z., and Zhang, C. (2019b). Design and implementation of forward isolation device based on deep packet inspection and security enhancement. Autom. Electr. Power Syst. 43, 162–167.

Chen, B., Qiao, S., Zhao, J., Liu, D., Shi, X., Lyu, M., et al. (2021). A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE Inter. Things J. 8, 10248–10263. doi: 10.1109/JIOT.2020.3041042

CrossRef Full Text | Google Scholar

Chen, X., Wen, X., Wang, L., and Lu, Z. (2018). The architecture design of cooperated deployment for multi-access edge computing in 5G. J. Beijing Univ. Posts Telecommun. 41, 86–91. doi: 10.13190/j.jbupt.2018-169

CrossRef Full Text | Google Scholar

Cheng, L., Xu, D., Zeng, K., Liu, Z., and Zhu, H. (2020). Design and application of power quality terminal information security. Electric Power Eng. Technol. 39, 26–33. doi: 10.12158/j.2096-3203.2020.06.005

CrossRef Full Text | Google Scholar

Chourib, I., Guillard, G., Mestiri, M., Solaiman, B., and Farah, I. R. (2020). “Case-based reasoning: problems and importance of similarity measure,” in 2020 5th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) (Sousse), 1–6.

Deng, S., Cai, Q., Zhang, Z., and Wu, X. (2022). User behavior analysis based on stacked autoencoder and clustering in complex power grid environment. IEEE Trans. Intellig. Transport. Syst. (in press). doi: 10.1109/TITS.2021.3076607

CrossRef Full Text | Google Scholar

Deng, S., Chen, F., Dong, X., Gao, G., and Wu, X. (2021). Short-term load forecasting by using improved GEP and abnormal load recognition. ACM Trans. Intern. Technol. 21, 1–28. doi: 10.1145/3447513

CrossRef Full Text | Google Scholar

Forcan, M., Maksimovic, M., Forcan, J., and Jokic, S. (2020). “5G and cloudification to enhance real-time electricity consumption measuring in smart grid,” in 2020 28th Telecommunications Forum (TELFOR) (Belgrade), 1–4.

Ge, L., Ma, T., Chen, W., Bai, X., and Zhang, S. (2020). A top-level design for time-delay uncertainty analysis of situational awareness in smart distribution network. Electric Power Engineering Technology 39: 51–57. doi: 10.12158/j.2096-3203.2020.03.008

CrossRef Full Text | Google Scholar

Ghanem, K., Ugwuanyi, S., Asif, R., and Irvine, J. (2021). “Challenges and promises of 5G for smart grid teleprotection applications,” in 2021 International Symposium on Networks, Computers and Communications (ISNCC) (Dubai), 1–7.

Han, R., Du, Q., Guo, C., Du, X., Wang, Q., and Su, Y. (2019). Study on optimization of special invoice service for value-added tax in service hall of power enterprise. Power Systems and Big Data 22(01):35–40.

Hong, W.-C., Huang, D.-R., Chen, C.-L., and Lee, J.-S. (2020). Towards accurate and efficient classification of power system contingencies and cyber-attacks using recurrent neural networks. IEEE Access. 8, 123297–123309. doi: 10.1109/ACCESS.2020.3007609

CrossRef Full Text | Google Scholar

Hu, Z., Song, X., Huang, T., Li, X., Zhou, R., Xu, X., et al. (2019). Research on network virtualization scheme and networking algorithm of advanced metering infrastructure for water, electricity, gas, and heat meters. J. Electr. Inform. Technol. 41, 588–593. doi: 10.11999/JEIT180396

CrossRef Full Text | Google Scholar

Li, H., Xu, Y., Meng, F., Ren, S., Li, H., and Pang, X. (2021). Modeling and analysis of 5G terminal communication channel in substation. Study Opt. Commun. 2021, 63–66. doi: 10.13756/j.gtxyj.2021.01.013

CrossRef Full Text | Google Scholar

Li, K., Jin, X., Kuai, W., Liu, C., and Yang, Y. (2020). “The customized 5G secondary authentication scheme combined with security protection strategy for electrical automation system,” in 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) (Chongqing), 757–761.

Li, Y., Lu, J., Xu, Z., Gong, G., and Liao, B. (2018). Design of terminal communication access architecture for smart power distribution and utilization based on integration of multiple technologies. Autom. Electr. Power Syst. 42, 169–175. doi: 10.7500/AEPS20170506002

CrossRef Full Text | Google Scholar

Liu, R., Hai, X., Du, S., Zeng, L., Bai, J., and Liu, J. (2021). “Application of 5G network slicing technology in smart grid,” in 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE) (Nanchang), 740–743.

Liu, T., Ma, Y., Jiang, H., Wu, S., Zuo, J., and Peng, T. (2021). “Research on power grid security protection architecture based on zero trust,” Electric Power Inform. Commun. Technol. 19, 25–32. doi: 10.16543/j.2095-641x.electric.power.ict.2021.07.004

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, Z., Li, Q., Yan, B., and Shang, K. (2020). Application of depth neural network algorithm with stacked sparse auto-encoder in rolling bearing fault diagnosis. Machine Tool Hydraul. 48, 208–213. doi: 10.3969/j.issn.1001-3881.2020.23.039

CrossRef Full Text | Google Scholar

Ma, L., Zhang, N., Kong, X., Zhu, Y., Wang, Y., and Wang, Y. (2021). “5G network slicing technology helps smart grid development,” in 2021 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS) (Shenyang), 64–68.

Matinkhah, S. M., and Shafik, W. (2019). “Smart grid empowered by 5g technology,” in 2019 Smart Grid Conference (SGC) (Tehran), 1–6.

Saghezchi, F. B., Mantas, G., Ribeiro, J., Al-Rawi, M., Mumtaz, S., and Rodriguez, J. (2017). “Towards a secure network architecture for smart grids in 5G era,” in 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (Valencia), 121–126.

She, R., Zhang, N., Wang, Y., Guo, D., Ma, W., Liu, R., et al. (2021). Research on cognitive radio non-orthogonal multiple access system in 5g communications oriented to ubiquitous power internet of things. Electr. Power. 54, 35–45. doi: 10.11930/j.issn.1004-9649.202010099

CrossRef Full Text | Google Scholar

Sun, W., Lu, W., Li, Q., Chen, L., Mu, D., and Yuan, X. (2017). WNN-LQE: wavelet-neural-network-based link quality estimation for smart grid WSNs. IEEE Access. 5, 12788–12797. doi: 10.1109/ACCESS.2017.2723360

CrossRef Full Text | Google Scholar

Wang, W. (2018). Design and Implementation of Industrial Network Security Isolation and Information Exchange System (master's thesis). Beijing University of Posts and Telecommunications, Beijing, China.

Wang, Y., Zhang, Z., Ma, J., and Jin, Q. (2022). KFRNN: an effective false data injection attack detection in smart grid based on kalman filter and recurrent neural network. IEEE Intern. Things J. (in press). doi: 10.1109/JIOT.2021.3113900

CrossRef Full Text | Google Scholar

Wu, J., Bian, Y., Zhang, Q., and Feng, B. (2020). Wireless quantum power distribution system based on wireless. Tele-commun. Sci. 36, 72–79. doi: 10.11959/j.issn.1000-0801.2020031

CrossRef Full Text | Google Scholar

Wylde, A. (2021). “Zero trust: never trust, always verify,” in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (Dublin), 1–4.

Xu, G., Wang, Z., Zang, D., and An, X. (2018). Anomaly detection algorithm of data center network based on LSDB. J. Comput. Res. Dev. 55, 815–830. doi: 10.7544/issn1000-1239.2018.20160970

CrossRef Full Text | Google Scholar

Zhang, N., Yang, J., Wang, Y., Chen, Q., and Kang, C. (2019). 5G communication for the ubiquitous internet of things in electricity: technical principles and typical applications. Proc. CSEE. 39, 4015–4024. doi: 10.13334/j.0258-8013.pcsee.190892

CrossRef Full Text | Google Scholar

Zhang, Z. (2021). Research on 5G Communication Antenna Carrying Scheme of Shared Power Towers (master's thesis). North China University of Technology, Beijing, China.

Zhao, F. (2020). Authenticated encryption implementation scheme based on tweakable grouping. Comput. Eng. 46, 144–148. doi: 10.19678/j.issn.1000-3428.0054421

CrossRef Full Text | Google Scholar

Zhou, Z., Xiang, Y., Xu, H., Wang, Y., and Shi, D. (2022). Unsupervised learning for non-intrusive load monitoring in smart grid based on spiking deep neural network. J. Modern Power Syst. Clean Energy (in press). doi: 10.35833/MPCE.2020.000569

CrossRef Full Text | Google Scholar

Zhu, Z., Jia, J., Li, Z., Qian, H., and Kang, K. (2020). A low latency random access mechanism for 5G new radio in unlicensed spectrum. J. Electr. Inform. Technol. 42, 111–119. doi: 10.11999/JEIT190515

CrossRef Full Text | Google Scholar

Keywords: information security, artificial neural network, case-based learning, smart grid, zero trust

Citation: Jiang C, Xu H, Huang C and Huang Q (2022) An Adaptive Information Security System for 5G-Enabled Smart Grid Based on Artificial Neural Network and Case-Based Learning Algorithms. Front. Comput. Neurosci. 16:872978. doi: 10.3389/fncom.2022.872978

Received: 10 February 2022; Accepted: 11 March 2022;
Published: 14 April 2022.

Edited by:

Di Wu, Chongqing Institute of Green and Intelligent Technology (CAS), China

Reviewed by:

Avishek Nag, University College Dublin, Ireland
Ming Su, Beijing University of Posts and Telecommunications (BUPT), China

Copyright © 2022 Jiang, Xu, Huang and Huang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Chengzhi Jiang, amN6JiN4MDAwNDA7bmppdC5lZHUuY24=; Hao Xu, eGhuaml0JiN4MDAwNDA7bmppdC5lZHUuY24=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.