Submitted:
09 June 2025
Posted:
10 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- A novel data-driven CNN and Bi-LSTM-based model in conjunction with RF is introduced to detect and localize FDIA attacks in SG. To the best of our knowledge, this study is the first to utilize the proposed architecture in this particular research field.
- The proposed approach is universally applicable and does not rely on statistical assumptions about the system parameters and attack model.
- The comparative analysis of our proposed model and other existing models for FDIA detection and localization, reported in various literature, is done to showcase the effectiveness of our proposed model in the IEEE 14 bus and IEEE 30 bus test systems.
- The framework is evaluated under standard FDIA conditions and scenarios where FDIA is combined with DoS attacks, demonstrating its robustness under partial observability. This work is among the few studies that jointly investigate the impact of FDIA and DoS in a unified detection and localization framework.
2. Related Works
3. Preliminaries
3.1. State Estimation
3.2. False Data Injection Attack
3.3. DoS
3.4. CNN
3.5. Bi-LSTM
3.6. RF
4. Methodology
4.1. Proposed FDIA Detection and Localization Scheme
4.2. Proposed ML Architecture
4.3. Dataset
4.4. Training Procedure
4.5. Performance Evaluation Metrics
4.5.1. Forecasting Accuracy Metrics
4.5.2. Attack Detection Metrics
- TP: Number of correctly detected compromised samples
- FP: Number of benign samples incorrectly labeled as compromised
- TN: Number of correctly detected benign samples
- FN: Number of compromised samples incorrectly labeled as benign
4.5.3. Row-wise Accuracy (RACC)
5. Simulation Results
5.1. Scenario 1: FDIA Detection and Location Module in IEEE 14 Bus System
5.2. Scenario 2: FDIA detection and Location Module in IEEE 30 Bus System
5.3. Scenario 3: FDIA Detection and Localization with Stealthier Attack Vectors
5.4. Scenario 4: FDIA Detection and Localization During DOS Attacks
6. Conclusions
Author Contributions
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart Grid — The New and Improved Power Grid: A Survey. IEEE Communications Surveys & Tutorials 2012, 14, 944–980. [Google Scholar] [CrossRef]
- Ali, S.S.; Choi, B.J. State-of-the-Art Artificial Intelligence Techniques for Distributed Smart Grids: A Review. Electronics 2020, 9. [Google Scholar] [CrossRef]
- Zhu, J.; Gao, W.; Li, Y.; Guo, X.; Zhang, G.; Sun, W. Power System State Estimation Based on Fusion of PMU and SCADA Data. Energies 2024, 17. [Google Scholar] [CrossRef]
- Gou, B.; Shue, D. Advances in Algorithms for Power System Static State Estimators: An Improved Solution for Bad Data Management and State Estimator Convergence. IEEE Power and Energy Magazine 2023, 21, 16–25. [Google Scholar] [CrossRef]
- Alomari, M.A.; Al-Andoli, M.N.; Ghaleb, M.; Thabit, R.; Alkawsi, G.; Alsayaydeh, J.A.J.; Gaid, A.S.A. Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions. Energies 2025, 18. [Google Scholar] [CrossRef]
- Huang, X.; Qin, Z.; Liu, H. A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis. IEEE Access 2018, 6, 69023–69035. [Google Scholar] [CrossRef]
- Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Cyber Security for Smart Grid Communications. IEEE Communications Surveys & Tutorials 2012, 14, 998–1010. [Google Scholar] [CrossRef]
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14. [Google Scholar] [CrossRef]
- Deng, R.; Xiao, G.; Lu, R.; Liang, H.; Vasilakos, A.V. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey. IEEE Transactions on Industrial Informatics 2017, 13, 411–423. [Google Scholar] [CrossRef]
- Almasabi, S.; Alsuwian, T.; Javed, E.; Irfan, M.; Jalalah, M.; Aljafari, B.; Harraz, F.A. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units. Sensors 2021, 21. [Google Scholar] [CrossRef]
- Huseinović, A.; Mrdović, S.; Bicakci, K.; Uludag, S. A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid. IEEE Access 2020, 8, 177447–177470. [Google Scholar] [CrossRef]
- Foroutan, S.A.; Salmasi, F.R. Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET Cyber-Physical Systems: Theory & Applications 2017, 2, 161–171. [Google Scholar] [CrossRef]
- Acuña Acurio, B.A.; Chérrez Barragán, D.E.; López, J.C.; Grijalva, F.; Rodríguez, J.C.; da Silva, L.C.P. Visual State Estimation for False Data Injection Detection of Solar Power Generation. Engineering Proceedings 2023, 47. [Google Scholar] [CrossRef]
- Ashok, A.; Govindarasu, M. Cyber attacks on power system state estimation through topology errors. In Proceedings of the 2012 IEEE Power and Energy Society General Meeting; 2012; pp. 1–8. [Google Scholar] [CrossRef]
- Li, Z.; Xie, Y.; Ma, R.; Wei, Z. Optimizing CNN-LSTM for the Localization of False Data Injection Attacks in Power Systems. Applied Sciences 2024, 14. [Google Scholar] [CrossRef]
- Wang, S.; Bi, S.; Zhang, Y.J.A. Locational Detection of the False Data Injection Attack in a Smart Grid: A Multilabel Classification Approach. IEEE Internet of Things Journal 2020, 7, 8218–8227. [Google Scholar] [CrossRef]
- Wang, L.; Zhou, Q.; Jin, S. Physics-guided Deep Learning for Power System State Estimation. Journal of Modern Power Systems and Clean Energy 2020, 8, 607–615. [Google Scholar] [CrossRef]
- Bhusal, N.; Shukla, R.M.; Gautam, M.; Benidris, M.; Sengupta, S. Deep ensemble learning-based approach to real-time power system state estimation. International Journal of Electrical Power & Energy Systems 2021, 129, 106806. [Google Scholar] [CrossRef]
- Mukherjee, D.; Chakraborty, S.; Ghosh, S. Power system state forecasting using machine learning techniques. Electrical Engineering 2022, 104, 283–305. [Google Scholar] [CrossRef]
- Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid. IEEE Systems Journal 2017, 11, 1644–1652. [Google Scholar] [CrossRef]
- Wang, H.; Ruan, J.; Wang, G.; Zhou, B.; Liu, Y.; Fu, X.; Peng, J. Deep Learning-Based Interval State Estimation of AC Smart Grids Against Sparse Cyber Attacks. IEEE Transactions on Industrial Informatics 2018, 14, 4766–4778. [Google Scholar] [CrossRef]
- Baul, A.; Sarker, G.C.; Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. XTM: A Novel Transformer and LSTM-Based Model for Detection and Localization of Formally Verified FDI Attack in Smart Grid. Electronics 2023, 12. [Google Scholar] [CrossRef]
- Zhang, G.; Gao, W.; Li, Y.; Hu, W.; Hu, P.; Hua, F. Detection and Localization of False Data Injection Attacks in Smart Grid Based on Joint Maximum a Posteriori-Maximum Likelihood. IEEE Access 2023, 11, 133867–133878. [Google Scholar] [CrossRef]
- Zhu, J.; Meng, W.; Sun, M.; Yang, J.; Song, Z. FLLF: A Fast-Lightweight Location Detection Framework for False Data Injection Attacks in Smart Grids. IEEE Transactions on Smart Grid 2024, 15, 911–920. [Google Scholar] [CrossRef]
- Dehbozorgi, M.R.; Rastegar, M.; Arani, M.F.M. False Data Injection Attack Detection and Localization Framework in Power Distribution Systems Using a Novel Ensemble of CNNs and Explainable Artificial Intelligence. IEEE Transactions on Industry Applications 2025, 61, 4801–4811. [Google Scholar] [CrossRef]
- Yu, Y.; Liu, C.; Xiong, L.; Tang, Y.; Qian, F. Localization of False Data Injection Attacks in Smart Grids With Renewable Energy Integration via Spatiotemporal Network. IEEE Internet of Things Journal 2024, 11, 37571–37581. [Google Scholar] [CrossRef]
- Boyaci, O.; Narimani, M.R.; Davis, K.R.; Ismail, M.; Overbye, T.J.; Serpedin, E. Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks. IEEE Transactions on Smart Grid 2022, 13, 807–819. [Google Scholar] [CrossRef]
- Wang, Y.; Lu, Z.; Ma, J.; Jin, Q. Locational False Data Injection Attack Detection in Smart Grid Using Recursive Variational Graph Autoencoder. IEEE Internet of Things Journal 2025, 12, 13697–13708. [Google Scholar] [CrossRef]
- Wu, S.; Yang, C.; Wang, J.; Shi, D. A Lightweight Framework for Measurement Causality Extraction and FDIA Localization. IEEE Transactions on Smart Grid 2025, 16, 2587–2598. [Google Scholar] [CrossRef]
- Chen, X.; Hu, S.; Li, Y.; Yue, D.; Dou, C.; Ding, L. Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks. IEEE Transactions on Smart Grid 2022, 13, 2357–2368. [Google Scholar] [CrossRef]
- Hu, S.; Chen, X.; Li, J.; Xie, X. Observer-Based Resilient Controller Design for Networked Stochastic Systems Under Coordinated DoS and FDI Attacks. IEEE Transactions on Control of Network Systems 2024, 11, 890–901. [Google Scholar] [CrossRef]
- Yang, F.; Xie, X.; Peng, C. Co-Design of New Fuzzy Switching-Type State-FDI Estimation and Attack Compensation for Dc Microgrids Under Hybrid Attacks. IEEE Transactions on Fuzzy Systems 2024, 32, 1743–1755. [Google Scholar] [CrossRef]
- Yang, F.; Xie, X.; Sun, Q.; Yue, D. FDI Attack Estimation and Event-Triggered Resilient Control of DC Microgrids Under Hybrid Attacks. IEEE Transactions on Smart Grid 2024, 15, 4207–4216. [Google Scholar] [CrossRef]
- Jenabzadeh, A.; Shu, Z.; Huang, T.; Zhu, Q.; Shang, Y.; Cui, Y. Distributed Estimation and Motion Control in Multi-Agent Systems Under Multiple Attacks. IEEE Transactions on Automation Science and Engineering 2025, 22, 12548–12559. [Google Scholar] [CrossRef]
- Raghuvamsi, Y.; Teeparthi, K. Detection and reconstruction of measurements against false data injection and DoS attacks in distribution system state estimation: A deep learning approach. Measurement 2023, 210, 112565. [Google Scholar] [CrossRef]
- Raghuvamsi, Y.; Batchu, S.; Teeparthi, K. Topology and FDIA identification in distribution system state estimation using a data-driven approach. Measurement 2025, 253, 117741. [Google Scholar] [CrossRef]
- Kamyabi, L.; Lie, T.T.; Madanian, S.; Marshall, S. A Comprehensive Review of Hybrid State Estimation in Power Systems: Challenges, Opportunities and Prospects. Energies 2024, 17. [Google Scholar] [CrossRef]
- Zhu, Y.; Xu, X.; Yan, Z. Accelerated Matrix Completion-Based State Estimation for Unobservable Distribution Networks. IEEE Transactions on Industrial Informatics 2024, 20, 13798–13810. [Google Scholar] [CrossRef]
- Yadaraju, V.P.; Kumar, M.S. Advanced AC-DC power flow analysis: evaluating the impact of control parameters on system performance. Microsystem Technologies 2024. [Google Scholar] [CrossRef]
- Rahman, M.; Yan, J.; Thepie Fapi, E. Adversarial Artificial Intelligence in Blind False Data Injection in Smart Grid AC State Estimation. IEEE Transactions on Industrial Informatics 2024, 20, 8873–8883. [Google Scholar] [CrossRef]
- Zhang, G.; Gao, W.; Li, Y.; Liu, Y.; Guo, X.; Jiang, W. Joint detection and localization of False Data Injection Attacks in smart grids: An enhanced state estimation approach. Computers and Electrical Engineering 2024, 120, 109834. [Google Scholar] [CrossRef]
- Hegazy, H.I.; Tag Eldien, A.S.; Tantawy, M.M.; Fouda, M.M.; TagElDien, H.A. Real-Time Locational Detection of Stealthy False Data Injection Attack in Smart Grid: Using Multivariate-Based Multi-Label Classification Approach. Energies 2022, 15. [Google Scholar] [CrossRef]
- Xie, F.; Wen, H.; Wu, J.; Chen, S.; Hou, W.; Jiang, Y. Convolution Based Feature Extraction for Edge Computing Access Authentication. IEEE Transactions on Network Science and Engineering 2020, 7, 2336–2346. [Google Scholar] [CrossRef]
- Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Computation 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
- Mienye, I.D.; Swart, T.G.; Obaido, G. Recurrent Neural Networks: A Comprehensive Review of Architectures, Variants, and Applications. Information 2024, 15. [Google Scholar] [CrossRef]
- Gopalakrishnan, T.; Ruby, D.; Al-Turjman, F.; Gupta, D.; Pustokhina, I.V.; Pustokhin, D.A.; Shankar, K. Deep Learning Enabled Data Offloading With Cyber Attack Detection Model in Mobile Edge Computing Systems. IEEE Access 2020, 8, 185938–185949. [Google Scholar] [CrossRef]
- Lee, T.H.; Ullah, A.; Wang, R. , P., Ed.; Springer International Publishing: Cham, 2020; pp. 389–429. https://doi.org/10.1007/978-3-030-31150-6_13.Forest. In Macroeconomic Forecasting in the Era of Big Data: Theory and Practice; Fuleky, P., Ed.; Springer International Publishing: Cham, 2020; Springer International Publishing: Cham, 2020; pp. 389–429. [Google Scholar] [CrossRef]
- Shrestha, R.; Souto, L.; Eisenkraemer, P.; Bhatta, R.; Schmitt, K.; Chamana, M.; Bayne, S.; Bilbao, A. Optimal Phasor Measurement Unit Placement Using Machine Learning Technique. In Proceedings of the 2024 16th Seminar on Power Electronics and Control (SEPOC); 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Herrera, F.; Charte, F.; Rivera, A.J.; del Jesus, M.J. , Metrics and Techniques; Springer International Publishing: Cham, 2016; pp. 17–31. https://doi.org/10.1007/978-3-319-41111-8_2.Classification. In Multilabel Classification : Problem Analysis, Metrics and Techniques; Springer International Publishing: Cham, 2016; Springer International Publishing: Cham, 2016; pp. 17–31. [Google Scholar] [CrossRef]
- Albalooshi, F.A.; Qader, M.R. Deep Learning Algorithm for Automatic Classification of Power Quality Disturbances. Applied Sciences 2025, 15. [Google Scholar] [CrossRef]
- Lu, K.D.; Zhou, L.; Wu, Z.G. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems. IEEE Transactions on Neural Networks and Learning Systems 2024, 35, 6145–6155. [Google Scholar] [CrossRef]
- Xu, G.; Meng, Y.; Qiu, X.; Yu, Z.; Wu, X. Sentiment Analysis of Comment Texts Based on BiLSTM. IEEE Access 2019, 7, 51522–51532. [Google Scholar] [CrossRef]
- Zhang, Y.; Chen, Y.; Wang, J.; Pan, Z. Unsupervised Deep Anomaly Detection for Multi-Sensor Time-Series Signals. IEEE Transactions on Knowledge and Data Engineering 2023, 35, 2118–2132. [Google Scholar] [CrossRef]
- Ben Said, R.; Sabir, Z.; Askerzade, I. CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software-Defined Networking With Hybrid Feature Selection. IEEE Access 2023, 11, 138732–138747. [Google Scholar] [CrossRef]
- Shahriar, M.H.; Rahman, M.A.; Haque, N.I.; Chowdhury, B.; Whisenant, S.G. iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems. In Proceedings of the Security and Privacy in Communication Networks; Garcia-Alfaro, J.; Li, S.; Poovendran, R.; Debar, H.; Yung, M., Eds., Cham; 2021; pp. 338–359. [Google Scholar]
- Hebrail, G.; Berard, A. Individual Household Electric Power Consumption. UCI Machine Learning Repository, 2006. [CrossRef]
- Shahriar, M.H.; Khalil, A.A.; Rahman, M.A.; Manshaei, M.H.; Chen, D. iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. In Proceedings of the 2021 IEEE Conference on Communications and Network Security (CNS); 2021; pp. 200–208. [Google Scholar] [CrossRef]













| Model | MAE | MSE | RMSE | R2 |
|---|---|---|---|---|
| CNN | 10.2596 | 276.8111 | 12.1323 | N/A |
| CNN-Transformer | 2.5116 | 16.7532 | 3.1835 | N/A |
| Transformer | 10.2524 | 281.6116 | 12.2238 | N/A |
| CNN-LSTM | 1.5055 | 6.0333 | 1.9447 | N/A |
| Transformer-LSTM | 0.9866 | 2.4492 | 1.2365 | N/A |
| AE(CNN)-LSTM | 0.0259 | 0.0012 | 0.0353 | 0.9559 |
| AE(CNN)-Bi-LSTM | 0.0245 | 0.0011 | 0.0336 | 0.9587 |
| Bi-LSTM | 0.0232 | 0.0009 | 0.0304 | 0.9606 |
| Proposed Model | 0.0072 | 0.0001 | 0.0094 | 0.9797 |
| Model | Threshold | Precision | Recall | F1-Score |
|---|---|---|---|---|
| CNN | 1.25 | 0.7632 | 0.8129 | 0.7534 |
| CNN-Transformer | 1.00 | 0.9516 | 0.9547 | 0.9515 |
| Transformer | 1.25 | 0.7379 | 0.7989 | 0.7284 |
| CNN-LSTM | 0.4 | 0.9893 | 0.9893 | 0.9893 |
| XTM (Transformer-LSTM) | 0.4 | 0.9962 | 0.9962 | 0.9962 |
| AE(CNN)-LSTM | 0.4155 | 0.99 | 0.994 | 0.992 |
| AE(CNN)-Bi-LSTM | 0.42 | 0.99 | 0.99 | 0.992 |
| Bi-LSTM | 0.3820 | 0.99 | 0.992 | 0.991 |
| Proposed Model | 0.1534 | 1 | 1 | 1 |
| Model | Precision | Recall | f1-score | RACC |
|---|---|---|---|---|
| RF | 0.9997 | 0.9997 | 0.9998 | 0.9875 |
| MLP | 0.9992 | 0.9991 | 0.9994 | 0.9667 |
| Model | MAE | MSE | RMSE | R2 |
|---|---|---|---|---|
| Proposed Model | 0.0079 | 0.0001 | 0.01115 | 0.9183 |
| Model | Threshold | Precision | Recall | f1-score |
|---|---|---|---|---|
| Proposed Model | 1.3767 | 1 | 0.93 | 0.964 |
| Model | Precision | Recall | f1-score | RACC |
|---|---|---|---|---|
| RF | 0.9993 | 0.9995 | 0.9998 | 0.9889 |
| MLP | 0.9987 | 0.9981 | 0.9994 | 0.9583 |
| Model | Threshold | Precision | Recall | f1-score |
|---|---|---|---|---|
| IEEE 14 bus | 0.1734 | 1 | 0.9756 | 0.9875 |
| IEEE 30 bus | 1.3787 | 0.8662 | 0.8174 | 0.8174 |
| Model | System | Precision | Recall | f1-score | RACC |
|---|---|---|---|---|---|
| RF | IEEE 14-Bus | 0.9984 | 0.9991 | 0.9991 | 0.9792 |
| RF | IEEE 30-Bus | 0.9971 | 0.9938 | 0.9984 | 0.9125 |
| MLP | IEEE 14-Bus | 0.9991 | 0.9989 | 0.9989 | 0.9539 |
| MLP | IEEE 30-Bus | 0.9955 | 0.9931 | 0.9980 | 0.8681 |
| Bus Combination | Model | Precision | Recall | f1-score | RACC |
|---|---|---|---|---|---|
| 1 | RF | 0.9958 | 0.9953 | 0.9955 | 0.9069 |
| 1 | MLP | 0.9980 | 0.9889 | 0.9899 | 0.7635 |
| 2 | RF | 0.9960 | 0.9957 | 0.9959 | 0.9131 |
| 3 | RF | 0.9955 | 0.9958 | 0.9957 | 0.9219 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).