An Intrusion Detection System for Wind Turbines Based on Thermal Models

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Ngoc Que Anh Tran, Liang He
{"title":"An Intrusion Detection System for Wind Turbines Based on Thermal Models","authors":"Ngoc Que Anh Tran,&nbsp;Liang He","doi":"10.1049/cps2.70024","DOIUrl":null,"url":null,"abstract":"<p>Wind energy plays an essential position in the renewable energy sector and is frequently deployed remotely, which makes them susceptible to intrusions that can compromise their operational system. This paper introduces a novel method <span>T–IDS</span> leveraging the interconnected thermal behaviours of wind turbine modules to identify the abnormal imprints that signify security breaches. Our approach consists of three key components: a graph model that outlines the dependencies among the thermal variables of the turbines, a random forest-based prediction strategy for these variables within the thermal graph and an anomaly detection method that assesses the predicted thermal values with actual observations. We performed extensive experiments using three real-world wind turbine supervisory control and data acquisition (SCADA) log datasets: one dataset collected over six months and two additional datasets covering 12-month operational durations from distinct wind turbine installations for rigorous cross-validation. The results demonstrate that <span>T–IDS</span> achieves an overall anomaly detection accuracy of 97.3% when detecting unusual thermal activities such as physical model damage leading to overheating or tampering temperature readings.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70024","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.70024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Wind energy plays an essential position in the renewable energy sector and is frequently deployed remotely, which makes them susceptible to intrusions that can compromise their operational system. This paper introduces a novel method T–IDS leveraging the interconnected thermal behaviours of wind turbine modules to identify the abnormal imprints that signify security breaches. Our approach consists of three key components: a graph model that outlines the dependencies among the thermal variables of the turbines, a random forest-based prediction strategy for these variables within the thermal graph and an anomaly detection method that assesses the predicted thermal values with actual observations. We performed extensive experiments using three real-world wind turbine supervisory control and data acquisition (SCADA) log datasets: one dataset collected over six months and two additional datasets covering 12-month operational durations from distinct wind turbine installations for rigorous cross-validation. The results demonstrate that T–IDS achieves an overall anomaly detection accuracy of 97.3% when detecting unusual thermal activities such as physical model damage leading to overheating or tampering temperature readings.

基于热模型的风力发电机入侵检测系统
风能在可再生能源领域占有重要地位,并且经常远程部署,这使得它们容易受到入侵,从而危及其运行系统。本文介绍了一种新的方法T-IDS,利用风力涡轮机模块的相互关联的热行为来识别表明安全漏洞的异常印记。我们的方法由三个关键部分组成:概述涡轮机热变量之间依赖关系的图形模型,热图中这些变量的基于随机森林的预测策略,以及通过实际观测评估预测热值的异常检测方法。我们使用三个真实世界的风力涡轮机监控和数据采集(SCADA)日志数据集进行了广泛的实验:一个数据集收集了六个多月,另外两个数据集涵盖了不同风力涡轮机装置12个月的运行持续时间,以进行严格的交叉验证。结果表明,在检测异常热活动(如物理模型损坏导致过热或篡改温度读数)时,T-IDS的总体异常检测准确率为97.3%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Cyber-Physical Systems: Theory and Applications
IET Cyber-Physical Systems: Theory and Applications Computer Science-Computer Networks and Communications
CiteScore
5.40
自引率
6.70%
发文量
17
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信