4.2 Future Work
The current system is already the best solution to date
and very efficient and resilient but continuous
research would take place to analyse the algorithm
where in future more complex and large scale
cyberattacks could be handled by the algorithm. Also,
investigating advanced anomaly detection models
will benefit security in better detecting zero-day
threats. The optimization model may also be extended
to make use of predictive analytics in order to
anticipate energy demand in the future based on
weather reports and long-term trends, allowing for an
even more efficient use of resources.
5 CONCLUSIONS
In this research, we propose a new smart grid
framework that integrates AI in tackling two among
the most challenging urgent demands of modern
grids; tackling efficient real time intrusion detection
and simultaneously secure power flow optimization.
The framework employs Reinforcement Learn (RL)
by integrating explainable AI (XAI) methods to
guarantee cybersecurity, and maintain operational
efficiency against the backdrop of cyber-attacks and
dynamic energy protrusions.
Our proposed Intrusion Detection System (IDS)
based on Deep Learning and ensemble methods
outperformed the conventional systems with 98.5%
overall detection accuracy. Implementing
explainability into the Intrusion Detection System,
via SHAP and LIME, offered operators valuable
transparency as they look for solutions that do not
amount to data 'black box', enhancing trust and
enabling rapid-informed decision-making. The
ability to interpret and understand the system’s
decisions helps bridge a gap in many AI-driven
cybersecurity systems that otherwise suffer from
“black-box” limitations.
The Power Flow Optimization component, which
uses Reinforcement learning, made a 12%
improvement in energy loss reduction while an
attack was going on, and still without losing stability.
This shows how AI can dynamically improve power
distribution, adjusting to natural grid operations as
well as threats. Furthermore, the system's scalability
was demonstrated as deployment was successful in
both microgrids and large-scale national grid
simulations, indicating that the framework can be
used across different grid infrastructures.
While success of this system has been proven,
further research may also be dedicated to expanding
the following capabilities of our associated systems
by either improving the ability of the IDS to detect
more capable attacks e.g. from advanced persistent
threats (APT) or using predictive analytics that could
be integrated into the power flow optimization
module to better predict anticipated energy demands.
Thus, this study proposes a complete solution for
the dual issues of cyber security and power flow,
ultimately leading to a more resilient, efficient smart
grid infrastructure. This framework, which integrates
the functionalities of AI, specifically explainable AI,
enhances performance as well as developing trust
from both the operators and stakeholders, showcasing
an important step towards smart grid technology.
REFERENCES
Bernstein, A., Reyes-Chamorro, L., Le Boudec, J.-Y., &
Paolone, M. (2015). A composable method for real-
time control of active distribution networks with
explicit power setpoints. Part I: Framework. Electric
Power Systems Research, 125, 254–264.
Bernstein, A., & Bouman, N. (2016). The vision of
Commelec: Real-time control of electrical grids by
using explicit power setpoints. EPFL Technical Report.
Dehghantanha, A., & Choo, K.-K. R. (2015). Forensic
investigation of OneDrive, Box, GoogleDrive and
Dropbox applications on Android and iOS devices.
Australian Journal of Forensic Sciences, 47(3), 285–
296.
Dehghantanha, A., & Choo, K.-K. R. (2015). SugarSync
forensic analysis. Australian Journal of Forensic
Sciences, 47(4), 386–401.
Dehghantanha, A., & Choo, K.-K. R. (2016).
Contemporary digital forensic investigations of cloud
and mobile applications. Syngress.
Dehghantanha, A., & Choo, K.-K. R. (2016). Cloud storage
forensics: MEGA as a case study. Australian Journal of
Forensic Sciences, 48(3), 323–338.
Dehghantanha, A., & Franke, K. (2017). Cyber threat
intelligence: Machine learning for cyber security
analytics. Advances in Information Security, 70, 1–22.
Hamann, A., & Hug, G. (2016). Using cascaded
hydropower like a battery to firm variable wind
generation. In IEEE PES General Meeting (pp. 1–5).
Hug-Glanzmann, G., & Andersson, G. (2009). N-1 security
in optimal power flow control applied to limited areas.
IET Generation, Transmission & Distribution, 3(2),
206–215.
Hug-Glanzmann, G., & Andersson, G. (2009).
Decentralized optimal power flow control for
overlapping areas in power systems. IEEE Transactions
on Power Systems, 24(1), 327–336.
Hug, G. (2016). Integration of optimal storage operation
into marginal cost curve representation. Energy
Systems, 7(3), 391–409.