Skip to main content

Advances, Systems and Applications

Table 3 Table of Symbols Used

From: A fog-edge-enabled intrusion detection system for smart grids

Symbol

Description

\(CT_i\)

Each Client in the FL setup, denoted as \(CT_i\)

\({L_{SVM}}_i\)

Local SVM model associated with each client, \(CT_i\)

\({l_{mp}}_i\)

Local model parameters of SVM model \(CT_i\), including weights and biases

\(G_{svm}\)

Global SVM model, representing the collective knowledge of all clients in the FL setup

\(G_{mp}\)

Global model parameters, including the weights and biases of the global SVM model

\(Fed_{SVM}\)

Function representing the FL process with SVM

\(Ud_{SVM}\)

Function used for updating SVM weights in the FL process

K

Number of smart meters in the FL setup

T

Number of iterations in the FL process

\(I_w\)

Initial SVM weights

C

Regularization parameter used in SVM training

\(I_b\)

Initial SVM bias

\({w}_g\)

Global SVM weights

\(b_g\)

Global SVM bias

\(\mu\)

Smart Meters

X

Subset of Smart Meters

V

Vulnerability

\(V = \{v_1, v_2, \ldots , v_n\}\)

Set of Vulnerable Models

\(v_i\)

Vulnerable Smart Meter Model

F

Firmware of Smart Meters

\(F_{mal}\)

Malicious Firmware Update

\(X = \{x_1, x_2, \ldots , x_n\}\)

Set of Smart Meters

\(X = \{x_1, x_2, \ldots , x_m\}\)

Set of Compromised Smart Meters

\(F(X) = F_{mal}\)

Installation of Malicious Firmware

\(R(X) = R_{man}\)

Manipulation of Meter Readings

\(C(X) = C_{man}\)

Tampering with Consumption Data

\(D(X) = D_{ds}\)

Disruption of Communication

\(G(N \setminus X) = G_{{com}}\)

Compromise of Other Devices

C(X)

Unauthorized Control

\(M_{Data}(X)\)

Manipulated Energy Consumption Data

\(D_{Hub}\)

Central Data Hub

\(P_{DS}\)

Power Disruption

\(F_{LS}\)

Financial Losses

\(I_{IV}\)

Investigation Phase

\(\alpha\)

Set of Attackers

P

Set of Potential Vulnerabilities

\(T \subseteq \mu\)

Target Smart Meters

\(P(T) = P_{{idf}}\)

Identified Vulnerabilities

G

Compromised Network Devices

\(G(N) = G_{{com}}\)

Compromised Devices

\(X \subseteq \mu\)

Compromised Smart Meters

\(N_d\)

Set of Network Devices (Gateways, Routers)