Advances, Systems and Applications
From: A fog-edge-enabled intrusion detection system for smart grids
Symbol | Description |
---|---|
\(CT_i\) | Each Client in the FL setup, denoted as \(CT_i\) |
\({L_{SVM}}_i\) | Local SVM model associated with each client, \(CT_i\) |
\({l_{mp}}_i\) | Local model parameters of SVM model \(CT_i\), including weights and biases |
\(G_{svm}\) | Global SVM model, representing the collective knowledge of all clients in the FL setup |
\(G_{mp}\) | Global model parameters, including the weights and biases of the global SVM model |
\(Fed_{SVM}\) | Function representing the FL process with SVM |
\(Ud_{SVM}\) | Function used for updating SVM weights in the FL process |
K | Number of smart meters in the FL setup |
T | Number of iterations in the FL process |
\(I_w\) | Initial SVM weights |
C | Regularization parameter used in SVM training |
\(I_b\) | Initial SVM bias |
\({w}_g\) | Global SVM weights |
\(b_g\) | Global SVM bias |
\(\mu\) | Smart Meters |
X | Subset of Smart Meters |
V | Vulnerability |
\(V = \{v_1, v_2, \ldots , v_n\}\) | Set of Vulnerable Models |
\(v_i\) | Vulnerable Smart Meter Model |
F | Firmware of Smart Meters |
\(F_{mal}\) | Malicious Firmware Update |
\(X = \{x_1, x_2, \ldots , x_n\}\) | Set of Smart Meters |
\(X = \{x_1, x_2, \ldots , x_m\}\) | Set of Compromised Smart Meters |
\(F(X) = F_{mal}\) | Installation of Malicious Firmware |
\(R(X) = R_{man}\) | Manipulation of Meter Readings |
\(C(X) = C_{man}\) | Tampering with Consumption Data |
\(D(X) = D_{ds}\) | Disruption of Communication |
\(G(N \setminus X) = G_{{com}}\) | Compromise of Other Devices |
C(X) | Unauthorized Control |
\(M_{Data}(X)\) | Manipulated Energy Consumption Data |
\(D_{Hub}\) | Central Data Hub |
\(P_{DS}\) | Power Disruption |
\(F_{LS}\) | Financial Losses |
\(I_{IV}\) | Investigation Phase |
\(\alpha\) | Set of Attackers |
P | Set of Potential Vulnerabilities |
\(T \subseteq \mu\) | Target Smart Meters |
\(P(T) = P_{{idf}}\) | Identified Vulnerabilities |
G | Compromised Network Devices |
\(G(N) = G_{{com}}\) | Compromised Devices |
\(X \subseteq \mu\) | Compromised Smart Meters |
\(N_d\) | Set of Network Devices (Gateways, Routers) |