Electric load forecasting under False Data Injection Attacks using deep learning

Moradzadeh A., Mohammadpourfard M., Konstantinou C., Genç V. M. İ., Kim T., Mohammadi-Ivatloo B.

Energy Reports, vol.8, pp.9933-9945, 2022 (SCI-Expanded) identifier

  • Publication Type: Article / Article
  • Volume: 8
  • Publication Date: 2022
  • Doi Number: 10.1016/j.egyr.2022.08.004
  • Journal Name: Energy Reports
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Page Numbers: pp.9933-9945
  • Keywords: Cybersecurity, Deep learning, False Data Injection Attack, Load forecasting, Smart grid
  • Istanbul Technical University Affiliated: Yes


© 2022 The Author(s)Precise electric load forecasting at different time horizons is an essential aspect for electricity producers and consumers who participate in energy markets in order to maximize their economic efficiency. Moreover, accurate prediction of the electric load contributes toward robust and resilient power grids due to the error minimization of generators scheduling schemes. The accuracy of the existing electric load forecasting methods relies on data quality due to noisy real-world environments, and data integrity due to malicious cyber-attacks. This paper proposes a cyber-secure deep learning framework that accurately predicts electric load in power grids for a time horizon spanning from an hour to a week. The proposed deep learning framework systematically integrates Autoencoder (AE), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM) models (AE-CLSTM). The feasibility of the proposed solution is validated by using realistic grid data acquired from the distribution network of Tabriz, Iran. Compared to other load forecasting methods, the proposed method shows the highest accuracy in both a normal case with real-world noise and a stealthy False Data Injection Attack (FDIA). The proposed load forecasting method is practical and suitable for mitigating noise in real-world data and integrity attacks.