FED-SCADA: A Trustworthy and Energy-efficient Federated IDS for Smart Grid Edge Gateways Using SNNs and Differential Evolution

PDF (869KB), PP.1-15

Views: 0 Downloads: 0

Author(s)

Mohammad Othman Nassar 1,* Feras Fares AL-Mashagba 2

1. College of Information Technology, Cyber Security Department, Amman Arab University, Amman, Jordan

2. Computer Science department, Faculty of Information Technology, Jerash University, Jerash 26150, Jordan

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2025.06.01

Received: 10 Jul. 2025 / Revised: 28 Aug. 2025 / Accepted: 25 Sep. 2025 / Published: 8 Dec. 2025

Index Terms

Smart Grid, SCADA Security, Federated Learning, Spiking Neural Networks, Differential Evolution, Intrusion Detection System, Edge Computing, Cybersecurity, Energy-efficient AI, Privacy-Preserving Learning

Abstract

The increasing digitalization of smart grid systems has introduced new cybersecurity challenges, particularly at the supervisory control and data acquisition (SCADA) edge gateways where resource constraints, latency sensitivity, and privacy concerns limit the applicability of centralized security solutions. This paper presents FED-SCADA, a novel federated intrusion detection system (IDS) that integrates Spiking Neural Networks (SNNs) for energy-efficient inference and Differential Evolution (DE) for optimizing model convergence in decentralized, non-independent and identically distributed (non-IID) environments. The proposed architecture enables real-time, privacy-preserving intrusion detection across distributed SCADA subsystems in a smart grid context. FED-SCADA is evaluated using three public IIoT/SCADA datasets: TON_IoT, Edge-IIoTset, and SWaT. FED-SCADA achieves a detection accuracy of 96.4%, inference latency of 28 ms, and energy consumption of 1.1 mJ per sample, demonstrating strong performance under real-time and energy-constrained conditions outperforming base-line federated learning models such as FedAvg-CNN and FedSVM. A detailed methodology flowchart and pseudocode are included to support reproducibility. To the best of our knowledge, this is the first study to combine neuromorphic computing, evolutionary optimization, and federated learning for trustworthy and efficient smart grid cybersecurity.

Cite This Paper

Mohammad Othman Nassar, Feras Fares AL-Mashagba, "FED-SCADA: A Trustworthy and Energy-efficient Federated IDS for Smart Grid Edge Gateways Using SNNs and Differential Evolution", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.6, pp.1-15, 2025. DOI:10.5815/ijcnis.2025.06.01

Reference

[1]M. A. Husnoo, A. Anwar, H. T. Reda, N. Hosseinzadeh, S. N. Islam, A. N. Mahmood, and R. Doss, “FedDiSC: A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination,” Energy AI, vol. 13, p. 100271, Oct. 2023. doi: 10.1016/j.egyai.2023.100271
[2]M. A. Husnoo, A. Anwar, H. T. Reda, N. Hosseinzadeh, S. N. Islam, A. N. Mahmood, and R. Doss, “FeDiSa: A semi-asynchronous federated learning framework for power system fault and cyberattack discrimination,” in Proc. IEEE INFOCOM Workshops, 2023. doi: 10.1109/INFOCOMWKSHPS57453.2023.10226030
[3]A. S. Emambocus, M. B. Jasser, A. Mustapha, and A. Amphawan, “Dragonfly algorithm and its hybrids: A survey on performance, objectives and applications,” Sensors, vol. 21, no. 22, p. 7542, 2021. doi: 10.3390/s21227542
[4]M. S. Daoud, M. Al-Betar, A. Alyasseri, A. Mafarja, and S. Mirjalili, “Recent advances of chimp optimization algorithm,” J. Bionic Eng., vol. 20, pp. 2840–2862, 2023. doi: 10.1007/s42235-023-00238-1
[5]M. Shehab, I. Mashal, Z. Momani, and A. Almomani, “Harris Hawks Optimization Algorithm: Variants and applications,” Arch. Comput. Methods Eng., vol. 29, pp. 5579–5603, 2022. doi: 10.1007/s11831-022-09780-1
[6]R. Canonico and G. Sperlì, “Industrial cyber-physical systems protection: A methodological review,” Comput. Secur., vol. 135, p. 103531, 2023. doi: 10.1016/j.cose.2023.103531
[7]N. Jeffrey, Q. Tan, and J. R. Villar, “A review of anomaly detection strategies to detect threats to cyber-physical systems,” Electronics, vol. 12, no. 15, p. 3283, 2023. doi: 10.3390/electronics12153283
[8]S. Siddique, M. A. Haque, R. H. Rifat, L. R. Das, S. Talukder, S. B. Alam, and K. D. Gupta, “Challenges and opportunities of computational intelligence in industrial control system (ICS),” in Proc. IEEE SSCI, 2023. doi: 10.1109/SSCI52147.2023.10371954
[9]Ibrahim et al., “A novel color visual cryptography approach based on Harris Hawks Optimization algorithm,” Symmetry, vol. 15, no. 7, p. 1305, 2023. doi: 10.3390/sym15071305
[10]M. Manias et al., “Trends in smart grid cyber-physical security: Components, threats, and solutions,” IEEE Access, vol. 12, 2024. doi: 10.1109/ACCESS.2024.3477714
[11]L.-H. Nguyen et al., “Towards Secured Smart Grid 2.0: Exploring security threats, protection models, and challenges,” arXiv preprint, Nov. 2024. doi: 10.48550/arXiv.2411.04365
[12]Z. Chang et al., “A review of power system false data attack detection technology based on big data,” Information, vol. 15, no. 8, p. 439, 2024. doi: 10.3390/info15080439
[13]Priyadarshini, “Anomaly detection of IoT cyberattacks in smart cities using federated learning,” Big Data Cogn. Comput., vol. 8, no. 3, p. 21, 2024. doi: 10.3390/bdcc8030021
[14]D. Mienye and T. G. Swart, “Deep convolutional neural networks in medical image analysis: A review,” Information, vol. 16, no. 3, p. 195, 2025. doi: 10.3390/info16030195
[15]M. Al Ghamri et al., “Whale optimization algorithm for feature selection enhances classification in malware datasets,” J. Comput. Cogn. Eng., vol. 3, no. 2, pp. 75–85, 2024. doi: 10.47852/bonviewJCCE42024233
[16]L. C. Garaffa, A. Aljuffri, C. Reinbrecht, S. Hamdioui, M. Taouil, and J. Sepulveda, "Revealing the Secrets of Spiking Neural Networks: The Case of Izhikevich Neuron," in Proc. DSD, 2021, doi: 10.1109/DSD53832.2021.00083.
[17]ICHAT 2024 Proceedings, “Hybrid and Advanced Technologies,” Taylor & Francis, 2025. doi: 10.1201/9781003559139
[18]M. O. Nassar and F. F. Al-Mashagba, “Optimal ensemble learning with meta-heuristics for multiclass classification of syscall-binder interactions in mobile applications,” J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl., vol. 16, no. 1, pp. 26–48, 2025. doi: 10.58346/JOWUA.2025.I1.002
[19]Shannaq et al., “Exploring metaheuristic optimization algorithms in the context of textual cyberharassment: A systematic review,” Expert Syst., vol. 42, p. e13826, 2025. doi: 10.1111/exsy.13826
[20]V. Suresh Kumar et al., "Implementation of a novel secured authentication protocol for cyber security applications," Sci. Rep., 2024, doi: 10.1038/s41598-024-76306-z.
[21]M. Shehab et al., “Harris Hawks Optimization Algorithm: Variants and applications,” Arch. Comput. Methods Eng., vol. 29, pp. 5579–5603, 2022. doi: 10.1007/s11831-022-09780-1
[22]M. El-Hajj, “Enhancing communication networks in the new era with artificial intelligence: Techniques, applications, and future directions,” Network, vol. 5, no. 1, Jan. 2025. doi: 10.3390/network5010001
[23]Pinto, L.-C. Herrera, Y. Donoso, and J. A. Gutierrez, “Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure,” Sensors, vol. 23, no. 5, p. 2415, 2023. doi: 10.3390/s23052415
[24]X. Lu, L. Cao, and X. Du, "Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition," IEEE Access, vol. 8, pp. 160317–160330, 2020, doi: 10.1109/ACCESS.2020.3021415.
[25]Dehlaghi-Ghadim et al., “Anomaly detection dataset for industrial control systems,” IEEE Access, 2023. doi: 10.1109/ACCESS.2023.3320928
[26]D. Fawzy, S. M. Moussa, and N. L. Badr, "The Internet of Things and Architectures of Big Data Analytics: Challenges of Intersection at Different Domains," IEEE Access, vol. 10, pp. 5079–5100, 2022, doi: 10.1109/ACCESS.2022.3140409.
[27]R. Singh et al., "AI-enhanced smart grid framework for intrusion detection and mitigation in EV charging stations," Alexandria Eng. J., vol. 66, pp. 343–355, 2025, doi: 10.1016/j.aej.2024.12.061.
[28]K. Demestichas and E. Daskalakis, "Information and Communication Technology Solutions for the Circular Economy," Sustainability, vol. 12, no. 18, p. 7272, 2020, doi: 10.3390/su12187272.
[29]H. N. Noura et al., "Advanced Machine Learning in Smart Grids: An Overview," Internet of Things and Cyber-Physical Systems, vol. 5, pp. 25–39, 2025, doi: 10.1016/j.iotcps.2025.05.002.
[30]Orman, “Cyberattack detection systems in IIoT networks in big data environments,” Appl. Sci., vol. 15, no. 6, p. 3121, Mar. 2025. doi: 10.3390/app15063121
[31]S. A. Sharaf et al., "Advanced mathematical modeling of mitigating security threats in smart grids through deep ensemble model," Sci. Rep., 2024, doi: 10.1038/s41598-024-74733-6.
[32]J. Ranjith, K. Mahantesh, and C. N. Abhilash, "LW-PWECC: Cryptographic Framework of Attack Detection and Secure Data Transmission in IoT," J. Robot. Control (JRC), vol. 5, no. 1, pp. 82–92, 2024, doi: 10.18196/jrc.v5i1.20514.
[33]J. Yuan, J. Lin, Q. Alasad, and S. Taheri, "Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things," Electronics, vol. 6, no. 3, p. 67, 2017, doi: 10.3390/electronics6030067.
[34]N. Sugunaraj et al., “Distributed energy resource management system (DERMS) cybersecurity scenarios, trends, and potential technologies: A review,” IEEE Commun. Surv. Tutor., Jan. 2025. doi: 10.1109/comst.2025.3534828