Smart Meter Data Aggregation Against Wireless Attacks: A Game-Theoretic Approach

被引:19
作者
Cao, Yang [1 ,2 ]
Duan, Dongliang [3 ]
Yang, Liuqing [4 ]
Sun, Zhi [5 ]
Zhang, Haochuan [6 ]
Yu, Rong [6 ]
机构
[1] Guangdong Elect Power Design Inst GEDI, Guangzhou 510663, Guangdong, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[3] Univ Wyoming, Dept Elect & Comp Engn, Laramie, WY 82071 USA
[4] Colorado State Univ, Dept Elect & Comp Engn, Ft Collins, CO 80523 USA
[5] SUNY Buffalo, Dept Elect Engn, Buffalo, NY 14260 USA
[6] Guangdong Univ Technol, Sch Automat, Guangzhou 510006, Guangdong, Peoples R China
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2016年
基金
美国国家科学基金会;
关键词
DATA INJECTION; SECURITY;
D O I
10.1109/ICC.2016.7510612
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The efficient design of evolving smart grid faces serious challenges of a variety of malicious attacks. In this paper, the complex decision making processes between a network of electricity users that perform wireless meter data aggregation via other users and multiple sophisticated wireless attackers that are able to act as eavesdroppers and as jammers are investigated. We model the interactions among users and attackers as a hybrid network formation-nonzero sum game. On the one hand, each user seeks to choose the next-hop user that can minimize the electricity use cost which reflects the security and reliability of its meter data transmission. On the other hand, the objective of the attackers is to choose whether to eavesdrop, jam, or use a combination of both strategies, in a way to increase the total network costs. To solve this game, we devised an algorithm based on fictitious play to reach a mixed-strategy Nash equilibrium. Simulation results suggested that the proposed meter data aggregation scheme enables the electricity users to significantly decrease their expected costs as well as adapt to sophisticated wireless attacks in the smart grid.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 18 条
[1]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[2]   Multihop diversity in wireless relaying channels [J].
Boyer, J ;
Falconer, DD ;
Yanikomeroglu, H .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2004, 52 (10) :1820-1830
[3]   Detection of False Data Injection Attacks in Smart-Grid Systems [J].
Chen, Po-Yu ;
Yang, Shusen ;
McCann, Julie A. ;
Lin, Jie ;
Yang, Xinyu .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (02) :206-213
[4]   Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study [J].
Esmalifalak, Mohammad ;
Shi, Ge ;
Han, Zhu ;
Song, Lingyang .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :160-169
[5]   Bad Data Injection in Smart Grid: Attack and Defense Mechanisms [J].
Huang, Yi ;
Esmalifalak, Mohammad ;
Huy Nguyen ;
Zheng, Rong ;
Han, Zhu ;
Li, Husheng ;
Song, Lingyang .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) :27-33
[6]  
Li FJ, 2012, INT CONF SMART GRID, P366, DOI 10.1109/SmartGridComm.2012.6486011
[7]   EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications [J].
Lu, Rongxing ;
Liang, Xiaohui ;
Li, Xu ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (09) :1621-1631
[8]   Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications [J].
Lu, Zhuo ;
Wang, Wenye ;
Wang, Cliff .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (08) :1746-1759
[9]   Smart Grid Neighborhood Area Networks: A Survey [J].
Meng, Weixiao ;
Ma, Ruofei ;
Chen, Hsiao-Hwa .
IEEE NETWORK, 2014, 28 (01) :24-32
[10]   Cyber-Physical Security of a Smart Grid Infrastructure [J].
Mo, Yilin ;
Kim, Tiffany Hyun-Jin ;
Brancik, Kenneth ;
Dickinson, Dona ;
Lee, Heejo ;
Perrig, Adrian ;
Sinopoli, Bruno .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :195-209