A two-step trace model for the detection of UVI attacks against power grids in the wireless network

被引:1
|
作者
Benisha, R. B. [1 ]
Ratna, S. Raja [1 ]
机构
[1] VV Coll Engn, Dept Comp Sci & Engn, Tisaiyanvilai, Tirunelveli, India
关键词
Ultraviolet; Resistance; Network security; Detection; Malicious; Supervisory control and data acquisition; CYBER SECURITY; FRAMEWORK;
D O I
10.1007/s00500-020-05520-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the extensive development of information transmission in the SCADA power grids, securing the network has become more challenging for guaranteed measurements and transformations. An ultraviolet injection attack (UVI) is infused with malicious data and obstruct in planning the centers that cause a high reduction in the power grids. To overcome this problem, two-step trace model is used that includes both tracing and prevention. In the first step, data from different nodes are used for tracing the UVI attacks. Additionally, the Redundancy measurement unit is employed to enhance the measurement values. In the second step, a Game-theoretic stable algorithm is established to optimize the consumption of resistance nodes. Experimental results are simulated and compared to improve performance efficiency and accuracy.
引用
收藏
页码:5199 / 5207
页数:9
相关论文
共 50 条
  • [1] A two-step trace model for the detection of UVI attacks against power grids in the wireless network
    R. B. Benisha
    S. Raja Ratna
    Soft Computing, 2021, 25 : 5199 - 5207
  • [2] On Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids
    Isozaki, Yasunori
    Yoshizawa, Shinya
    Fujimoto, Yu
    Ishii, Hideaki
    Ono, Isao
    Onoda, Takashi
    Hayashi, Yasuhiro
    2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 842 - 847
  • [3] Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs
    Isozaki, Yasunori
    Yoshizawa, Shinya
    Fujimoto, Yu
    Ishii, Hideaki
    Ono, Isao
    Onoda, Takashi
    Hayashi, Yasuhiro
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) : 1824 - 1835
  • [4] Two-step Convolutional Neural Network for Image Defect Detection
    Zhang, Mei
    Wu, Jinglan
    Yuan, Peng
    Zhu, Jinhui
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 8525 - 8530
  • [5] A Two-Step Procedure for On-Line Detection of Power Oscillations
    Lauria, D.
    Pisani, C.
    INTERNATIONAL REVIEW OF ELECTRICAL ENGINEERING-IREE, 2012, 7 (04): : 4936 - 4947
  • [6] Minimize the total power consumption for multiuser video transmission over CDMA wireless network: A two-step approach
    Lu, X
    Wang, Y
    Erkip, E
    Goodinan, D
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 941 - 944
  • [7] Predictive fault detection and diagnosis of nuclear power plant using the two-step neural network models
    Bae, Hyeon
    Chun, Seung-Pyo
    Kim, Sungshin
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 420 - 425
  • [8] Towards trace detection of 85Kr by two-step excitation and field ionization
    Li, XH
    Lassen, J
    Schuessler, HA
    RESONANCE IONIZATION SPECTROSCOPY 2000, 2001, 584 : 59 - 63
  • [9] Semantic-Based Detection Architectures Against Monitoring-Control Attacks in Power Grids
    Constante, Gonzalo
    Moya, Christian
    Wang, Jiankang
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2019,
  • [10] Improved Model for the Stability Analysis of Wireless Sensor Network Against Malware Attacks
    Ojha, Rudra Pratap
    Srivastava, Pramod Kumar
    Sanyal, Goutam
    Gupta, Nishu
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2525 - 2548