Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system

被引:0
作者
Jiyoung Lim
Inshil Doh
Kijoon Chae
机构
[1] Korean Bible University,Department of Computer Software
[2] Ewha Womans University,Department of Computer Science and Engineering
来源
Soft Computing | 2016年 / 20卷
关键词
Smart grid system; Overlay network; Reinforcement learning; Security; Authentication; Integrity; Attack detection;
D O I
暂无
中图分类号
学科分类号
摘要
As an efficient and intelligent system for managing and monitoring electricity usage, the “smart grid” has many useful applications. It supports energy producers and energy consumers efficiently by supporting the estimation and provision of the proper amount of electricity at the proper time. The most serious threat to a smart grid system may be when information is altered or forged by attackers; the system could malfunction and could collapse. In some cases, the attackers could waste system resources on purpose and this could lead to disastrous results. In this paper, we propose security system architecture to provide the secure and reliable smart grid service. It includes a data authentication process to verify the aggregated data and virtual network management to detect a compromised area or node. It detects a false data injection attack and further prevents a denial of service attack efficiently with less overhead for the individual devices comprising the smart grid system.
引用
收藏
页码:1829 / 1840
页数:11
相关论文
共 45 条
  • [1] Fouda MM(2011)A light-weight message authentication scheme for smart grid communications IEEE Trans Smart Grid 2 675-685
  • [2] Fadlullah ZM(2013)A multi-agent system architecture for smart grid management and forecasting of energy demand in virtual power plants IEEE Commun Mag 51 106-113
  • [3] Kato N(2010)Malicious data attacks on the smart grid Smart-grid security issues. IEEE Secur Priv 8 81-85
  • [4] Lu R(2011)Multicast authentication in the smart grid with one-time signature IEEE Trans Smart Grid 2 645-658
  • [5] Xuemin S(2011)Securing smart grid. Cyber attacks, countermeasures and challenges IEEE Trans Smart Grid 2 686-696
  • [6] Hernandez L(2012)False data injection attacks against state estimation in electric power grids IEEE Commun Mag 50 38-45
  • [7] Baladron C(2011)EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications ACM Trans Inf Syst Secur (TISSEC) 14 13-1632
  • [8] Aguiar JM(2012)Do not snoop my habits: preserving privacy in the smart grid IEEE Trans Parallel Distribut Syst 23 1621-172
  • [9] Carro B(2012)A survey on the communication architectures in smart grids IEEE Commun Mag 50 166-3629
  • [10] Sanchez-Esguevillas A(2011)Distributed intrusion detection system in a multi-layer network architecture of smart grids Comput Netw 55 3604-808