Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  An Approach Minimizing Message Delay for Smart Grid Applications under Jamming  
  Authors : Nidhi Khera; Hemlata Dakhore
  Cite as:

 

The smart grid is a giant "System of systems" which enables bidirectional communication methods and control capabilities with innovative deployment of cyber systems and power infrastructures with the wireless communication technologies. The constant interfering nature of jammers in the radio frequency in wireless networks creates jamming havoc in the smart grid communication system. Hence the spread spectrum techniques that uses orthogonal multiple frequency and pseudo code channels must be used in the smart grid communication systems to provide secure communication with required timing constraints for control messages. The critical problem is to minimize the message delay for timely smart grid applications under the influence of vulnerable jamming attacks. For solving this issue, we provide a reliable technique of transmitting adaptive camouflage traffic (TACT) which provides delay performance guarantee for timely smart grid applications under any kind of worst case jamming attack. We first define a generic jamming process then study the worst case methodology of jamming attacks using TACT which shows that the worst case message delay is a U-shaped function of the network traffic load at the optimum. Further the collisions between the legitimate and camouflage traffic can be avoided using message concatenation which again reduces the delay performance in the smart grid communication.

 

Published In : IJCSN Journal Volume 8, Issue 3

Date of Publication : June 2019

Pages : 322-330

Figures :08

Tables : 02

 

Nidhi Khera : G.H. Raisoni Institute of Engineering and Technology, Nagpur, Maharashtra, India.

Hemlata Dakhore : G.H. Raisoni Institute of Engineering and Technology, Nagpur, Maharashtra, India.

 

Smart grid, wireless networks, generic jamming, worst case methodology, message concatenation

In this paper, we illustrated a comprehensive study of minimizing message invalidation probability i.e. message delay for the smart grid applications under worst-case jamming attacks. We observed that the worst-case message delay is a U-shaped function of the network traffic load. We proposed a lightweight yet promising method TACT, to generate the camouflage traffic to minimize the message delay for smart grid applications under any potential jamming attack and balance the network load at the optimum point. Both the legitimate and the camouflage traffic are unknown to receivers as well as the attackers, which causes collisions between legitimate and camouflage traffic transmissions. This can be avoided using message concatenation technique which concatenates multiple data into larger packets to reduce protocol overhead and minimize collisions.

 

(1) Zhou Lu, Wenye Wang, Clidd Wang, "Camouflage Traffic: Minimizing Mesaage Delay for Samrt Grid Applications under Jamming," IEEE Trans. Dep., vol 12, no.1 , Jan/Feb. 2015 (2) M. Strasser, C. Popper, M. Cagalj: Jamming -resistant Key Establishment using Uncoordinated Frequency Hooping IEEE Symp. Security And Privacy, May 2008. (3) Randomized Differential DSSS: Jamming Resistant Wireless Broadcast Communication, IEEE Conf. IEEE INFOCOM Mar. 2010 (4) S. Capkun, M. Strasser, C.Popper: Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques, IEEE J, vol 28, no.5, June 2010.' (1) "Smart Grid Cyber Security: Challenges and Solutions" S. Shaphough, R .Aburukba, I. Conf. on smart grid, 2015. (2) "NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications" Y. Gaun, X. Fu, P. Shenoy, R. Bettati, W. Zhao, IEEE Trans. Sys. Cyber, vol 31, no.4, July 2001. (3) Hiding Traffic with Camouflage: Minimizing Message Delay in the Smart Grid under Jamming, Z. Lou, C. Wang, W. Wang, IEEE Int. Conf. Comput. Comm. 2012. (4) J. Jiang, Y. Qian: Distributed Communication Architecture for Smart Grid Applications, IEEE Commun. Mag. Dec 0216. (5) "Camouflage of Network Traffic to Resist Attack (CONTRA)" W. Weinstein, J. Lepanto, IEEE Comput. Society, pro. DARPA 2003. (6) "A Novel Security Key Recovery Framework for Smart Grid Applications" P. Haudpakanam, C. Pirak, R. Mathar, IEEE APCC 2014. (7) B. Karimi, V. Namboodiri, M. Jadliwala, "Scalable Meter Data Collection in Smart Grids Through Message Concatenation," IEEE Trans. Smart Grid, vol 6, no. 4, July 2015. (8) J. Jiang, Y.Qian :Distributed Communication Architecture for Smart Grid Applications, IEEE Communication Magazine, Dec 2016. (9) "Camouflage of Network Traffic to Resist Attack (CONTRA," W. Wienstein, J. Lepanto, IEEE Computer Society, pro.2003. (10) "A Novel Security Key Recovery Framework for Smart Grid Applications." P. Haudapaknam, C. Pirak, R. Mathar, IEEE APCC 2014. (11) B. Karimi, V. Namboodiri, M. Jadliwala: Scalable Meter Data Collection in Smart GridsThrough Message Concatenation, IEEE Trans.on Smart Grid, vol 6, no. 4, July 2015. Stochastic Weight Update in the Backpropagation Algorithm on Feed-Forward Neural Networks, Juraj Ko?s?cak, 978-1-4244-8126-2/10/$26.00 2010 IEEE [3] Introducing Stochastic processes within the backpropagation algorithm for improved convergence, 1994. [4] Stochastic Reinforcement Learning, Nikki Lijing Kuang, Clement H. C. Leung, Vol. 5, 2016 [5] Weather Forecasting Using Soft Computing: Minimum Temperature, Maximum Temperature & Pressure, Govind Kumar Rahul, Madhu Khurana, A.K.Sinha, International Journal of Engineering Research and Development, Volume 7, Issue 11, July 2013.