Securing Power System Data in Motion by Timestamped Digital Text Watermarking

被引:0
|
作者
Roy, Siddhartha Deb [1 ]
Sharma, Ankush [1 ]
Chakrabarti, Saikat [2 ]
Debbarma, Sanjoy [3 ]
机构
[1] Indian Inst Technol Kanpur, Elect Engn Dept, Kanpur 208016, India
[2] Univ New Brunswick, Elect Engn Dept, Fredericton, NB E3B 5A3, Canada
[3] Natl Inst Technol Meghalaya, Elect & Elect Engn Dept, Shillong 793003, India
关键词
Watermarking; Security; Automatic generation control; Power system stability; Power systems; Indexes; Wide area networks; cyber-security; data integrity attacks; digital watermarking; false data injections; replay attacks; text watermarking; LOAD FREQUENCY CONTROL; DATA INJECTION ATTACKS; INTRUSION DETECTION; CYBER-ATTACKS; SCHEME; DESIGN;
D O I
10.1109/TSG.2024.3370892
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern power systems rely on Wide Area Network (WAN) for real-time data transmission and control. However, integrating WAN introduces vulnerabilities that adversaries can exploit, leading to inaccurate information, compromised decisions, and potential grid instability. The Automatic Generation Control (AGC) system, responsible for maintaining power balance, is an attractive target for attackers due to its reliance on WANs for critical signal transmission. Traditional security mechanisms like encryption, multi-factor authentication, antivirus, etc., may not be suitable for power systems due to system priorities, processing limitations, and compatibility issues. To address this, we propose a novel digital text watermarking-based approach that ensures data integrity and detects replay attacks. The watermarking technique dynamically embeds a unique timestamped watermark into sensor data, enabling detection of unauthorised modifications. The algorithm confirms data integrity by comparing the extracted and expected watermark utilizing Damerau-Levenshtein index. Timestamp analysis is employed to assist in identifying replay attacks. Notably, our technique is independent of system scale, making it practical for real-world implementation. Furthermore, the framework can be extended to secure other power system applications, enhancing overall cyber resilience. Experimental results demonstrate the efficacy of our algorithm in AGC systems while ensuring almost zero performance loss to system operations.
引用
收藏
页码:4974 / 4985
页数:12
相关论文
共 50 条
  • [1] Digital text watermarking: Secure content delivery and data hiding in digital documents
    Qadir, Muhammad Abdul
    Ahmad, Ishtiaq
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2006, 21 (11) : 18 - 21
  • [2] Digital text watermarking: Secure content delivery and data hiding in digital documents
    Qadir, MA
    Ahmad, I
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 101 - 104
  • [3] Dual watermarking: An approach for securing digital documents
    Kumar, Chandan
    Singh, Amit Kumar
    Kumar, Pardeep
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7339 - 7354
  • [4] Dual watermarking: An approach for securing digital documents
    Chandan Kumar
    Amit Kumar Singh
    Pardeep Kumar
    Multimedia Tools and Applications, 2020, 79 : 7339 - 7354
  • [5] Digital image watermarking in power system security
    Xie Ping
    Wang Xin
    Wang Ying
    Liu Jiehui
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 461 - 463
  • [7] Crypto-stego System for Securing Text and Image Data
    Sharma, Himani
    Mishra, D. C.
    Sharma, R. K.
    Kumar, Naveen
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2018, 18 (04)
  • [8] Securing biometric data by combining watermarking and cryptography
    Ouslim, Mohamed
    Sabri, Ahmed
    Mouhadjer, Hassan
    2013 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN BIOMEDICAL ENGINEERING (ABME 2013), 2013, : 179 - 182
  • [9] A Digital Text Watermarking for Word Document
    Zhang, Shi-ru
    Meng, Xiao-chun
    Liu, Xin-fu
    Chen, Wen-Yuan
    INTERNATIONAL CONFERENCE MACHINERY, ELECTRONICS AND CONTROL SIMULATION, 2014, 614 : 347 - 351
  • [10] Digital Watermarking Research Based on Text
    Wang, Xiaofeng
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 433 - 436