Securing Power System Data in Motion by Timestamped Digital Text Watermarking

被引:0
|
作者
Roy, Siddhartha Deb [1 ]
Sharma, Ankush [1 ]
Chakrabarti, Saikat [2 ]
Debbarma, Sanjoy [3 ]
机构
[1] Indian Inst Technol Kanpur, Elect Engn Dept, Kanpur 208016, India
[2] Univ New Brunswick, Elect Engn Dept, Fredericton, NB E3B 5A3, Canada
[3] Natl Inst Technol Meghalaya, Elect & Elect Engn Dept, Shillong 793003, India
关键词
Watermarking; Security; Automatic generation control; Power system stability; Power systems; Indexes; Wide area networks; cyber-security; data integrity attacks; digital watermarking; false data injections; replay attacks; text watermarking; LOAD FREQUENCY CONTROL; DATA INJECTION ATTACKS; INTRUSION DETECTION; CYBER-ATTACKS; SCHEME; DESIGN;
D O I
10.1109/TSG.2024.3370892
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern power systems rely on Wide Area Network (WAN) for real-time data transmission and control. However, integrating WAN introduces vulnerabilities that adversaries can exploit, leading to inaccurate information, compromised decisions, and potential grid instability. The Automatic Generation Control (AGC) system, responsible for maintaining power balance, is an attractive target for attackers due to its reliance on WANs for critical signal transmission. Traditional security mechanisms like encryption, multi-factor authentication, antivirus, etc., may not be suitable for power systems due to system priorities, processing limitations, and compatibility issues. To address this, we propose a novel digital text watermarking-based approach that ensures data integrity and detects replay attacks. The watermarking technique dynamically embeds a unique timestamped watermark into sensor data, enabling detection of unauthorised modifications. The algorithm confirms data integrity by comparing the extracted and expected watermark utilizing Damerau-Levenshtein index. Timestamp analysis is employed to assist in identifying replay attacks. Notably, our technique is independent of system scale, making it practical for real-world implementation. Furthermore, the framework can be extended to secure other power system applications, enhancing overall cyber resilience. Experimental results demonstrate the efficacy of our algorithm in AGC systems while ensuring almost zero performance loss to system operations.
引用
收藏
页码:4974 / 4985
页数:12
相关论文
共 50 条
  • [21] A Text Digital Watermarking for Chinese Word Document
    Liu Jin'An
    He Lu
    Fang DingYi
    Gui XiaoLin
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 217 - +
  • [22] A New Digital Watermarking Scheme Based on Text
    Yu, Zhichao
    Liu, Xiaojun
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 138 - 140
  • [23] Securing Multimodal Biometric Data through Watermarking and Steganography
    Whitelam, Cameron
    Osia, Nnamdi
    Bourlai, Thirimachos
    2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 61 - 66
  • [24] Study of a New Digital Text Watermarking Algorithm
    Han, Xiaofeng
    Li, Yan
    Liu, Guodong
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2019, 33 (06)
  • [25] Autentification of text documents using digital watermarking
    Micic, A
    Radenkovic, D
    Nikolic, S
    Telsiks 2005, Proceedings, Vols 1 and 2, 2005, : 503 - 505
  • [26] Measurement Digital Watermarking for Automated Test System Data Integrity
    Geiger, Christopher
    2019 IEEE 6TH INTERNATIONAL WORKSHOP ON METROLOGY FOR AEROSPACE (METROAEROSPACE), 2019, : 17 - 21
  • [27] Digital Watermarking Techniques Applied to Smart Power Grids for Data Security
    Yan, Xin
    Du, Jiagen
    EPLWW3S 2011: 2011 INTERNATIONAL CONFERENCE ON ECOLOGICAL PROTECTION OF LAKES-WETLANDS-WATERSHED AND APPLICATION OF 3S TECHNOLOGY, VOL 2, 2011, : 386 - 389
  • [28] Securing Digital Images over the Internet Using a Robust Watermarking Scheme
    Lee, Yun-Ho
    Yeo, Sang-Soo
    Kwak, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (03): : 315 - 322
  • [29] Digital Video Authentication with Motion Vector Watermarking
    Sharp, Aaron T.
    Devaney, James
    Steiner, Austin E.
    Peng, Dongming
    2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2010,
  • [30] Comparison between Two Text Digital Watermarking Algorithms
    TANG Sheng XUE XuceDepartment of Automation Engineering Qingdao University Qingdao Shandong
    科技信息, 2011, (31) : 333+345 - 333