Securing Power System Data in Motion by Timestamped Digital Text Watermarking

被引:0
|
作者
Roy, Siddhartha Deb [1 ]
Sharma, Ankush [1 ]
Chakrabarti, Saikat [2 ]
Debbarma, Sanjoy [3 ]
机构
[1] Indian Inst Technol Kanpur, Elect Engn Dept, Kanpur 208016, India
[2] Univ New Brunswick, Elect Engn Dept, Fredericton, NB E3B 5A3, Canada
[3] Natl Inst Technol Meghalaya, Elect & Elect Engn Dept, Shillong 793003, India
关键词
Watermarking; Security; Automatic generation control; Power system stability; Power systems; Indexes; Wide area networks; cyber-security; data integrity attacks; digital watermarking; false data injections; replay attacks; text watermarking; LOAD FREQUENCY CONTROL; DATA INJECTION ATTACKS; INTRUSION DETECTION; CYBER-ATTACKS; SCHEME; DESIGN;
D O I
10.1109/TSG.2024.3370892
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern power systems rely on Wide Area Network (WAN) for real-time data transmission and control. However, integrating WAN introduces vulnerabilities that adversaries can exploit, leading to inaccurate information, compromised decisions, and potential grid instability. The Automatic Generation Control (AGC) system, responsible for maintaining power balance, is an attractive target for attackers due to its reliance on WANs for critical signal transmission. Traditional security mechanisms like encryption, multi-factor authentication, antivirus, etc., may not be suitable for power systems due to system priorities, processing limitations, and compatibility issues. To address this, we propose a novel digital text watermarking-based approach that ensures data integrity and detects replay attacks. The watermarking technique dynamically embeds a unique timestamped watermark into sensor data, enabling detection of unauthorised modifications. The algorithm confirms data integrity by comparing the extracted and expected watermark utilizing Damerau-Levenshtein index. Timestamp analysis is employed to assist in identifying replay attacks. Notably, our technique is independent of system scale, making it practical for real-world implementation. Furthermore, the framework can be extended to secure other power system applications, enhancing overall cyber resilience. Experimental results demonstrate the efficacy of our algorithm in AGC systems while ensuring almost zero performance loss to system operations.
引用
收藏
页码:4974 / 4985
页数:12
相关论文
共 50 条
  • [41] Optical watermarking system by digital holography
    Lin, Li-Chien
    Cheng, Chau-Jern
    Chen, Chiung-Liang
    PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON DISPLAY HOLOGRAPHY: ADVANCES IN DISPLAY HOLOGRAPHY, 2006, : 268 - 270
  • [42] Digital Image Authentication System Based on Digital Watermarking
    Bhargava, Neeraj
    Sharma, M. M.
    Garhwal, Abhimanyu Singh
    Mathuria, Manish
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 185 - 189
  • [43] Digital signal processing system for digital watermarking implementation
    Zoican, S
    Telsiks 2005, Proceedings, Vols 1 and 2, 2005, : 225 - 228
  • [44] Securing Power System State Estimation
    Zhang, Jiexin
    Liu, Xiaoxue
    Zhu, Peidong
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 699 - 706
  • [45] Securing Digital Information using the Rakaposhi System
    Aissa, Belmeguenai
    Khaled, Mansouri
    Nadir, Derouiche
    2016 17TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA'2016), 2016, : 298 - +
  • [46] A digital watermarking algorithm based on Data Matrix
    Zheng, Qiumei
    Jin, Xiao
    Gu, Guomin
    Wang, Fenghua
    Zhongguo Shiyou Daxue Xuebao (Ziran Kexue Ban)/Journal of China University of Petroleum (Edition of Natural Science), 2015, 39 (01): : 188 - 193
  • [47] Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking
    Thanki, Rohit M.
    Borisagar, Komal Rajendrakumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (04) : 35 - 53
  • [48] Motion data integration and monitoring of digital assembly system of aircraft
    Wang, Q. (wqing@zju.edu.cn), 1600, Zhejiang University (47):
  • [49] Text information hiding and recovery via wavelet digital watermarking method
    Zhou, Xiaohui
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [50] A Secure Digital Text Watermarking Algorithm for Portable Document Format (PDF)
    Khadim, Umair
    Iqbal, Muhammad Munwar
    Azam, Muhammad Awais
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2022, 41 (01) : 100 - 110