Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

被引:17
|
作者
Sikdar, Biplab [1 ]
Chow, Joe H. [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
关键词
Network security; smart grid; synchrophasor network; LATENCY; SECURITY;
D O I
10.1109/TSG.2011.2165090
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of synchrophasor data for observation and control is expected to enhance the operation and efficiency of the next generation of power systems. However, the specific characteristics of the data generated by synchrophasors makes them particularly vulnerable to cyber attacks. This paper presents a set of strategies to protect the anonymity of synchrophasor data against passive traffic analysis attacks. Considering the periodic nature of synchrophasor data, we propose defense mechanisms based on packet concatenation and random packet drops as a countermeasure against attacks that may use the timing as well as data volume information to compromise the network. In contrast to existing defenses against traffic analysis attacks, our scheme can be easily deployed using the current networking infrastructure as it is based on end-to-end principles and does not require any specialized routers. The proposed defense mechanisms are evaluated using both analysis and simulations.
引用
收藏
页码:819 / 826
页数:8
相关论文
共 50 条
  • [21] Defending Surveillance Sensor Networks Against Data-Injection Attacks via Trusted Nodes
    Lopez-Valcarce, Roberto
    Romero, Daniel
    2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, : 380 - 384
  • [22] Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping
    Aman, Muhammad Naveed
    Javed, Kashif
    Sikdar, Biplab
    Chua, Kee Chaing
    2016 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2016,
  • [23] Defending Support Vector Machines Against Data Poisoning Attacks
    Weerasinghe, Sandamal
    Alpcan, Tansu
    Erfani, Sarah M.
    Leckie, Christopher
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2566 - 2578
  • [24] Defending Against Data and Model Backdoor Attacks in Federated Learning
    Wang, Hao
    Mu, Xuejiao
    Wang, Dong
    Xu, Qiang
    Li, Kaiju
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39276 - 39294
  • [25] Filtering spoofed traffic at source end for defending against DoS/DDoS attacks
    Malliga, S.
    Tamilarasi, A.
    Janani, M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 216 - 220
  • [26] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Mohammadi, Payam
    Ghaffari, Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 365 - 376
  • [27] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Payam Mohammadi
    Ali Ghaffari
    Wireless Personal Communications, 2019, 106 : 365 - 376
  • [28] To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks
    Li, Qinghua
    Gao, Wei
    Zhu, Sencun
    Cao, Guohong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (03) : 168 - 182
  • [29] Defending against cache consistency attacks in wireless ad hoc networks
    Zhang, Wensheng
    Cao, Guohong
    AD HOC NETWORKS, 2008, 6 (03) : 363 - 379
  • [30] Efficacy of Defending Deep Neural Networks against Adversarial Attacks with Randomization
    Zhou, Yan
    Kantarcioglu, Murat
    Xi, Bowei
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS II, 2020, 11413