Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

被引:17
|
作者
Sikdar, Biplab [1 ]
Chow, Joe H. [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
关键词
Network security; smart grid; synchrophasor network; LATENCY; SECURITY;
D O I
10.1109/TSG.2011.2165090
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of synchrophasor data for observation and control is expected to enhance the operation and efficiency of the next generation of power systems. However, the specific characteristics of the data generated by synchrophasors makes them particularly vulnerable to cyber attacks. This paper presents a set of strategies to protect the anonymity of synchrophasor data against passive traffic analysis attacks. Considering the periodic nature of synchrophasor data, we propose defense mechanisms based on packet concatenation and random packet drops as a countermeasure against attacks that may use the timing as well as data volume information to compromise the network. In contrast to existing defenses against traffic analysis attacks, our scheme can be easily deployed using the current networking infrastructure as it is based on end-to-end principles and does not require any specialized routers. The proposed defense mechanisms are evaluated using both analysis and simulations.
引用
收藏
页码:819 / 826
页数:8
相关论文
共 50 条
  • [31] A lightweight solution for defending against deauthentication/disassociation attacks on 802.11 networks
    Nguyen, Thuc D.
    Nguyen, Duc H. M.
    Tran, Bao N.
    Vu, Hai
    Mittal, Neeraj
    2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 185 - +
  • [32] HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks
    Kumarasinghe, Udesh
    Nabeel, Mohamed
    De Zoysa, Kasun
    Gunawardana, Kasun
    Elvitigala, Charitha
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 698 - 705
  • [33] Evaluating strategies for defending electric power networks against antagonistic attacks
    Holmgren, Ake J.
    Jenelius, Erik
    Westin, Jonas
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (01) : 76 - 84
  • [34] Defending Against sybil-attacks in Peer-to-Peer Networks
    Xu Xiang
    Lu Huijuan
    Chen Lianna
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340
  • [35] Defending against packet injection attacks in unreliable ad hoc networks
    Gu, QJ
    Liu, P
    Zhu, SC
    Chu, CH
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1837 - 1841
  • [36] HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning
    Qiu, Pengyu
    Zhang, Xuhong
    Ji, Shouling
    Fu, Chong
    Yang, Xing
    Wang, Ting
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3435 - 3450
  • [37] Defending against mash crowds and malicious traffic attacks with an auction-based method
    Tian, ZH
    Fang, BX
    Yun, XC
    IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS, 2004, : 24 - 28
  • [38] Defending against Energy Dispatching Data Integrity Attacks in Smart Grid
    He, Xiaofei
    Yang, Xinyu
    Lin, Jie
    Ge, Linqiang
    Yu, Wei
    Yang, Qingyu
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [39] Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples
    Hayden, Blake
    Walsh, Timothy
    Barton, Armon
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [40] Defending collaborative false data injection attacks in wireless sensor networks
    Wang, Jianxin
    Liu, Zhixiong
    Zhang, Shigeng
    Zhang, Xi
    INFORMATION SCIENCES, 2014, 254 : 39 - 53