A two-step trace model for the detection of UVI attacks against power grids in the wireless network

被引:1
|
作者
Benisha, R. B. [1 ]
Ratna, S. Raja [1 ]
机构
[1] VV Coll Engn, Dept Comp Sci & Engn, Tisaiyanvilai, Tirunelveli, India
关键词
Ultraviolet; Resistance; Network security; Detection; Malicious; Supervisory control and data acquisition; CYBER SECURITY; FRAMEWORK;
D O I
10.1007/s00500-020-05520-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the extensive development of information transmission in the SCADA power grids, securing the network has become more challenging for guaranteed measurements and transformations. An ultraviolet injection attack (UVI) is infused with malicious data and obstruct in planning the centers that cause a high reduction in the power grids. To overcome this problem, two-step trace model is used that includes both tracing and prevention. In the first step, data from different nodes are used for tracing the UVI attacks. Additionally, the Redundancy measurement unit is employed to enhance the measurement values. In the second step, a Game-theoretic stable algorithm is established to optimize the consumption of resistance nodes. Experimental results are simulated and compared to improve performance efficiency and accuracy.
引用
收藏
页码:5199 / 5207
页数:9
相关论文
共 50 条
  • [11] Improved Model for the Stability Analysis of Wireless Sensor Network Against Malware Attacks
    Ojha, Rudra Pratap
    Srivastava, Pramod Kumar
    Sanyal, Goutam
    Gupta, Nishu
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2525 - 2548
  • [12] Microaneurysm detection in fundus images using a two-step convolutional neural network
    Eftekhari, Noushin
    Pourreza, Hamid-Reza
    Masoudi, Mojtaba
    Ghiasi-Shirazi, Kamaledin
    Saeedi, Ehsan
    BIOMEDICAL ENGINEERING ONLINE, 2019, 18 (1)
  • [13] Microaneurysm detection in fundus images using a two-step convolutional neural network
    Noushin Eftekhari
    Hamid-Reza Pourreza
    Mojtaba Masoudi
    Kamaledin Ghiasi-Shirazi
    Ehsan Saeedi
    BioMedical Engineering OnLine, 18
  • [14] Harmonic Detection for Active Power Filter Based on Two-Step Improved EEMD
    Wang, Rongkun
    Huang, Wenjie
    Hu, Bingtao
    Du, Quankai
    Guo, Xinhua
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [15] Two-step path loss prediction by artificial neural network for wireless service area planning
    Saito, Kentaro
    Jin, Yongri
    Kang, CheChia
    Takada, Jun-ichi
    Leu, Jenq-Shiou
    IEICE COMMUNICATIONS EXPRESS, 2019, 8 (12): : 611 - 616
  • [16] Resource Allocation Mechanism Based on Two-Step Mapping for Saving Energy in Wireless Network Virtualization
    Zou, Sai
    Zhang, Yangxian
    Tang, YuLiang
    2015 IEEE 9TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2015, : 150 - 154
  • [17] Two-step Rule Estimation (TRE) - Intrusion detection method against eluding NIDS
    Choi, BC
    Seo, DI
    Sohn, SW
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 504 - 507
  • [18] Bus transit network design with uncertainties on the basis of a metro network: A two-step model framework
    Liang, Jinpeng
    Wu, Jianjun
    Gao, Ziyou
    Sun, Huijun
    Yang, Xin
    Lo, Hong K.
    TRANSPORTATION RESEARCH PART B-METHODOLOGICAL, 2019, 126 : 115 - 138
  • [19] An Extended Power Flow Calculation Model Based on Power Droop Bus and Two-Step Analysis
    Feng Z.
    Jiang T.
    Wan K.
    Li Q.
    Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2023, 38 (09): : 2335 - 2349
  • [20] A two-step rumor detection model based on the supernetwork theory about Weibo
    Dong, Xuefan
    Lian, Ying
    Chi, Yuxue
    Tang, Xianyi
    Liu, Yijun
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (10): : 12050 - 12074