Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network

Smart grid consists of smart devices to control, record and analyze the grid power flow. All these devices belong to the latest technology, which is used to interact through the wireless network making the grid communication network vulnerable to cyber attack. This paper deals with a novel approach using altering the Internet Protocol (IP) address of the smart grid communication network using fuzzy logic according to the degree of node. Through graph theory approach Wireless Communication Network (WCN) is designed by considering each node of the system as a smart sensor. In this each node communicates with other nearby nodes for exchange of data. Whenever there is cyber intrusion the WCN change its IP using proposed fuzzy rules, where higher degree nodes are given the preference to change first with extreme IP available in the system. Using the proposed algorithm, different IEEE test systems are simulated and compared with existing Dynamic Host Configuration Protocol (DHCP). The fuzzy logic approach reduces the data loss and improves the system response time.

[1]  Zhu Han,et al.  Smart grid sensor data collection, communication, and networking: a tutorial , 2014, Wirel. Commun. Mob. Comput..

[2]  Emil M. Petriu,et al.  A Review of Computational Intelligence Techniques in Wireless Sensor and Actuator Networks , 2018, IEEE Communications Surveys & Tutorials.

[3]  Baochun Li,et al.  Loss inference in wireless sensor networks based on data aggregation , 2004, IPSN.

[4]  Zhisheng Niu,et al.  Random graph theory based connectivity analysis in wireless sensor networks with Rayleigh fading channels , 2007, 2007 Asia-Pacific Conference on Communications.

[5]  Yue Gong,et al.  Fuzzy Positioning Algorithm Based on Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[6]  Padmalaya Nayak,et al.  A Fuzzy Logic-Based Clustering Algorithm for WSN to Extend the Network Lifetime , 2016, IEEE Sensors Journal.

[7]  Flávio Henrique Vieira Teles,et al.  Loss probability estimation and control for OFDM/TDMA wireless systems considering multifractal traffic characteristics , 2012, Comput. Commun..

[8]  Yongguang Zhang A multilayer IP security protocol for TCP performance enhancement in wireless networks , 2004, IEEE Journal on Selected Areas in Communications.

[9]  Xue Liu,et al.  Data Loss and Reconstruction in Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Lin LI,et al.  An Efficient Routing Algorithm based on K-means++ Clustering and Fuzzy for Wireless Sensor Network* , 2018, 2018 13th World Congress on Intelligent Control and Automation (WCICA).

[11]  Upena D. Dalal,et al.  Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN) , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[12]  Kijoon Chae,et al.  An anonymous IP-based privacy protection routing mechanism for CDNi , 2016, 2016 International Conference on Information Networking (ICOIN).

[13]  Chandan Giri,et al.  Fuzzy node localization in wireless sensor network , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).