A Trust-Management Toolkit for Smart-Grid Protection Systems

This paper discusses the trust-management toolkit, which is a robust and configurable protection system augmentation, which can successfully function in the presence of an untrusted (malfunctioning) smart grid (i.e., communication-based, protection system nodes). The trust-management toolkit combines reputation-based trust with network-flow algorithms to identify and mitigate faulty smart-grid protection nodes. The toolkit assigns trust values to all protection nodes. Faulty nodes, attributed to component or communication system malfunctions (either intentional or unintentional), are assigned a lower trust value, which indicates a higher risk of failure to mitigate detected faults. The utility of the toolkit is demonstrated through simulations comparing “enhanced” backup and special protection systems to original “unenhanced” systems via an analysis of variance analysis. The results show promise for the toolkit in the smart-grid protection system.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Vijay Vittal,et al.  Transient Stability Test Systems for Direct Stability Methods , 1992 .

[3]  Kenneth P. Birman,et al.  Reliable Distributed Systems: Technologies, Web Services, and Applications , 2005 .

[4]  Todd R. Andel,et al.  Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid , 2011, 2011 44th Hawaii International Conference on System Sciences.

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  P. M. Anderson,et al.  Industry experience with special protection schemes , 1996 .

[7]  Kenneth M. Hopkinson,et al.  Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme , 2010, IEEE Transactions on Smart Grid.

[8]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[9]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[10]  Gordon Fyodor Lyon,et al.  Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .

[11]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[12]  W. Mendenhall,et al.  Statistics for engineering and the sciences , 1984 .

[13]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[14]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  S. Shapiro,et al.  An Analysis of Variance Test for Normality (Complete Samples) , 1965 .

[16]  Todd R. Andel,et al.  SCADA Trust Management System , 2010, Security and Management.

[17]  B. Parhami Voting algorithms , 1994 .

[18]  F. Ramsey,et al.  The statistical sleuth : a course in methods of data analysis , 2002 .

[19]  David A. Rennels,et al.  Fault-Tolerant Computing—Concepts and Examples , 1984, IEEE Transactions on Computers.

[20]  Member Ieee,et al.  Developing an Agent-based Backup Protection System for Transmission Networks , 2002 .

[21]  R. Giovanini,et al.  EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.

[22]  R Core Team,et al.  R: A language and environment for statistical computing. , 2014 .

[23]  Raj Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[24]  Deborah Estrin,et al.  Advances in network simulation , 2000, Computer.

[25]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.