A Low Power WSNs Attack Detection and Isolation Mechanism for Critical Smart Grid Applications

Wireless sensor networks (WSNs) are effective tools in many smart grid applications such as remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure, and residential energy management. WSNs are attractive tools due to their low cost, dynamic nature, ruggedness, and low-power profile. Maintaining a low-power profile is a critical design factor in WSNs. Therefore, implementing sophisticated quality of service protocols and security mechanisms in WSNs is a challenging task. Furthermore, WSNs security mechanisms should not only focus on reducing the power consumption of the sensor devices but also they should maintain high reliability and throughput needed by smart grid applications. In this paper, we present a low-power cyber-security mechanism for WSNs-based smart grid monitoring applications. Our mechanism can detect and isolate various attacks such as the denial of sleep, forge, and replay attacks in an energy efficient way. The simulation results show that our mechanism can outperform existing techniques in power efficiency while maintaining constant delay and reliability values.

[1]  Lein Harn,et al.  Efficient Group Key Transfer Protocol for WSNs , 2016, IEEE Sensors Journal.

[2]  Yun Gu,et al.  A novel method to detect bad data injection attack in smart grid , 2013, INFOCOM Workshops.

[3]  Irfan Al-Anbagi,et al.  A low power cybersecurity mechanism for WSNs in a smart grid environment , 2017, 2017 IEEE Electrical Power and Energy Conference (EPEC).

[4]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.

[5]  Tony Q. S. Quek,et al.  Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks , 2017, IEEE Sensors Journal.

[6]  Eric Anderson,et al.  X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.

[7]  Xuemin Shen,et al.  Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Vahid Madani,et al.  Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks , 2011, Proceedings of the IEEE.

[10]  Hervé Guyennet,et al.  Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.

[11]  Andrei Gurtov,et al.  Access Control Protocol With Node Privacy in Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[12]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[13]  Yen-Chieh Ouyang,et al.  Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks , 2010, Sensors.

[14]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[15]  Nathan Ickes,et al.  Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.

[16]  Sajal K. Das,et al.  JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs , 2017, IEEE Transactions on Dependable and Secure Computing.

[17]  Yen-Chieh Ouyang,et al.  Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).

[18]  Gerhard P. Hancke,et al.  Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.

[19]  Minyi Guo,et al.  LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[20]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[21]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[22]  Mianxiong Dong,et al.  A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.

[23]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[24]  Florian Skopik,et al.  Attack Vectors to Metering Data in Smart Grids under Security Constraints , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops.

[25]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[26]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[27]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[28]  Gerald J. FitzPatrick,et al.  NIST interoperability framework and action plans , 2010, IEEE PES General Meeting.

[29]  Song Tan,et al.  Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid , 2018, IEEE Transactions on Smart Grid.

[30]  Omer Gurewitz,et al.  RI-MAC: a receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks , 2008, SenSys '08.

[31]  Xiang Li,et al.  Rate alteration attacks in smart grid , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[32]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[33]  David E. Culler,et al.  A transmission control scheme for media access in sensor networks , 2001, MobiCom '01.

[34]  Lei Chen,et al.  Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).

[35]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[36]  H. T. Mouftah,et al.  Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring , 2017, 2017 IEEE International Conference on Communications (ICC).

[37]  Kenneth C. Budka,et al.  Communication Networks for Smart Grids , 2014, Computer Communications and Networks.

[38]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[39]  Yanfei Sun,et al.  Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.

[40]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[41]  Irfan S. Al-Anbagi,et al.  A Low Power Cyber-Attack Detection and Isolation Mechanism for Wireless Sensor Network , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[42]  Hossam S. Hassanein,et al.  A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.

[43]  Yen-Chieh Ouyang,et al.  A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[44]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.

[45]  Jing Wang,et al.  Detection and Control against Replay Attacks in Smart Grid , 2016, 2016 12th International Conference on Computational Intelligence and Security (CIS).

[46]  Ning Zhang,et al.  An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs , 2016, IEEE Access.

[47]  Jiming Chen,et al.  Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach , 2014, IEEE Transactions on Parallel and Distributed Systems.