On the use of pattern matching for rapid anomaly detection in smart grid infrastructures

The Smart Grid Infrastructure (SGI) has emerged as a necessary and critical platform for provisioning intelligent and accurate services to consumers of the electric grid, in recent times. With the emergence of this infrastructure and accompanying technologies, the need for securing the same from malicious attempts by the adversary class to disrupt routine operations, cannot be understated. A standard SGI may consist of disparate and heterogeneous devices, cooperating and exchanging customer-specific data (readings), obtained from smart meters. Some of the devices connected to the SGI, such as sensors and actuators, are resource-constrained in nature. In addition, an omnipresent threat to the SGI, from the adversary class in cyberspace, does indeed exist. In this paper, a brief description of various types of malicious attacks against SGI operations, is presented. In addition, a light-weighted pattern matching technique for detecting such attacks, is discussed. The proposed scheme is capable of detecting anomalous device behavior at various levels of the SGI hierarchy, at the same time imposing minimal overhead in terms of communication and storage needed.

[1]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[2]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[3]  Guoqiang Peter Zhang,et al.  Neural networks for classification: a survey , 2000, IEEE Trans. Syst. Man Cybern. Part C.

[4]  Hugo Krawczyk,et al.  UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.

[5]  Xi Chen,et al.  Research on IPv6 transition evolvement and security architecture of smart distribution grid data communication system , 2010, CICED 2010 Proceedings.

[6]  Zubair A. Baig,et al.  A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[7]  Zubair A. Baig,et al.  Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks , 2005, EUC Workshops.

[8]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.

[9]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010 .

[10]  Deepa Kundur,et al.  Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[11]  Asad I. Khan,et al.  A peer-to-peer associative memory network for intelligent information systems , 2002 .

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Asad I. Khan,et al.  Parallel pattern recognition computations within a wireless sensor network , 2004, ICPR 2004.

[14]  M. Isreb,et al.  A parallel distributed application of the wireless sensor network , 2004, Proceedings. Seventh International Conference on High Performance Computing and Grid in Asia Pacific Region, 2004..

[15]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .