Trust System Design Optimization in Smart Grid Network Infrastructure

The imposed communication network brings more vulnerabilities to the evolving smart grid. Therefore, defensive techniques such as intrusion detection will need to be deployed in this already complicated system. Deployment and runtime cost due to the defensive trust systems will affect the original function of smart grid system without careful planning and design. This paper is an effort to address this important issue. In particular, the set packing algorithm is used to optimize the placement of the trust nodes of the defensive system in the multiple layer architecture of the smart grid. After the trust nodes are placed, a trust node aware optimal routing algorithm is used to find the least cost routing in the communications of the nodes. Also, an algorithm to identify new trust node(s) is presented to address the fault tolerance requirement of the smart grid system. Simulation results demonstrate that our approach is promising by providing secure, efficient, and reliable communications in the smart grid network.

[1]  G.N. Ericsson,et al.  On requirements specifications for a power system communications system , 2005, IEEE Transactions on Power Delivery.

[2]  G. N. Ericsson Classifilcation of Power Systems Communications Needs and Requirements: Experiences from Case Studies at Swedish National Grid , 2002 .

[3]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[4]  C. Siva Ram Murthy,et al.  Node Placement Algorithm for Deployment of Two-Tier Wireless Mesh Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[5]  G. N. Ericsson Classifilcation of Power Systems Communications Needs and Requirements: Experiences from Case Studies at Swedish National Grid , 2002, IEEE Power Engineering Review.

[6]  Gilbert Sorebo,et al.  Smart Grid Security: An End-to-End View of Security in the New Electrical Grid , 2011 .

[7]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[8]  William H. Sanders,et al.  Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[9]  Mark Talabis,et al.  Information Security Risk Assessment: Risk Assessment , 2012 .

[10]  Steven McCanne,et al.  Optimal routing table design for IP address lookups under memory constraints , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[11]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[12]  Zygmunt J. Haas,et al.  Determining the optimal configuration for the zone routing protocol , 1999, IEEE J. Sel. Areas Commun..

[13]  Ying Zhang,et al.  Search-based Adaptive Routing Strategies for Sensor Networks , 2004 .

[14]  M.A. El-Sharkawi,et al.  Swarm intelligence for routing in communication networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[15]  Donald E. Knuth,et al.  A Generalization of Dijkstra's Algorithm , 1977, Inf. Process. Lett..

[16]  Hafizur Rahaman,et al.  EER: Energy Efficient Routing in Wireless Sensor Networks , 2011, IEEE Technology Students' Symposium.

[17]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[18]  Richard Bellman,et al.  ON A ROUTING PROBLEM , 1958 .

[19]  Matthew Compton,et al.  Optimization of trust system placement for power grid security and compartmentalization , 2011, 2011 IEEE Power and Energy Society General Meeting.

[20]  G.M. Coates,et al.  A Trust System Architecture for SCADA Network Security , 2010, IEEE Transactions on Power Delivery.

[21]  Ranveer Chandra,et al.  Optimizing the placement of Internet TAPs in wireless neighborhood networks , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[22]  G.N. Ericsson,et al.  Management of information security for an electric power Utility-on security domains and use of ISO/IEC17799 standard , 2005, IEEE Transactions on Power Delivery.

[23]  Sehun Kim,et al.  An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks , 2004, WISA.