Defending jamming attack in wide-area monitoring system for smart grid

Smart Grid is a promising technology to efficiently manage the power use, transmission and production. An efficient and dependable smart power grid relies on the secure and reliable real-time data collection and transmission service provided by an underlying backbone communication network. Cognitive radio network is an emerging wireless communication technology that fits communication needs in smart grid. However, the cognitive radio is vulnerable to jamming attacks that can disturb the real time communication. The loss of the timely information from the remotely distributedly deployed sensors can cause the loss of control of the system. In this paper, we focus on the availability of the communication services provided by the cognitive radio nodes deployed over the smart grid. We consider the jamming attacks to this wireless network. We propose to defeat the jamming attacks by introducing the combined online optimization and linear programming to the smart grid to enable the system to heal automatically from the jamming attack.

[1]  Bhaskar Krishnamachari,et al.  On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance , 2007, IEEE Transactions on Wireless Communications.

[2]  Zhe Chen,et al.  Cognitive Radio for Smart Grid: Theory, Algorithms, and Security , 2011, Int. J. Digit. Multim. Broadcast..

[3]  Meikang Qiu,et al.  Secure wireless communication system for smart grid with rechargeable electric vehicles , 2012, IEEE Communications Magazine.

[4]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Min Chen,et al.  Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.

[6]  Todd E. Humphreys,et al.  Assessing the spoofing threat , 2009 .

[7]  Meikang Qiu,et al.  Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems , 2009, TODE.

[8]  Tamás Linder,et al.  The On-Line Shortest Path Problem Under Partial Monitoring , 2007, J. Mach. Learn. Res..

[9]  A. Ghassemi,et al.  Cognitive Radio for Smart Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[10]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[11]  Athanasios V. Vasilakos,et al.  Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.

[12]  Wei Tu,et al.  Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks , 2010, IEEE Journal on Selected Areas in Communications.

[13]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Hsiao-Hwa Chen,et al.  On Distributed Multimedia Scheduling With Constrained Control Channels , 2011, IEEE Transactions on Multimedia.

[15]  Guy Pujolle,et al.  Downlink resource allocation strategies for OFDMA based mobile WiMAX , 2010, Telecommun. Syst..