A Cross-Layer Trust Evaluation Protocol for Secured Routing in Communication Network of Smart Grid

Cybersecurity is one of the major issues to be considered while designing a communication network for Smart Grid (SGCN). However, due to the openness and unpredictable nature of the wireless network, it is often prone to different adversarial attacks that exploit vulnerabilities to launch cross-layer attacks during data transmission. To address this issue, we proposed a novel trust-based routing framework with Bayesian Inference to calculate direct trust and Dempster-Shafer (D-S) theory is used to compute the indirect trust by combining the evidence collected from reliable neighbours. The analytical hierarchy process (AHP) calculates the node’s creditability trust by taking cross-layer metrics like transmission rate, buffering capacity and received signal strength. Further, the fuzzy theory is combined with BDS-AHP to incorporate fairness in utilizing cross-layer metrics for calculating the link trust to enable reliable routing. Extensive experiments are carried to evaluate the performance of the proposed fuzzy-based trusted routing algorithm (FBDS-AHP) with the presence of malicious nodes launching packet-dropping, bad-mouthing, on-off and Sybil attacks. Simulation result proves that the proposed trust evaluation algorithm achieves promising results in defending against these attacks thereby providing improved reliability and ensures secured routing in SGCN.

[1]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[2]  H. T. Mouftah,et al.  Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring , 2017, 2017 IEEE International Conference on Communications (ICC).

[3]  William Liu,et al.  Trust-based Adaptive Routing for Smart Grid Systems , 2014, J. Inf. Process..

[4]  Carl H. Hauser Trust research to address uncertainty in security for the smart grid , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[5]  Durgadevi Velusamy,et al.  An effective trust based defense mechanism to thwart malicious attack in smart grid communication network , 2017, 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS).

[6]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[7]  Mohammad Abdollahi Azgomi,et al.  A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process , 2014, Cognition, Technology & Work.

[8]  Dieter Hogrefe,et al.  Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks , 2018, IEEE Access.

[9]  K. Newman,et al.  Trust and reputation approach to smart grid security , 2011, 2011 4th International Symposium on Resilient Control Systems.

[10]  Theodore B. Zahariadis,et al.  A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[11]  Hongjian Sun,et al.  A Fuzzy Logic Trust Model for Secure Routing in Smart Grid Networks , 2017, IEEE Access.

[12]  H. T. Mouftah,et al.  Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Randy L. Ekl,et al.  Smart Grid security technology , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[14]  H. T. Mouftah,et al.  Optimal Trust System Placement in Smart Grid SCADA Networks , 2016, IEEE Access.

[15]  Anand Paul,et al.  Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network , 2016, Computing.

[16]  Pugalendhi GaneshKumar,et al.  Fuzzy integrated Bayesian Dempster-Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid , 2019, Inf. Sci..

[17]  Donghui Li,et al.  A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs , 2018, IEEE Access.

[18]  Joon Heo,et al.  Device authentication protocol for smart grid systems using homomorphic hash , 2012, Journal of Communications and Networks.