메뉴 건너뛰기




Volumn 103, Issue , 2017, Pages 32-41

Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system

Author keywords

Adaptive reputation system; Distributed host based collaborative detection; False data injection attack; Smart grid cyber physical system (CPS)

Indexed keywords

ADAPTIVE SYSTEMS; CYBER PHYSICAL SYSTEM; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; NETWORK SECURITY; PHASOR MEASUREMENT UNITS;

EID: 85008640878     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2016.12.012     Document Type: Article
Times cited : (126)

References (41)
  • 1
    • 84963763666 scopus 로고    scopus 로고
    • BLITHE: Behavior rule based insider threat detection for smart grid
    • [1] Bao, H., Lu, R., Li, B., Deng, R., BLITHE: Behavior rule based insider threat detection for smart grid. IEEE Internet Things J. 3:2 (2016), 190–205.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.2 , pp. 190-205
    • Bao, H.1    Lu, R.2    Li, B.3    Deng, R.4
  • 2
    • 0028480212 scopus 로고
    • State estimation for real-time monitoring of distribution systems
    • [2] Baran, M.E., Kelley, A.W., State estimation for real-time monitoring of distribution systems. IEEE Trans. Power Appar. Syst. 9:3 (1994), 1601–1609.
    • (1994) IEEE Trans. Power Appar. Syst. , vol.9 , Issue.3 , pp. 1601-1609
    • Baran, M.E.1    Kelley, A.W.2
  • 4
    • 21144476141 scopus 로고
    • Parameter estimation for the Beta distribution
    • [4] Bowman, K., Shenton, L., Parameter estimation for the Beta distribution. J. Stat. Comput. Simul. 43:3–4 (1992), 217–228.
    • (1992) J. Stat. Comput. Simul. , vol.43 , Issue.3-4 , pp. 217-228
    • Bowman, K.1    Shenton, L.2
  • 6
    • 84994571164 scopus 로고    scopus 로고
    • A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants
    • [6] Castiglione, A., Pizzolante, R., Esposito, C., De Santis, A., Palmieri, F., Castiglione, A., A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants. Future Gener. Comput. Syst. 67 (2017), 230–241.
    • (2017) Future Gener. Comput. Syst. , vol.67 , pp. 230-241
    • Castiglione, A.1    Pizzolante, R.2    Esposito, C.3    De Santis, A.4    Palmieri, F.5    Castiglione, A.6
  • 7
    • 33847645050 scopus 로고    scopus 로고
    • Placement of PMUs to enable bad data detection in state estimation
    • [7] Chen, J., Abur, A., Placement of PMUs to enable bad data detection in state estimation. IEEE Trans. Power Syst. 21:4 (2006), 1608–1615.
    • (2006) IEEE Trans. Power Syst. , vol.21 , Issue.4 , pp. 1608-1615
    • Chen, J.1    Abur, A.2
  • 8
    • 84945315428 scopus 로고    scopus 로고
    • Optimal denial-of-service attack scheduling with energy constraint
    • [8] Chen, J., Shi, L., Cheng, P., Zhang, H., Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans. Automat. Control 60:11 (2015), 3023–3028.
    • (2015) IEEE Trans. Automat. Control , vol.60 , Issue.11 , pp. 3023-3028
    • Chen, J.1    Shi, L.2    Cheng, P.3    Zhang, H.4
  • 9
    • 84905834871 scopus 로고    scopus 로고
    • A conceptual interdisciplinary plug-and-play cyber security framework
    • Springer
    • [9] Choo, K.-K.R., A conceptual interdisciplinary plug-and-play cyber security framework. ICTs and the Millennium Development Goals, 2014, Springer, 81–99.
    • (2014) ICTs and the Millennium Development Goals , pp. 81-99
    • Choo, K.-K.R.1
  • 10
    • 0021529208 scopus 로고
    • Hypothesis testing identification: A new method for bad data analysis in power system state estimation
    • [10] Cutsem, T.V., Ribbens-Pavell, M., Mili, L., Hypothesis testing identification: A new method for bad data analysis in power system state estimation. IEEE Trans. Power Appar. Syst.(11), 1984, 3239–3252.
    • (1984) IEEE Trans. Power Appar. Syst. , Issue.11 , pp. 3239-3252
    • Cutsem, T.V.1    Ribbens-Pavell, M.2    Mili, L.3
  • 11
    • 84973094090 scopus 로고    scopus 로고
    • Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design
    • [11] C. Esposito, A. Castiglione, F. Palmieri, M. Ficco, Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design, Future Gener. Comput. Syst., in press. http://dx.doi.org/10.1016/j.future.2015.12.004.
    • (2017) Future Generation Computer Systems , vol.74 , pp. 325-336
    • Esposito, C.1    Castiglione, A.2    Palmieri, F.3    Ficco, M.4
  • 12
    • 85043937966 scopus 로고    scopus 로고
    • W32. Stuxnet dossier, White paper, Symantec Corp., Security Response, 5, 6.
    • [12] N. Falliere, L.O. Murchu, E. Chien, W32. Stuxnet dossier, White paper, Symantec Corp., Security Response, 5, 2011, 6.
    • (2011)
    • Falliere, N.1    Murchu, L.O.2    Chien, E.3
  • 13
    • 84992533091 scopus 로고    scopus 로고
    • Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks
    • [13] Fang, H., Xu, L., Choo, K.-K.R., Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl. Math. Comput. 296 (2017), 153–167.
    • (2017) Appl. Math. Comput. , vol.296 , pp. 153-167
    • Fang, H.1    Xu, L.2    Choo, K.-K.R.3
  • 17
    • 84899799964 scopus 로고    scopus 로고
    • Energy-theft detection issues for advanced metering infrastructure in smart grid
    • [17] Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., Shen, X.S., Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci. Technol. 19:2 (2014), 105–120.
    • (2014) Tsinghua Sci. Technol. , vol.19 , Issue.2 , pp. 105-120
    • Jiang, R.1    Lu, R.2    Wang, Y.3    Luo, J.4    Shen, C.5    Shen, X.S.6
  • 18
    • 0020116808 scopus 로고
    • Bad data rejection properties of weughted least absolute value techniques applied to static state estimation
    • [18] Kotiuga, W.W., Vidyasagar, M., Bad data rejection properties of weughted least absolute value techniques applied to static state estimation. IEEE Trans. Power Appar. Syst.(4), 1982, 844–853.
    • (1982) IEEE Trans. Power Appar. Syst. , Issue.4 , pp. 844-853
    • Kotiuga, W.W.1    Vidyasagar, M.2
  • 19
    • 84875522445 scopus 로고    scopus 로고
    • Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
    • [19] Kumarage, H., Khalil, I., Tari, Z., Zomaya, A., Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling. J. Parallel Distrib. Comput. 73:6 (2013), 790–806.
    • (2013) J. Parallel Distrib. Comput. , vol.73 , Issue.6 , pp. 790-806
    • Kumarage, H.1    Khalil, I.2    Tari, Z.3    Zomaya, A.4
  • 21
    • 84864865604 scopus 로고    scopus 로고
    • Securing smart grid: cyber attacks, countermeasures, and challenges
    • [21] Li, X., Liang, X., Lu, R., Shen, X., Lin, X., Zhu, H., Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50:8 (2012), 38–45.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.8 , pp. 38-45
    • Li, X.1    Liang, X.2    Lu, R.3    Shen, X.4    Lin, X.5    Zhu, H.6
  • 22
    • 84985028276 scopus 로고    scopus 로고
    • DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system
    • [22] Li, B., Lu, R., Wang, W., Choo, K.-K.R., DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2415–2425.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.11 , pp. 2415-2425
    • Li, B.1    Lu, R.2    Wang, W.3    Choo, K.-K.R.4
  • 23
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • [23] Liu, Y., Ning, P., Reiter, M.K., False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC), 14(1), 2011, 13.
    • (2011) ACM Trans. Inf. Syst. Secur. (TISSEC) , vol.14 , Issue.1 , pp. 13
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 24
    • 0015159258 scopus 로고
    • Bad data suppression in power system static state estimation
    • [24] Merrill, H.M., Schweppe, F.C., Bad data suppression in power system static state estimation. IEEE Trans. Power Appar. Syst.(6), 1971, 2718–2725.
    • (1971) IEEE Trans. Power Appar. Syst. , Issue.6 , pp. 2718-2725
    • Merrill, H.M.1    Schweppe, F.C.2
  • 25
    • 84858068452 scopus 로고    scopus 로고
    • TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
    • [25] Mrmol, F.G., Prez, G.M., TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 35:3 (2012), 934–941.
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.3 , pp. 934-941
    • Mrmol, F.G.1    Prez, G.M.2
  • 26
    • 18944394918 scopus 로고    scopus 로고
    • Distributed agent-based state estimation for electrical distribution networks
    • [26] Nordman, M.M., Lehtonen, M., Distributed agent-based state estimation for electrical distribution networks. IEEE Trans. Power Appar. Syst. 20:2 (2005), 652–658.
    • (2005) IEEE Trans. Power Appar. Syst. , vol.20 , Issue.2 , pp. 652-658
    • Nordman, M.M.1    Lehtonen, M.2
  • 27
    • 39149117050 scopus 로고    scopus 로고
    • A game-theoretic intrusion detection model for mobile ad hoc networks
    • [27] Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P., A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31:4 (2008), 708–721.
    • (2008) Comput. Commun. , vol.31 , Issue.4 , pp. 708-721
    • Otrok, H.1    Mohammed, N.2    Wang, L.3    Debbabi, M.4    Bhattacharya, P.5
  • 29
    • 84994874812 scopus 로고    scopus 로고
    • A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
    • [29] Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., Jnior, J.C., Katsikas, S., A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Comput. Secur. 64 (2017), 92–109.
    • (2017) Comput. Secur. , vol.64 , pp. 92-109
    • Patel, A.1    Alhussian, H.2    Pedersen, J.M.3    Bounabat, B.4    Jnior, J.C.5    Katsikas, S.6
  • 30
    • 84978971732 scopus 로고    scopus 로고
    • User profiling in intrusion detection: A review
    • [30] Peng, J., Choo, K.-K.R., Ashman, H., User profiling in intrusion detection: A review. J. Netw. Comput. Appl. 72 (2016), 14–27.
    • (2016) J. Netw. Comput. Appl. , vol.72 , pp. 14-27
    • Peng, J.1    Choo, K.-K.R.2    Ashman, H.3
  • 31
    • 84956865443 scopus 로고    scopus 로고
    • Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid
    • [31] Premarathne, U.S., Khalil, I., Atiquzzaman, M., Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid. Ad Hoc Networks 41 (2016), 15–29.
    • (2016) Ad Hoc Networks , vol.41 , pp. 15-29
    • Premarathne, U.S.1    Khalil, I.2    Atiquzzaman, M.3
  • 32
    • 82155167643 scopus 로고    scopus 로고
    • Energy efficient security algorithm for power grid wide area monitoring system
    • [32] Qiu, M., Gao, W., Chen, M., Niu, J.-W., Zhang, L., Energy efficient security algorithm for power grid wide area monitoring system. IEEE Trans. Smart Grid 2:4 (2011), 715–723.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 715-723
    • Qiu, M.1    Gao, W.2    Chen, M.3    Niu, J.-W.4    Zhang, L.5
  • 33
    • 84860849234 scopus 로고    scopus 로고
    • Balance of security strength and energy for a PMU monitoring system in smart grid
    • [33] Qiu, M., Su, H., Chen, M., Ming, Z., Yang, L.T., Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Commun. Mag. 50:5 (2012), 142–149.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.5 , pp. 142-149
    • Qiu, M.1    Su, H.2    Chen, M.3    Ming, Z.4    Yang, L.T.5
  • 34
    • 84890562284 scopus 로고    scopus 로고
    • Hyperspherical cluster based distributed anomaly detection in wireless sensor networks
    • [34] Rajasegarar, S., Leckie, C., Palaniswami, M., Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J. Parallel Distrib. Comput. 74:1 (2014), 1833–1847.
    • (2014) J. Parallel Distrib. Comput. , vol.74 , Issue.1 , pp. 1833-1847
    • Rajasegarar, S.1    Leckie, C.2    Palaniswami, M.3
  • 35
    • 0014700838 scopus 로고
    • Power system static-state estimation, parts I, II, and III
    • [35] Schweppe, F.C., Wildes, J., Rom, D.B., Power system static-state estimation, parts I, II, and III. IEEE Trans. Power Appar. Syst. 89:1 (1970), 120–135.
    • (1970) IEEE Trans. Power Appar. Syst. , vol.89 , Issue.1 , pp. 120-135
    • Schweppe, F.C.1    Wildes, J.2    Rom, D.B.3
  • 37
    • 33646831908 scopus 로고    scopus 로고
    • Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks
    • ACM
    • [37] Srivatsa, M., Xiong, L., Liu, L., Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. Proc. 14th International Conference on World Wide Web, (WWW), 2005, ACM, 422–431.
    • (2005) Proc. 14th International Conference on World Wide Web, (WWW) , pp. 422-431
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 38
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • [38] Y.L. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, in: Proc. IEEE INFOCOM, 2006, pp. 1–13.
    • (2006) Proc. IEEE INFOCOM , pp. 1-13
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 39
    • 79956116601 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks: A survey
    • [39] Xie, M., Han, S., Tian, B., Parvin, S., Anomaly detection in wireless sensor networks: A survey. J. Netw. Comput. Appl. 34:4 (2011), 1302–1325.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.4 , pp. 1302-1325
    • Xie, M.1    Han, S.2    Tian, B.3    Parvin, S.4
  • 41
    • 84892720138 scopus 로고    scopus 로고
    • Optimal microgrid control and power-flow study with different bidding policies by using powerworld simulator
    • [41] Zhang, D., Li, S., Zeng, P., Zang, C., Optimal microgrid control and power-flow study with different bidding policies by using powerworld simulator. IEEE Trans. Sustainable Energy 5:1 (2014), 282–292.
    • (2014) IEEE Trans. Sustainable Energy , vol.5 , Issue.1 , pp. 282-292
    • Zhang, D.1    Li, S.2    Zeng, P.3    Zang, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.