Skip to main content
Log in

A two-step trace model for the detection of UVI attacks against power grids in the wireless network

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Due to the extensive development of information transmission in the SCADA power grids, securing the network has become more challenging for guaranteed measurements and transformations. An ultraviolet injection attack (UVI) is infused with malicious data and obstruct in planning the centers that cause a high reduction in the power grids. To overcome this problem, two-step trace model is used that includes both tracing and prevention. In the first step, data from different nodes are used for tracing the UVI attacks. Additionally, the Redundancy measurement unit is employed to enhance the measurement values. In the second step, a Game-theoretic stable algorithm is established to optimize the consumption of resistance nodes. Experimental results are simulated and compared to improve performance efficiency and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4: a
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

Download references

Acknowledgement

This work was supported in part by Anna University recognized research center lab at V V College of Engineering, Tisaiyanvilai, India. No funding sources are provided.

Author information

Authors and Affiliations

Authors

Contributions

RBB has published four International conference papers and one International journal paper. Dr.SRR has published Four annexure I journals and five annexure II journals. Her research interests include denial-of-service attacks, jamming attacks, secure routing algorithm and security in networks.

Corresponding author

Correspondence to R. B. Benisha.

Ethics declarations

Conflict of interest

R. B. Benisha and Dr. S. Raja Ratna declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with animal subjects performed by the any of the authors.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benisha, R.B., Ratna, S.R. A two-step trace model for the detection of UVI attacks against power grids in the wireless network. Soft Comput 25, 5199–5207 (2021). https://doi.org/10.1007/s00500-020-05520-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-020-05520-4

Keywords

Navigation