Abstract
Due to the extensive development of information transmission in the SCADA power grids, securing the network has become more challenging for guaranteed measurements and transformations. An ultraviolet injection attack (UVI) is infused with malicious data and obstruct in planning the centers that cause a high reduction in the power grids. To overcome this problem, two-step trace model is used that includes both tracing and prevention. In the first step, data from different nodes are used for tracing the UVI attacks. Additionally, the Redundancy measurement unit is employed to enhance the measurement values. In the second step, a Game-theoretic stable algorithm is established to optimize the consumption of resistance nodes. Experimental results are simulated and compared to improve performance efficiency and accuracy.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Hahn A, Manimaran G (2017) Cyber attack exposure evaluation framework for the smart grid. IEEE Trans Smart Grid 2:835–843. https://doi.org/10.1109/TSG.2011.2163829
Li P. Deep interpretation: why is it forbidden to use 4G wireless communication [EB/OL]. (2016-05-23)[2016-05-29]. http://www.cet.com.cn/nypd/xny/1767124.shtml
Liang G, Weller SR, Zhao J, Luo F, Dong ZY (2017) The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32:33178. https://doi.org/10.1109/TPWRS.2016.2631891
Liu S, Mashayekh S, Kundur D, Zourntos T, Butler-Purry K (2013) A framework for modeling cyber-physical switching attacks in smart grid. IEEE Trans Emerg Top Comput 1(2):273–285. https://doi.org/10.1109/TETC.2013.2296440
Liu Y, Ning P, Reiter MK (2017) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14:1–33. https://doi.org/10.1145/1952982.1952995
Mo Y, Kim THJ, Brancik K, Dickinson D, Lee H, Perrig A et al (2017) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100:195–209. https://doi.org/10.1109/JPROC.2011.2161428
Sridharan V (2018) Cyber security in power grid. Georgia Institute of Technology
Sun CC, Hahn A, Liu CC (2018) Cyber security of a power grid: state-of-the-art. Int J Electr Power Energy Syst 99(2018):45–56
Tang Y, Chen Q, Li M, Wang Q, Ni M, Fu X (2016) Challenge and evolution of cyber attacks in cyber physical power system. In: Asia-pacific power energy eng conf APPEEC 2016, pp 857–862. https://doi.org/10.1109/appeec.2016.7779616
Vellaithurai C, Srivastava A, Zonouz S, Berthier R (2016) CPIndex: cyber-physical vulnerability assessment for power-grid infrastructures. IEEE Trans Smart Grid 6:566–575. https://doi.org/10.1109/TSG.2014.2372315
Wang W, Lu Z (2018) Cyber security in the smart grid: survey and challenges. Comput Networks 57:1344–1371. https://doi.org/10.1016/j.comnet.2012.12.017
Zhao J, Zhang G, Dong ZY, Wong KP (2016) Forecasting-aided imperfect false data injection attacks against power grids nonlinear state estimation. IEEE Trans Smart Grid 7:6–8. https://doi.org/10.1109/TSG.2015.2490603
Acknowledgement
This work was supported in part by Anna University recognized research center lab at V V College of Engineering, Tisaiyanvilai, India. No funding sources are provided.
Author information
Authors and Affiliations
Contributions
RBB has published four International conference papers and one International journal paper. Dr.SRR has published Four annexure I journals and five annexure II journals. Her research interests include denial-of-service attacks, jamming attacks, secure routing algorithm and security in networks.
Corresponding author
Ethics declarations
Conflict of interest
R. B. Benisha and Dr. S. Raja Ratna declare that they have no conflict of interest.
Human and animal rights
This article does not contain any studies with animal subjects performed by the any of the authors.
Additional information
Communicated by V. Loia.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Benisha, R.B., Ratna, S.R. A two-step trace model for the detection of UVI attacks against power grids in the wireless network. Soft Comput 25, 5199–5207 (2021). https://doi.org/10.1007/s00500-020-05520-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-020-05520-4