ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid
PDF
HTML

Keywords

Smart grid
smart meters
cyber-security
vulnerability
dataintegrity
probability
optimization

How to Cite

[1]
E. Y. Dari, A. Bendahmane, and M. Essaaidi, “Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid”, JCSANDM, vol. 9, no. 2, pp. 237–264, Mar. 2020.

Abstract

Smart grid is a system in which it is possible to use voting-based techniques to resist sabotage of several cyber-attacks. The adaptation of these techniques can be difficult and useless in the case when the malicious resources (i.e., smart meters) of this system can return wrong data in same time; however, the collusion problem is triggered. To detect and resolve the collusive issue, spot-checking technique has been proposed by sending randomly certain number of spotter queries to chosen resources with known correct data in order to estimate resource credibility based on the returned data. This work proposes an original method that resist against collusion attacks by using probability to solving a new spot-checking optimization problem for smart grid systems, with the objective to minimize probability of accepting wrong data (PAWD) while respecting an expected overhead constraint. The proposed solution contains an optimal combination of several parameters, the number of spotter queries sent, the number of resources tested by each spotter query, and the number of resources assigned to run the genuine query. The optimization procedure includes a new method for evaluating performance metrics of PAWD and expected overhead in terms of the total number of query assignments. To demonstrate the proposed optimization problem and solution procedure, we have provided several illustrative examples.

https://doi.org/10.13052/jcsm2245-1439.923
PDF
HTML

References

Y. Liu, P. Ning, and M. K. Reiter, False data injection attacks against

state estimation in electric power grids, 16th ACM conference on

Computer and communications security, 21–32, 2009.

J. Hao, R. J. Piechocki, D. Kaleshi„ W. H. Chin and Z. Fan, Sparse

Malicious False Data Injection Attacks and Defense Mechanisms inSmart grids, IEEE Transactions on Industrial Informatics, 11(5), 1–12,

L. F. G. Sarmenta, Sabotage-tolerance mechanisms for volunteer computing

systems, Future Generation Computer Systems, 18(4), 561–572,

M. Moca, G. C. Silaghi, and G. Fedak, Distributed results checking for

MapReduce in volunteer computing, IEEE International Symposium on

Parallel and Distributed Processing Workshops and Phd Forum, 1847–

, 2011.

P. Domingues, B. Sousa, and L. M. Silva, Sabotage-tolerance and trust

management in desktop grid computing, Future Generation Computer

Systems, 23(7), 904–912, 2007.

S. Choi and R. Buyya, Group-based adaptive result certification mechanism

in Desktop Grids, Future Generation Computer Systems, 26(5),

–786, 2010.

K. Watanabe, N. Funabiki, T. Nakanishi and M. Fukushi, Optimal

Spot-Checking for Delayed Attack on Desktop Grid Systems, 15th International

Conference on Computer Modelling and Simulation, 600–605,

A. C. Oliveira, L. M. R. Sampaio, S. Fernandes, and F. Brasileiro,

Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids, Fourth

Latin-American Symposium on Dependable Computing, 25–32, 2009.

S. Zhao, V. Lo, and C. GauthierDickey, Result verification and trustbased

scheduling in peer-to-peer grids, Proc. of 5th IEEE Int. Conf. Peerto-

Peer Computing , Konstanz, 31–38, 2005.

G. Silaghi, L. Silva, P. Domingues, A. E. Arenas, Tackling the Collusion

Threat in P2P-enhanced Internet Desktop Grids, the CoreGRID Workshop

on Programming Models Grid and P2P System Architecture Grid

Systems, Tools and Environments, 393–402, 2007.

Y. A. Zuev, On the estimation of efficiency of voting procedures, Theory

Probability and Its Applications, 42(1), 73–81, 1998.

J. D. Sonnek, A. Chandra, and J. Weissman, Adaptive reputation-based

scheduling on Unreliable Distributed Infrastructures, IEEE Transaction

Parallel Distributed Systems, 18(11), 1551–1564, 2007.

G. C. Silaghi, F. Araujo, L. M. Silva, P. Domingues, and A. E. Arenas,

Defeating colluding nodes in Desktop Grid computing platforms, Journal

of Grid Computing, 7(4), 555–573, 2009.

L. Canon, E. Jeannot, and J. Weissman, A Scheduling and Certification

Algorithm for Defeating Collusion in Desktop Grids, 31st International

Conference on Distributed Computing Systems (ICDCS), 343–352,

F. Araujo, J. Farinha, P. Domingues, G. C. Silaghi, and D. Kondo, A

maximum independent set approach for collusion detection in voting

pools, Journal of Parallel and Distributed Computing, 71(10), 1356–

, 2011.

A. Bendahmane, M. Essaaidi, A. El Moussaoui and A. Younes, The

Effectiveness of Reputation-Based Voting for Collusion Tolerance in

Large-Scale Grids, IEEE Transactions on Dependable and Secure Computing,

(6), 665–674, 2015.

Y.-S. Lee and T.-H. Chen, Insight into collusion attacks in random-gridbased

visual secret sharing, Signal Processing, 92(3), 727–736, 2012.

A. Estache, Emerging Issues in Competition, Collusion, and Regulation

of Network Industries, Centre for Economic Policy Research, Published

by London Publishing Partnership, 2011.

A. Chakrabarti, Grid Computing Security, Infosys Technologies Limited,

Springer-Verlag Berlin Heidelberg, 2007.

F. Anta, C. Georgiou, M. A. Mosteiro and D. Pareja D, Algorithmic

Mechanisms for Reliable Crowdsourcing Computation under Collusion,

PLoS ONE, 10(3), e0116520, 2015.

K. Watanabe, M. Fukushi and S. Horiguchi, Collusion-Resistant

Sabotage-Tolerance Mechanisms for Volunteer Computing Systems,

IEEE International Conference on e-Business Engineering (ICEBE’09),

–218, 2009.

L. C. Canon, E. Jeannot and J.Weissman, A dynamic approach for characterizing

collusion in desktop grids, IEEE International Symposium on

Parallel & Distributed Processing (IPDPS), 1–12, 2010.

E. Staab and T. Engel, Collusion detection for Grid Computing, 9th

IEEE/ACM International Symposium on Cluster Computing and the

Grid, 412–419, 2009.

El Yazid Dari and Mohamed Essaaidi, An Overview of Smart grid

Cyber-Security State of The Art Study, 3rd International Renewable and

Sustainable Energy Conference (IRSEC), 1–7, 2015.

Downloads

Download data is not yet available.