Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid

Authors

  • El Yazid Dari Faculty of Sciences, Abdelmalek Essaadi University, Tetuan, Morocco https://orcid.org/0000-0002-4768-9015
  • Ahmed Bendahmane Laboratory of Applied Sciences and Education. Higher Normal School (ENS), Abdelmalek Essaadi University, Tetuan, Morocco https://orcid.org/0000-0003-3843-4800
  • Mohamed Essaaidi College of IT (ENSIAS), Mohamed 5 University, Rabat, Morocco

DOI:

https://doi.org/10.13052/jcsm2245-1439.923

Keywords:

Smart grid, smart meters, cyber-security, vulnerability, dataintegrity, probability, optimization

Abstract

Smart grid is a system in which it is possible to use voting-based techniques to resist sabotage of several cyber-attacks. The adaptation of these techniques can be difficult and useless in the case when the malicious resources (i.e., smart meters) of this system can return wrong data in same time; however, the collusion problem is triggered. To detect and resolve the collusive issue, spot-checking technique has been proposed by sending randomly certain number of spotter queries to chosen resources with known correct data in order to estimate resource credibility based on the returned data. This work proposes an original method that resist against collusion attacks by using probability to solving a new spot-checking optimization problem for smart grid systems, with the objective to minimize probability of accepting wrong data (PAWD) while respecting an expected overhead constraint. The proposed solution contains an optimal combination of several parameters, the number of spotter queries sent, the number of resources tested by each spotter query, and the number of resources assigned to run the genuine query. The optimization procedure includes a new method for evaluating performance metrics of PAWD and expected overhead in terms of the total number of query assignments. To demonstrate the proposed optimization problem and solution procedure, we have provided several illustrative examples.

Downloads

Download data is not yet available.

Author Biographies

El Yazid Dari, Faculty of Sciences, Abdelmalek Essaadi University, Tetuan, Morocco

El Yazid Dari born in Nador, Morocco, in 1980. He received the “DESA” degree in Electrical Engineering from the university Abdelmalek Essaadi of Tetuan. Currently he is working toward the Ph.D. degree with the Information and Telecommunication Systems Group at Abdelmalek Essaadi University. His research interests include the smart grid security, Computer Sciences and Telecommunications.

Ahmed Bendahmane, Laboratory of Applied Sciences and Education. Higher Normal School (ENS), Abdelmalek Essaadi University, Tetuan, Morocco

Ahmed Bendahmane has received his Ph.D. degree in Computer Sciences from Abdelmalek Essaadi University at Information and Telecommunication Systems Laboratory, Faculty of Science, Tetuan, Morocco (2013). His main research interests include distributed systems, security of grid and cloud computing systems, Computer Networks, Intrusion Detection and Tolerance, and Multi-Agent Systems. Bendahmane has published a number of refereed research publications in this area.

Mohamed Essaaidi, College of IT (ENSIAS), Mohamed 5 University, Rabat, Morocco

Mohamed Essaaidi (SM’00) obtained the Doctorate of State degree in Electrical Engineering in 1997 from Abdelmalek Essaadi University in Tetuan, Morocco. He has been a Professor of Electrical and Computer Engineering in Abdelmalek Essaadi University since 1993 and the Deanof College of IT (ENSIAS) of Mohammed V University in Rabat, Morocco since 2011. He is the founder and the current Chair of the IEEE Morocco Section. He’s been the co-founder and co-General Chair of several IEEE co-technically sponsored conferences such as Information and Communication technologies International Symposium (ICTIS) since 2005 and International Conference on Multimedia and Computing Systems (ICMCS) since 2009 and co-Director of NATO Advanced Research Workshop on Information Security Assurance, Tetuan, Morocco in June 3–6, 2005 and NATO ASI on Software Agents, Applications and Technologies, Tangiers, Morocco in September 2010. He is the author and co-author of more than 200 papers which appeared in refereed specialized journals and symposia. He was the co-editor of the book “Information Assurance and Computer Security”, IOS Press, 2007 and the book “Software Agents, Agent Systems and their Applications”, IOS Press, 2012. He was Editor-in-Chief of the “International Journal on Information and Communication Technologies”, Serials Publications, India, from 2007 to 2010. Prof. Essaaidi is a Senior Member of IEEE and a member of IEEE Computer Society, IEEE Communication Society and IEEE Education Society.

References

Y. Liu, P. Ning, and M. K. Reiter, False data injection attacks against

state estimation in electric power grids, 16th ACM conference on

Computer and communications security, 21–32, 2009.

J. Hao, R. J. Piechocki, D. Kaleshi„ W. H. Chin and Z. Fan, Sparse

Malicious False Data Injection Attacks and Defense Mechanisms inSmart grids, IEEE Transactions on Industrial Informatics, 11(5), 1–12,

L. F. G. Sarmenta, Sabotage-tolerance mechanisms for volunteer computing

systems, Future Generation Computer Systems, 18(4), 561–572,

M. Moca, G. C. Silaghi, and G. Fedak, Distributed results checking for

MapReduce in volunteer computing, IEEE International Symposium on

Parallel and Distributed Processing Workshops and Phd Forum, 1847–

, 2011.

P. Domingues, B. Sousa, and L. M. Silva, Sabotage-tolerance and trust

management in desktop grid computing, Future Generation Computer

Systems, 23(7), 904–912, 2007.

S. Choi and R. Buyya, Group-based adaptive result certification mechanism

in Desktop Grids, Future Generation Computer Systems, 26(5),

–786, 2010.

K. Watanabe, N. Funabiki, T. Nakanishi and M. Fukushi, Optimal

Spot-Checking for Delayed Attack on Desktop Grid Systems, 15th International

Conference on Computer Modelling and Simulation, 600–605,

A. C. Oliveira, L. M. R. Sampaio, S. Fernandes, and F. Brasileiro,

Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids, Fourth

Latin-American Symposium on Dependable Computing, 25–32, 2009.

S. Zhao, V. Lo, and C. GauthierDickey, Result verification and trustbased

scheduling in peer-to-peer grids, Proc. of 5th IEEE Int. Conf. Peerto-

Peer Computing , Konstanz, 31–38, 2005.

G. Silaghi, L. Silva, P. Domingues, A. E. Arenas, Tackling the Collusion

Threat in P2P-enhanced Internet Desktop Grids, the CoreGRID Workshop

on Programming Models Grid and P2P System Architecture Grid

Systems, Tools and Environments, 393–402, 2007.

Y. A. Zuev, On the estimation of efficiency of voting procedures, Theory

Probability and Its Applications, 42(1), 73–81, 1998.

J. D. Sonnek, A. Chandra, and J. Weissman, Adaptive reputation-based

scheduling on Unreliable Distributed Infrastructures, IEEE Transaction

Parallel Distributed Systems, 18(11), 1551–1564, 2007.

G. C. Silaghi, F. Araujo, L. M. Silva, P. Domingues, and A. E. Arenas,

Defeating colluding nodes in Desktop Grid computing platforms, Journal

of Grid Computing, 7(4), 555–573, 2009.

L. Canon, E. Jeannot, and J. Weissman, A Scheduling and Certification

Algorithm for Defeating Collusion in Desktop Grids, 31st International

Conference on Distributed Computing Systems (ICDCS), 343–352,

F. Araujo, J. Farinha, P. Domingues, G. C. Silaghi, and D. Kondo, A

maximum independent set approach for collusion detection in voting

pools, Journal of Parallel and Distributed Computing, 71(10), 1356–

, 2011.

A. Bendahmane, M. Essaaidi, A. El Moussaoui and A. Younes, The

Effectiveness of Reputation-Based Voting for Collusion Tolerance in

Large-Scale Grids, IEEE Transactions on Dependable and Secure Computing,

(6), 665–674, 2015.

Y.-S. Lee and T.-H. Chen, Insight into collusion attacks in random-gridbased

visual secret sharing, Signal Processing, 92(3), 727–736, 2012.

A. Estache, Emerging Issues in Competition, Collusion, and Regulation

of Network Industries, Centre for Economic Policy Research, Published

by London Publishing Partnership, 2011.

A. Chakrabarti, Grid Computing Security, Infosys Technologies Limited,

Springer-Verlag Berlin Heidelberg, 2007.

F. Anta, C. Georgiou, M. A. Mosteiro and D. Pareja D, Algorithmic

Mechanisms for Reliable Crowdsourcing Computation under Collusion,

PLoS ONE, 10(3), e0116520, 2015.

K. Watanabe, M. Fukushi and S. Horiguchi, Collusion-Resistant

Sabotage-Tolerance Mechanisms for Volunteer Computing Systems,

IEEE International Conference on e-Business Engineering (ICEBE’09),

–218, 2009.

L. C. Canon, E. Jeannot and J.Weissman, A dynamic approach for characterizing

collusion in desktop grids, IEEE International Symposium on

Parallel & Distributed Processing (IPDPS), 1–12, 2010.

E. Staab and T. Engel, Collusion detection for Grid Computing, 9th

IEEE/ACM International Symposium on Cluster Computing and the

Grid, 412–419, 2009.

El Yazid Dari and Mohamed Essaaidi, An Overview of Smart grid

Cyber-Security State of The Art Study, 3rd International Renewable and

Sustainable Energy Conference (IRSEC), 1–7, 2015.

Downloads

Published

2020-03-24

How to Cite

1.
Dari EY, Bendahmane A, Essaaidi M. Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid. JCSANDM [Internet]. 2020 Mar. 24 [cited 2024 Nov. 23];9(2):237-64. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/774

Issue

Section

Articles