Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid
Keywords:Smart grid, smart meters, cyber-security, vulnerability, dataintegrity, probability, optimization
Smart grid is a system in which it is possible to use voting-based techniques to resist sabotage of several cyber-attacks. The adaptation of these techniques can be difficult and useless in the case when the malicious resources (i.e., smart meters) of this system can return wrong data in same time; however, the collusion problem is triggered. To detect and resolve the collusive issue, spot-checking technique has been proposed by sending randomly certain number of spotter queries to chosen resources with known correct data in order to estimate resource credibility based on the returned data. This work proposes an original method that resist against collusion attacks by using probability to solving a new spot-checking optimization problem for smart grid systems, with the objective to minimize probability of accepting wrong data (PAWD) while respecting an expected overhead constraint. The proposed solution contains an optimal combination of several parameters, the number of spotter queries sent, the number of resources tested by each spotter query, and the number of resources assigned to run the genuine query. The optimization procedure includes a new method for evaluating performance metrics of PAWD and expected overhead in terms of the total number of query assignments. To demonstrate the proposed optimization problem and solution procedure, we have provided several illustrative examples.
Y. Liu, P. Ning, and M. K. Reiter, False data injection attacks against
state estimation in electric power grids, 16th ACM conference on
Computer and communications security, 21–32, 2009.
J. Hao, R. J. Piechocki, D. Kaleshi„ W. H. Chin and Z. Fan, Sparse
Malicious False Data Injection Attacks and Defense Mechanisms inSmart grids, IEEE Transactions on Industrial Informatics, 11(5), 1–12,
L. F. G. Sarmenta, Sabotage-tolerance mechanisms for volunteer computing
systems, Future Generation Computer Systems, 18(4), 561–572,
M. Moca, G. C. Silaghi, and G. Fedak, Distributed results checking for
MapReduce in volunteer computing, IEEE International Symposium on
Parallel and Distributed Processing Workshops and Phd Forum, 1847–
P. Domingues, B. Sousa, and L. M. Silva, Sabotage-tolerance and trust
management in desktop grid computing, Future Generation Computer
Systems, 23(7), 904–912, 2007.
S. Choi and R. Buyya, Group-based adaptive result certification mechanism
in Desktop Grids, Future Generation Computer Systems, 26(5),
K. Watanabe, N. Funabiki, T. Nakanishi and M. Fukushi, Optimal
Spot-Checking for Delayed Attack on Desktop Grid Systems, 15th International
Conference on Computer Modelling and Simulation, 600–605,
A. C. Oliveira, L. M. R. Sampaio, S. Fernandes, and F. Brasileiro,
Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids, Fourth
Latin-American Symposium on Dependable Computing, 25–32, 2009.
S. Zhao, V. Lo, and C. GauthierDickey, Result verification and trustbased
scheduling in peer-to-peer grids, Proc. of 5th IEEE Int. Conf. Peerto-
Peer Computing , Konstanz, 31–38, 2005.
G. Silaghi, L. Silva, P. Domingues, A. E. Arenas, Tackling the Collusion
Threat in P2P-enhanced Internet Desktop Grids, the CoreGRID Workshop
on Programming Models Grid and P2P System Architecture Grid
Systems, Tools and Environments, 393–402, 2007.
Y. A. Zuev, On the estimation of efficiency of voting procedures, Theory
Probability and Its Applications, 42(1), 73–81, 1998.
J. D. Sonnek, A. Chandra, and J. Weissman, Adaptive reputation-based
scheduling on Unreliable Distributed Infrastructures, IEEE Transaction
Parallel Distributed Systems, 18(11), 1551–1564, 2007.
G. C. Silaghi, F. Araujo, L. M. Silva, P. Domingues, and A. E. Arenas,
Defeating colluding nodes in Desktop Grid computing platforms, Journal
of Grid Computing, 7(4), 555–573, 2009.
L. Canon, E. Jeannot, and J. Weissman, A Scheduling and Certification
Algorithm for Defeating Collusion in Desktop Grids, 31st International
Conference on Distributed Computing Systems (ICDCS), 343–352,
F. Araujo, J. Farinha, P. Domingues, G. C. Silaghi, and D. Kondo, A
maximum independent set approach for collusion detection in voting
pools, Journal of Parallel and Distributed Computing, 71(10), 1356–
A. Bendahmane, M. Essaaidi, A. El Moussaoui and A. Younes, The
Effectiveness of Reputation-Based Voting for Collusion Tolerance in
Large-Scale Grids, IEEE Transactions on Dependable and Secure Computing,
(6), 665–674, 2015.
Y.-S. Lee and T.-H. Chen, Insight into collusion attacks in random-gridbased
visual secret sharing, Signal Processing, 92(3), 727–736, 2012.
A. Estache, Emerging Issues in Competition, Collusion, and Regulation
of Network Industries, Centre for Economic Policy Research, Published
by London Publishing Partnership, 2011.
A. Chakrabarti, Grid Computing Security, Infosys Technologies Limited,
Springer-Verlag Berlin Heidelberg, 2007.
F. Anta, C. Georgiou, M. A. Mosteiro and D. Pareja D, Algorithmic
Mechanisms for Reliable Crowdsourcing Computation under Collusion,
PLoS ONE, 10(3), e0116520, 2015.
K. Watanabe, M. Fukushi and S. Horiguchi, Collusion-Resistant
Sabotage-Tolerance Mechanisms for Volunteer Computing Systems,
IEEE International Conference on e-Business Engineering (ICEBE’09),
L. C. Canon, E. Jeannot and J.Weissman, A dynamic approach for characterizing
collusion in desktop grids, IEEE International Symposium on
Parallel & Distributed Processing (IPDPS), 1–12, 2010.
E. Staab and T. Engel, Collusion detection for Grid Computing, 9th
IEEE/ACM International Symposium on Cluster Computing and the
Grid, 412–419, 2009.
El Yazid Dari and Mohamed Essaaidi, An Overview of Smart grid
Cyber-Security State of The Art Study, 3rd International Renewable and
Sustainable Energy Conference (IRSEC), 1–7, 2015.