Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.2.279

Study on Availability Guarantee Mechanism on Smart Grid Networks: Detection of Attack and Anomaly Node Using Signal Information  

Kim, Mihui (Hankyong National University, Department of Computer&Web Information Engineering)
Abstract
The recent power shortages due to surge in demand for electricity highlights the importance of smart grid technologies for efficient use of power. The experimental content for vulnerability against availability of smart meter, an essential component in smart grid networks, has been reported. Designing availability protection mechanism to boost the realization possibilities of the secure smart grid is essential. In this paper, we propose a mechanism to detect the availability infringement attack for smart meter and also to find anomaly nodes through analyzing smart grid structure and traffic patterns. The proposed detection mechanism uses approximate entropy technique to decrease the detection load and increase the detection rate with few samples and utilizes the signal information(CIR or RSSI, etc.) that the anomaly node can not be changed to find the anomaly nodes. Finally simulation results of proposed method show that the detection performance and the feasibility.
Keywords
Availability Guarantee; Smart Grid; Smart Meter; Attack Detection; Anomaly Node Detection; Signal Information;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 남궁완, 조효진, 조관태, 이동훈, "스마트미터 보안 연구," 정보보호학회지, 20(5), pp. 20-30, 2010 년 10월.
2 정철조, 은선기, 최진호, 오수현, 김환구, "스마트 미터의 취약성/보안요구사항 분석 및 CC v3.1 기반 보호프로파일 개발," 정보보호학회논문지, 20(6), pp. 111-125, 2010년 12월.
3 Y. Liu, P. Ning, and M.K. Reiter, "False data injection attacks against state estimation in electric power grids," Proceedings of the 16th ACM conference on Computer and communications security (CCS '09), pp. 21-32, Nov. 2009.
4 김홍기, 이임영, "스마트그리드 AMI환경에서의 ID기반 인증기법에 관한 연구," 정보처리학회지c, 18(6), pp. 397-404, 2011년 12월.
5 최재덕, 서정택, "스마트그리드 보호를 위한 AMI 망 분리 및 인증 프레임워크," 정보보호학회논문지, 22(3), pp. 525-536, 2012년 6월.
6 L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical Approaches to DDoS AttackDetection and Response," Proceedings of the DARPA Information Survivability Conference and Exposition, pp. 303-314, Apr. 2003.
7 전재현, "엔트로피를 이용한 DDoS 공격 탐지 방법," 석사학위논문, 경북대학교, 2011년 2월.
8 김민택, 최영우, 권기훈, 김세헌, "다중 엔트로피를 이용한 네트워크 공격 탐지 기법," 정보보호학회논문지, 16(1), pp. 71-77, 2006년 2월.
9 Y. Yokota, "An Approximate Method for Bayesian Entropy Estimation for a Discrete Random Variable," Proceedings of the 26th IEEE EMBS, pp. 99-102, Sep. 2004.
10 L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," Proceedings of the IEEE Int. Conf. on Comm.(ICC), pp. 4646-4651, Jun. 2007.
11 Y. Liu, P. Ning, and H. Dai, "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures," Proceedings of IEEE Symp. Security and Privacy, pp. 286-301, May 2010.
12 M. Quan, E. Navarro, and B. Peuker, "Wi-Fi Localization Using RSSI Fingerprinting," Bachelor's thesis, California Polytechnic State University, 2010.
13 A.S. Paul and E.A. Wan, "Wi-Fi based indoor localization and tracking using sigma-point Kalman filtering methods," Proceedings of IEEE/ION Position, Location and Navigation Symposium, pp. 646-659, May 2008.
14 M. Kim, "A Survey on Guaranteeing Availability in Smart Grid Communications," Proceedings of IEEE ICACT, pp. 314-317, Feb. 2012.
15 정교일 , 박한나 , 정부금 , 장종수 , 정명애, "스마트 그리드의 안전성과 보안 이슈," 정보보호학회지, 22(5), pp. 54-61, 2012년 8월.
16 Y.M. Kwon, J.S. Kim, M.Y. Chung, H. Choo, T.J. Lee, and M. Kim, "State of the Art 3GPP M2M Communications toward Smart Grid," KSII Transactions on Internet and Information Systems, vol. 6, no. 2, pp. 468-479, Feb. 2012.