13,615 research outputs found

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power Line Communication

    Get PDF
    This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead.

    Cyber Switching Attacks on Smart Grids

    Get PDF
    As we live in smart grid revolution, the conventional power systems turn into a fast pace toward smart grids, this transition creates new and significant challenges on the electrical network security level; In addition to the important features of the smart grids, cyber security transpire to be a serious issue due to connecting all the loads, generation units, renewable resources, substations and switches via communication network. Cyber-physical attacks are classified as the major threatening of smart grids security, this attacks may lead to a many severe repercussions in the smart grid such as large blackout and destruction of infrastructures. Switching attack is one of the most serious cyber-physical attacks on smart grids because it is direct, fast, and effective in destabilizing the grids. We start the thesis by introducing a state-of-the-art on cyber attacks from the power layer point of view i.e. the cyber attacks that affect the smart grid stability and what are the power system based solutions have been done so far to prevent or reduce the cyber attacks severity .As we focus on cyber switching attack and the method of preventing it, firstly a study on the attack principles and effects is introduced, we construct the attack on a single machine connected to an infinite bus through a transmission line. The attack on the target generator implemented by modeling the system using swing equation on Matlab platform, then we verified the result by implementing the same attack on Simulink Platform. Finally we present a novel solution to mitigate such type of attacks by using Thyristor-Controlled Braking Resistor (TCBR).The suggested solution is able to recapture the machine stability directly after the attack

    Model Predictive Control Design for the Secondary Frequency Control of Microgrid Considering Time Delay Attacks

    Get PDF
    Fast depleting fossil fuels and growing awareness of environmental protection have raised worldwide concerns, aiming to build a sustainable and smart energy ecosystem. Renewable energy generation plays an important role in providing clean power supply. However, the integration of a bulk renewable generation system would also introduce new forms of disturbances and uncertainties to impact the power quality, threatening the secure operation of the distribution network. Microgrid, as an emerging technology, is quite appealing to be interfaced with distribution systems due to its potential economic, environmental, and technical benefits. The microgrid differs from the “smart grid” with different control strategies to accomplish the goal of helping the power grid with load balancing and voltage control and assisting power markets. A hierarchical control structure for the microgrid is commonly designed to address all above issues both in islanded mode and grid-connected mode. On the other hand, concerns about cybersecurity threats in the microgrid are steadily rising, and enormous number of economic losses would occur if defense strategies are not stipulated and carried out. In the modern power system, distributed control system, intelligent measuring devices and Internet of Things (IoT) are highly recommended in microgrid systems, which lead to the vulnerability of communication channels. Cyber threats such as false data injection (FDI) attacks, denial of service (DoS) attacks, and time-delay switch attacks (TDS) can be effortlessly implemented through information and communication centers, compromising the secure operation of power systems. By theoretically analyzing the AC microgrid simulation model, the MPC control strategies, and the modified MPC method based on GCC estimation will be studied in this thesis. In the second chapter, this thesis summarizes the start-art-of microgrid control, introducing a hierarchical control structure: primary control, secondary control, and tertiary control. These control levels differ in their speed of response, the time frame in which they operate, and infrastructure requirements. We focus on the centralized secondary frequency control system, which compensates the frequency deviation caused by primary control—P/f method. Then, in Chapter 3, the isolated AC MG frequency control system including WTG, DEG, PV panel and energy storage system with MPC controller is modeled. Three case studies are designed in MATLAB/Simulink to illustrate the advantages of the MPC method compared with the traditional PI controller. In the next Chapter, since state estimation based on precise status feedback of the system components is essential for the MPC controller to calculate corresponding control signal, the status feedback attack to BESS and FESS is considered. Correspondingly, an online status switching method is proposed to detect the original statuses of BESS and FESS, updating the state estimation function to obtain desirable performance of frequency regulation. Last, considering the time delay attack hacked by the adversary in the sensor, a modified MPC method based on GCC estimation is proposed to detect and track time delay attacks online. The model of proposed method to regulate frequency deviation is built in MATLAB. There are three case studies in this part: a constant time-delay attack with 0.1 pu load increase; a time-varying delay attack with 0.1 pu load increase; and a time-varying delay attack with changing load disturbance. By analyzing results of three cases, the effectiveness of the modified MPC method is proved

    Model Predictive Control Design for the Secondary Frequency Control of Microgrid Considering Time Delay Attacks

    Get PDF
    Fast depleting fossil fuels and growing awareness of environmental protection have raised worldwide concerns, aiming to build a sustainable and smart energy ecosystem. Renewable energy generation plays an important role in providing clean power supply. However, the integration of a bulk renewable generation system would also introduce new forms of disturbances and uncertainties to impact the power quality, threatening the secure operation of the distribution network. Microgrid, as an emerging technology, is quite appealing to be interfaced with distribution systems due to its potential economic, environmental, and technical benefits. The microgrid differs from the “smart grid” with different control strategies to accomplish the goal of helping the power grid with load balancing and voltage control and assisting power markets. A hierarchical control structure for the microgrid is commonly designed to address all above issues both in islanded mode and grid-connected mode. On the other hand, concerns about cybersecurity threats in the microgrid are steadily rising, and enormous number of economic losses would occur if defense strategies are not stipulated and carried out. In the modern power system, distributed control system, intelligent measuring devices and Internet of Things (IoT) are highly recommended in microgrid systems, which lead to the vulnerability of communication channels. Cyber threats such as false data injection (FDI) attacks, denial of service (DoS) attacks, and time-delay switch attacks (TDS) can be effortlessly implemented through information and communication centers, compromising the secure operation of power systems. By theoretically analyzing the AC microgrid simulation model, the MPC control strategies, and the modified MPC method based on GCC estimation will be studied in this thesis. In the second chapter, this thesis summarizes the start-art-of microgrid control, introducing a hierarchical control structure: primary control, secondary control, and tertiary control. These control levels differ in their speed of response, the time frame in which they operate, and infrastructure requirements. We focus on the centralized secondary frequency control system, which compensates the frequency deviation caused by primary control—P/f method. Then, in Chapter 3, the isolated AC MG frequency control system including WTG, DEG, PV panel and energy storage system with MPC controller is modeled. Three case studies are designed in MATLAB/Simulink to illustrate the advantages of the MPC method compared with the traditional PI controller. In the next Chapter, since state estimation based on precise status feedback of the system components is essential for the MPC controller to calculate corresponding control signal, the status feedback attack to BESS and FESS is considered. Correspondingly, an online status switching method is proposed to detect the original statuses of BESS and FESS, updating the state estimation function to obtain desirable performance of frequency regulation. Last, considering the time delay attack hacked by the adversary in the sensor, a modified MPC method based on GCC estimation is proposed to detect and track time delay attacks online. The model of proposed method to regulate frequency deviation is built in MATLAB. There are three case studies in this part: a constant time-delay attack with 0.1 pu load increase; a time-varying delay attack with 0.1 pu load increase; and a time-varying delay attack with changing load disturbance. By analyzing results of three cases, the effectiveness of the modified MPC method is proved

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures

    Get PDF
    In recent years, the security of networked control systems (NCSs) has been an important challenge for many researchers. Although the security schemes for networked control systems have advanced in the past several years, there have been many acknowledged cyber attacks. As a result, this dissertation proposes the use of a novel time-delay switch (TDS) attack by introducing time delays into the dynamics of NCSs. Such an attack has devastating effects on NCSs if prevention techniques and countermeasures are not considered in the design of these systems. To overcome the stability issue caused by TDS attacks, this dissertation proposes a new detector to track TDS attacks in real time. This method relies on an estimator that will estimate and track time delays introduced by a hacker. Once a detector obtains the maximum tolerable time delay of a plant’s optimal controller (for which the plant remains secure and stable), it issues an alarm signal and directs the system to its alarm state. In the alarm state, the plant operates under the control of an emergency controller that can be local or networked to the plant and remains in this stable mode until the networked control system state is restored. In another effort, this dissertation evaluates different control methods to find out which one is more stable when under a TDS attack than others. Also, a novel, simple and effective controller is proposed to thwart TDS attacks on the sensing loop (SL). The modified controller controls the system under a TDS attack. Also, the time-delay estimator will track time delays introduced by a hacker using a modified model reference-based control with an indirect supervisor and a modified least mean square (LMS) minimization technique. Furthermore, here, the demonstration proves that the cryptographic solutions are ineffective in the recovery from TDS attacks. A cryptography-free TDS recovery (CF-TDSR) communication protocol enhancement is introduced to leverage the adaptive channel redundancy techniques, along with a novel state estimator to detect and assist in the recovery of the destabilizing effects of TDS attacks. The conclusion shows how the CF-TDSR ensures the control stability of linear time invariant systems
    corecore