An intruder defense model for the detection of power grid disturbances in wireless network

被引:0
|
作者
Benisha, R. B. [1 ]
Raja Ratna, S. [1 ]
机构
[1] VV Coll Engn, Dept Comp Sci & Engn, Tisaiyanvilai, India
关键词
Network security; conviction; intrusion detection; cyber security; encryption; supervisory control And Data Acquisition;
D O I
10.1007/s12046-020-01404-3
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyber security has to gain a high level of awareness in the Network and Computer pasture due to the large spread of information transmission technology. A powerful False Data Injection (FDI) Intruder monitors the network activities and injects the malicious data thereby causing failure in the power system. To overcome this defense, the "Conviction based Intruder Defense Model" is proposed to identify and isolate it from the network by providing secure transmission. This scheme operates in three phases. In the first phase, the data are analyzed with the library files to identify the conviction values. Based on the conviction values the resulting factors are analyzed with different iterations and the suspicious drafts are identified and classified using Fuzzy Intrusion Detection System (FIDS) divider. In the second phase, three algorithms are used to organize the drafts categorized. In the third phase, abnormal nodes are isolated from the network. Experimental results show higher accuracy and detection rates with low false positives.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] An intruder defense model for the detection of power grid disturbances in wireless network
    R B Benisha
    S Raja Ratna
    Sādhanā, 2020, 45
  • [2] Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network
    Rai, Ashok Kumar
    Daniel, A. K.
    JOURNAL OF INTERCONNECTION NETWORKS, 2024, 24 (SUPP01)
  • [3] Wireless Power Network Design Through Smart Grid Transmission System Model
    Samanta, Shouvik Kumar
    Chanda, Chandan Kumar
    2015 INTERNATIONAL CONFERENCE ON ENERGY, POWER AND ENVIRONMENT: TOWARDS SUSTAINABLE GROWTH (ICEPE), 2015,
  • [4] Swarming network for intruder detection
    Krill, J. A.
    Day, D. A.
    O'Driscoll, M. J.
    O'Haver, K. W.
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, : 341 - 346
  • [5] Intruder detection using a wireless sensor network with an intelligent mobile robot response
    Li, YuanYuan
    Parker, Lynne E.
    PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, 2008, : 37 - 42
  • [6] Research on Collaborative Defense Model of Power Grid Security
    Guan, Xiaojuan
    Ma, Yuanyuan
    Shao, Zhipeng
    Zhang, Bo
    2018 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2018, : 270 - 273
  • [8] A Leader Based Intrusion Detection System for Preventing Intruder in Heterogeneous Wireless Sensor Network
    Rajkumar, Udaya Suriya D.
    Vayanaperumal, Rajamani
    2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
  • [9] Camera Network Coordination for Intruder Detection
    Pasqualetti, Fabio
    Zanella, Filippo
    Peters, Jeffrey Russel
    Spindler, Markus
    Carli, Ruggero
    Bullo, Francesco
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2014, 22 (05) : 1669 - 1683
  • [10] A stacking ensemble classification model for detection and classification of power quality disturbances in PV integrated power network
    Radhakrishnan, Padmavathi
    Ramaiyan, Kalaivani
    Vinayagam, Arangarajan
    Veerasamy, Veerapandiyan
    Measurement: Journal of the International Measurement Confederation, 2021, 175