FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems †
Abstract
:1. Introduction
2. Literature Review
2.1. NIST Smart Grid Security Guidelines
- Distribution Sensors: Devices that measure physical quantities and send them as digital signals to be used by other actors in the system.
- Remote Terminal Units (RTUs) and Intelligent Electronic Devices (IEDs): Receive information from various sensors and send commands accordingly.
- Distribution Data Collector: A system that collects data from different sources and modifies or transfers these data.
- Distributed Intelligence Capabilities: Autonomous applications that operate separate from centralized control to increase responsiveness and reliability of the system.
- Geographic Information System: A management system that provides asset information and status for other advanced applications.
- Field Crew Tools: Maintenance hand-held tools that are used for field engineering.
- Concurrent Session Control: This requirement mandates that the number of concurrent sessions should be limited.
- Remote Session Lock and Termination: This requirement highlights the need to define an inactivity period that results in a session timeout. After this period, users and devices need to re-authenticate to be able to activate the session again.
- Permitted Actions without Identification or Authentication: This implies defining access levels to users based on their roles in the system.
- Remote Access: Remote access should be disabled by default, and only enabled when required, approved, and for the required time only. All methods of remote access should be managed, authorized, and monitored.
- Wireless Access Restrictions: All wireless communication devices should be authenticated. Wireless data transfer should be encrypted. A wireless intrusion detection system (WIDS) should be in place.
- User Identification and Authentication: This requirement highlights that all system users should be uniquely identified and authenticated using multi-factor authentication.
- Device Identification and Authentication: An up-to-date list of authentic devices with their details should be prepared and securely stored. Authentication of all devices should be enforced using bi-directional authentication through an authentication server.
- Denial-of-Service Protection: This requirement aims to ensure that all nodes in a smart grid information system can mitigate the effect of DoS attacks.
- Boundary Protection: It addresses defining internal and external boundaries of the smart grid domain of interest and controlling communication functions at the defined boundaries. This includes allowing communication to external networks only through protected interfaces and limiting the number of these interfaces.
- Communication Integrity: The goal of this requirement is to warrant that a smart grid information system protects the integrity of data in all communication functions.
- Software and Information Integrity: It aims at detecting any unauthorized changes to information and software applications.
2.2. Distribution System Communication Requirements
2.3. Related Works
3. Communication Architecture Based on NIST Security Guidelines
3.1. Network Configuration
- Control Center Cloud (CCC): It contains the supervisory control and data acquisition (SCADA) servers that are used to monitor and control substations and the authentication server. Besides, the CCC has managed network interfaces to allow communication to other domains or external networks. Thus, data communication through these interfaces is performed via a proxy, protected by a firewall (FW), and an intrusion prevention system (IPS). The communication inside the CCC usually uses a high-speed wired communication network.
- Primary Substation Cloud (PSC): This cloud contains all the primary substations in the distribution system either high/medium voltage substations such as the 132/33 kV or medium voltage substations 33/11 kV in the European systems. These substations belong to different geographical areas. For instance, the high/medium voltage substations are typically close to the transmission system, whereas the medium voltage substations are directly connected to the medium/low substations (11 kV/0.24 kV) to feed the consumer premises. High and medium voltage primary substations (i.e., 132/33 kV and 33/11 kV, respectively) can communicate with the CCC and each other through their cloud by means of wired communication given their number and the distance between their sites. In Figure 3, only the links to the CCC are shown. The current SCADA systems do not monitor the medium/low voltage substations (secondary substations), but this is essential in future smart grid distribution systems, especially with the existence of distributed generators, which are typically connected from the low voltage side. Thus, for the sake of achieving active distribution network management, each medium voltage substation (33/11 kV) should be able to monitor and provide control features to the secondary substations connected to it. Therefore, in the proposed architecture, each primary substation is connected to several secondary substation clusters or clouds (SSCs) based on their geographic locations. The connection is made through a secondary substation backbone cloud, which is a wireless mesh backbone. The number of secondary substations in each SSC can be determined based on the requirements of smart grid control applications that the distribution network operator plans to run and the needed security level as discussed in Section 5.
- Secondary Substation Backbone Cloud (SSBC): This cloud is a mesh network that connects each primary substation wirelessly to its SSCs via two routers (e.g., R1 and R2 in Figure 3 for redundancy). Each SSC is connected to the SSBC using also two gateways (e.g., GW1 and GW2 in Figure 3). The two gateways are the routers of the closest secondary substations to the SSBC backbone routers, but each one has an extra responsibility of forwarding the traffic of the SSC cloud to the rest of the network. The SSBC routers form a WiFi mesh network that relies on the IEEE 802.11s protocol [38]. However, end-to-end data transfer authentication, privacy, and integrity are achieved through the FDIPP protocol as described in Section 4. Thus, the SSBC can work with any on-demand ad-hoc or mesh routing protocol that does not have information security features.
- Secondary Substation Cloud (SSC): It connects secondary substations to one another, to their respective primary substation (via the SSBC), and ultimately to the CCC to allow exchanging sensed data and/or commands. Each SS in an SSC is equipped with a WiFi router that has one wireless network interface. Secondary substations can communicate with one another and to the SSC gateway using any on-demand ad-hoc or mesh routing protocol as FDIPP offers privacy, authentication, and integrity for data transfer between them. Moreover, the secondary substation routers run host-based firewalls to protect the smart substation devices, which send their data through these routers.
3.2. Cyber-Security Awareness
3.2.1. Concurrent Session Control
3.2.2. Remote Session Lock and Termination
3.2.3. Permitted Actions without Identification or Authentication
3.2.4. Remote Access
3.2.5. Wireless Access Restrictions
3.2.6. User Identification and Authentication
3.2.7. Device Identification and Authentication
3.2.8. Denial-of-Service Protection
- If the communication with a gateway failed due to DoS attack, its redundant node can take over and deliver traffic.
- A DoS attack on an SSBC router can be automatically mitigated by selecting another path using the operating ad-hoc on-demand routing protocol.
- The routing protocol running on secondary substation routers can select another neighbor station for packet forwarding in case the communication with the currently selected neighbor is disrupted.
- ARP requests and responses can be replaced by populating the ARP cache of different nodes manually with their neighbors’ MAC addresses and corresponding IP addresses.
- Due to the periodic reporting nature of regular data traffic from primary and secondary substations, any communication disruption can be easily noticed at the CCC and primary substations, respectively.
- Applying defense-in-depth techniques in the CCC can protect from most attacks coming to or through the CCC, including DoS and distributed DoS (DDoS).
- All routers should be equipped with host-based firewalls.
3.2.9. Boundary Protection
3.2.10. Communication Integrity
3.2.11. Software and Information Integrity
4. FDIPP Description
4.1. Assumptions and Notations
- All network cables that connect the primary substations to the Control Center are secure.
- The CCC is highly secure. It reduces the probability of compromise by employing defense-in-depth techniques such as next generation antivirus software (i.e., end point detection and response), intrusion detection systems, intrusion prevention systems, firewalls, multi-factor authentication, and access control.
- The communication link between a primary substation and the authentication server is physically secure. Furthermore, connecting a new primary substation to the authentication server is done via a secure process.
- All computers in any substation (either primary or secondary) are assumed tamper-proof. Likewise, all power station premises are assumed physically secure.
- There are private/public key pairs generated and stored at all devices at commissioning time.
- The AS keeps track of the authenticated nodes, their IP addresses, and the cloud they belong to. This helps in revoking access at any time if intrusion attempts are detected.
- The AS stores a database of a long term key , a one time key , and automatically generated password for every node i in the network. Furthermore, , , and are securely stored in each node i and become available at the commissioning time.
- Time is synchronized between all nodes.
4.2. Node Authentication
- Step 1: SSBC Router → PS: Authentication start.
- Step 2: SSBC Router ← PS: Identity request.
- Step 3: SSBC Router → PS: The router provides a temporal ID as the identity response. The sent message is where is the router’s nonce.
- Step 4: PS → AS: The primary substation forwards to the AS.
- Step 5: PS ← AS: The AS sends a challenge made of , where is a nonce generated by the AS, is a randomly generated key, and is the hash of the router nonce.
- Step 6: SSBC Router ← PS: The PS forwards to the router. The router will be able to extract and by XORing the received message with again. Then decrypting . After that, it sets .
- Step 7: SSBC Router → PS: The router responds with .
- Step 8: PS → AS: The primary substation forwards to the AS.
- Step 9: PS ← AS: If the hash was correct, the server sets and sends Access Accept message. It also generates a unique session key for node i, a unique cloud key (the key for the SSBC j), and forwards each one of them to the primary substation in a message as mentioned in Section 4.4.
- Step 10: SSBC Router ← PS: The PS sends Authentication Success message and forwards the messages containing and . Each key is 512 bits in length and divided in two equal parts (i.e., and ); one is used for AES encryption, whereas the other half is used to generate an HMAC. After the successful authentication of an SSBC router, the channel between this router and the AS is considered secure. This allows the router to act as the authenticator for the SSBC routers that are one hop away from it (two hops away from the primary substation). The process then continues until the AS authenticates all the SSBC routers in the SSBC cloud.
4.3. Peer Authentication
- SS1 → SS2: Secondary Substation 1 (SS1) sends its ID (SSID) and the nonce to Secondary Substation 2 (SS2) as . SS2 stores the nonce .
- SS1 ← SS2: SS2 responds with its ID and the nonce to SS1 as . SS1 stores the nonce .
- SS1 → SS2: SS1 responds with HMAC of both nonces in . If the hash is correct, SS2 considers SS1 to be authentic.
- SS1 ← SS2: SS2 responds with HMAC of both nonces in . If the hash is correct, SS1 considers SS2 to be authentic.
4.4. Key Management
- Twelve public RSA keys of the AS are securely stored in all nodes. Each key has a minimum validity period of one month.
- The AS also has twelve public keys for each node in the system. Each key should be used for a minimum period of one month.
- Asymmetric RSA keys are changed every configured period in a predefined order.
- RSA keys have to be physically replaced by authorized personnel every a minimum time of one year at all nodes in the system.
- The session key is used to transfer messages between node i and the AS or the Control Center, where . Furthermore, the cloud key , the key for the cloud j, is transferred from the AS to node i in another message (the cloud here refers to either SSBC or SSC). The two keys are automatically sent from the AS to node i, after the Node Authentication phase is successfully done, by the message , where is the public key of node i, or (based on the type of the key), and is the message body including message information such as the message type, node ID, and validity period. The keys have randomized validity durations and will be periodically resent by the AS prior to the end of their validity periods.
- The session key is used to transfer data messages between a secondary substation j () and a primary or another secondary substation (referred to as S). This key is to be created and transferred as follows:- AS: The node sends an encrypted Key Request message , where and is the node nonce.-← AS: The AS sends an encrypted Key Response message to , where .-S← AS: The AS sends the same message to the PS or the other SS (referred to as S) , where is the session key between the primary or the other secondary substation and the AS.
4.5. Post Authentication Data Transfer
4.6. Security Analysis
4.6.1. Node Authentication
4.6.2. Peer Authentication
- Secrecy: Secret information is not revealed to an intruder although the communication network is not trusted.
- Aliveness: Communication partner is alive and able to initiate an event that the other partner can receive. For example, an intruder replaying messages sent earlier is considered a violation of the aliveness claim.
- Synchronization: Communication parties are synchronized (i.e., if node A sends message 1 to node B, a response with message 2 is provided by node B). Synchronization covers both ordered and unmodified delivery of messages.
- Agreement: Communication parties agree on the values of all variables transferred in the protocol.
5. Performance Evaluation
5.1. Simulation Setup
5.2. Simulation Results for SS-Gateway Communications
5.3. Simulation Results for Gateway-PS Communications
5.4. Overall Performance Discussion
5.4.1. Packet Transfer Delay, Loss, and Computational Latency
5.4.2. Execution Time for Node and Peer Authentication Phases
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- The Smart Grid Interoperability Panel—Smart Grid Cybersecurity Committee. Guidelines for Smart Grid Cybersecurity; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2014.
- Jin, D.; Nicol, D.M.; Yan, G. An event buffer flooding attack in DNP3 controlled SCADA systems. In Proceedings of the WSC ’11 Winter Simulation Conference, Phoenix, AZ, USA, 11–14 December 2011; pp. 2614–2626. [Google Scholar]
- Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures. In Proceedings of the First IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MA, USA, 4–6 October 2010; pp. 220–225. [Google Scholar]
- Hittini, H.; Abdrabou, A.; Zhang, L. SADSA: Security aware distribution system architecture for smart grid applications. In Proceedings of the 12th International Conference on Innovations in Information Technology (IIT), Al Ain, UAE, 28–30 November 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Communication Networks and Systems for Power Utility Automation—Part 90-1: Use of IEC 61850 for the Communication between Substation; Technical Report; IEC/TR 61850-90-1; International Electrotechnical Commission: Geneva, Switzerland, 2010.
- Greer, C.; Wollman, D.A.; Prochaska, D.E.; Boynton, P.A.; Mazer, J.A.; Nguyen, C.T.; FitzPatrick, G.J.; Nelson, T.L.; Koepke, G.H.; Hefner, A.R., Jr.; et al. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0; Technical Report; National Institute of Standards and Technology, Engineering Laboratory: Gaithersburg, MD, USA, 2014. [Google Scholar]
- Wang, W.; Lu, Z. Cyber security in the Smart Grid: Survey and challenges. Comput. Netw. 2013, 57, 1344–1371. [Google Scholar] [CrossRef]
- Cunjiang, Y.; Huaxun, Z.; Lei, Z. Architecture Design For Smart Grid. Energy Procedia 2012, 17, 1524–1528. [Google Scholar] [CrossRef] [Green Version]
- Wang, W.; Xu, Y.; Khanna, M. A survey on the communication architectures in smart grid. Comput. Netw. 2011, 55, 3604–3629. [Google Scholar] [CrossRef]
- Gao, J.; Xiao, Y.; Liu, J.; Liang, W.; Chen, C.P. A survey of communication/networking in Smart Grids. Future Gener. Comput. Syst. 2012, 28, 391–404. [Google Scholar] [CrossRef]
- Liang, H.; Abdrabou, A.; Zhuang, W. Stochastic information management for voltage regulation in smart distribution systems. In Proceedings of the IEEE INFOCOM 2014–IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 2652–2660. [Google Scholar] [CrossRef]
- kamal Kaur, R.; Singh, L.K.; Pandey, B. Security Analysis of Smart Grids: Successes and Challenges. IEEE Consum. Electron. Mag. 2019, 8, 10–15. [Google Scholar] [CrossRef]
- Callegari, C.; De Pietro, S.; Giordano, S.; Pagano, M.; Procissi, G. A Distributed Privacy-Aware Architecture for Communication in Smart Grids. In Proceedings of the IEEE International Conference on High Performance Computing and Communications (HPCC), Zhangjiajie, China, 13–15 November 2013; pp. 1622–1627. [Google Scholar]
- Zhang, T.; Lin, W.; Wang, Y.; Deng, S.; Shi, C.; Chen, L. The design of information security protection framework to support smart grid. In Proceedings of the IEEE International Conference on Power System Technology (POWERCON), Hangzhou, China, 24–28 October 2010; pp. 1–5. [Google Scholar]
- Kim, Y.J.; Thottan, M.; Kolesnikov, V.; Lee, W. A secure decentralized data-centric information infrastructure for smart grid. IEEE Commun. Mag. 2010, 48, 58–65. [Google Scholar] [CrossRef]
- Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious Data Attacks on the Smart Grid. IEEE Trans. Smart Grid 2011, 2, 645–658. [Google Scholar] [CrossRef] [Green Version]
- Giani, A.; Bitar, E.; Garcia, M.J.; McQueen, M.; Khargonekar, P.P.; Poolla, K. Smart Grid Data Integrity Attacks. IEEE Trans. Smart Grid 2013, 4, 1244–1253. [Google Scholar] [CrossRef]
- Li, F.; Luo, B. Preserving data integrity for smart grid data aggregation. In Proceedings of the IEEE Third International Conference on Smart Grid Communications (SmartGridComm), Tainan, Taiwan, 5–8 November 2012; pp. 366–371. [Google Scholar]
- Guo, Y.; Ten, C.W.; Jirutitijaroen, P. Data integrity validation framework for distribution system operations. In Proceedings of the CSIIRW’11: Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA, 12–14 October 2011; ACM Request Permissions: New York, NY, USA, 2011; p. 1. [Google Scholar]
- Bhattarai, S.; Ge, L.; Yu, W. A novel architecture against false data injection attacks in smart grid. In Proceedings of the ICC 2012—IEEE International Conference on Communications, Ottawa, ON, Canada, 10–15 June 2012; pp. 907–911. [Google Scholar]
- Yang, X.; Zhao, P.; Zhang, X.; Lin, J.; Yu, W. Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid. IEEE Internet Things J. 2017, 4, 147–161. [Google Scholar] [CrossRef]
- Farraj, A.; Hammad, E.; Kundur, D. A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability. IEEE Trans. Signal Inf. Process. Netw. 2018, 4, 70–81. [Google Scholar] [CrossRef]
- Yang, Q.; Li, D.; Yu, W.; Liu, Y.; An, D.; Yang, X.; Lin, J. Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid. IEEE Internet Things J. 2017, 4, 1726–1738. [Google Scholar] [CrossRef]
- Ni, J.; Zhang, K.; Lin, X.; Shen, X.S. Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors. IEEE Trans. Smart Grid 2019, 10, 1225–1236. [Google Scholar] [CrossRef]
- An, D.; Yang, Q.; Liu, W.; Zhang, Y. Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach. IEEE Access 2019, 7, 110835–110845. [Google Scholar] [CrossRef]
- Kurt, M.N.; Yılmaz, Y.; Wang, X. Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids. IEEE Trans. Inf. Forensics Secur. 2020, 15, 800–815. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Rodrigues, J.J.P.C.; Guizani, M. Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Trans. Ind. Inf. 2019. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Choo, K.R. Towards Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0. IEEE Internet Things J. 2019. [Google Scholar] [CrossRef]
- Li, S.; Xue, K.; Wei, D.S.L.; Yue, H.; Yu, N.; Hong, P. SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1318–1330. [Google Scholar] [CrossRef] [Green Version]
- Cleveland, F. IEC TC57 WG15: IEC 62351 Security Standards for the Power System Information Infrastructure; White Paper; International Electrotechnical Commission: Geneva, Switzerland, 2012. [Google Scholar]
- Hahn, A.; Govindarasu, M. Model-Based Intrustion Detection for the Smart Grid (MINDS). In Proceedings of the CSIIRW ’13: Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, USA, 8–10 January 2013; Association for Computing Machinery: New York, NY, USA, 2013. [Google Scholar] [CrossRef]
- Yang, Y.; Xu, H.; Gao, L.; Yuan, Y.; McLaughlin, K.; Sezer, S. Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks. IEEE Trans. Power Deliv. 2017, 32, 1068–1078. [Google Scholar] [CrossRef] [Green Version]
- Hong, J.; Liu, C.; Govindarasu, M. Integrated Anomaly Detection for Cyber Security of the Substations. IEEE Trans. Smart Grid 2014, 5, 1643–1653. [Google Scholar] [CrossRef]
- Hayes, G.; El-Khatib, K. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In Proceedings of the Third International Conference on Communications and Information Technology (ICCIT), Beirut, Lebanon, 19–21 June 2013; pp. 179–184. [Google Scholar] [CrossRef]
- Amoah, R.; Camtepe, S.; Foo, E. Securing DNP3 Broadcast Communications in SCADA Systems. IEEE Trans. Ind. Inf. 2016, 12, 1474–1485. [Google Scholar] [CrossRef]
- Yang, Q.; Barria, J.; Green, T. Communication Infrastructures for Distributed Control of Power Distribution Networks. IEEE Trans. Ind. Inf. 2011, 7, 316–327. [Google Scholar] [CrossRef] [Green Version]
- Abdrabou, A. A Wireless Communication Architecture for Smart Grid Distribution Networks. IEEE Syst. J. 2016, 10, 251–261. [Google Scholar] [CrossRef]
- Hiertz, G.; Denteneer, D.; Max, S.; Taori, R.; Cardona, J.; Berlemann, L.; Walke, B. IEEE 802.11s: The WLAN Mesh Standard. Wirel. Commun. IEEE 2010, 17, 104–111. [Google Scholar] [CrossRef]
- Dang, Q. Secure Hash Standard (SHS); Information Technology Laboratory: Gaithersburg, MD, USA, 2015. [Google Scholar]
- Genkin, D.; Shamir, A.; Tromer, E. RSA key extraction via low-bandwidth acoustic cryptanalysis. In Advances in Cryptology–CRYPTO 2014; Springer: Berlin, Germany, 2014; pp. 444–461. [Google Scholar]
- Fan, C.I.; Lin, Y.H.; Hsu, R.H. Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs. IEEE Transa. Parallel Distrib. Syst. 2013, 24, 672–680. [Google Scholar] [CrossRef]
- Matsuo, S.; Miyazaki, K.; Otsuka, A.; Basin, D. How to Evaluate the Security of Real-Life Cryptographic Protocols? Financ. Cryptog. Data Secur. 2010, 6054, 182. [Google Scholar]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Bellare, M.; Rogaway, P. Entity authentication and key distribution. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 22–26 August 1993; Springer: Berlin, Germany, 1993; pp. 232–249. [Google Scholar]
- Kupser, D.; Mainka, C.; Schwenk, J.; Somorovsky, J. How to Break {XML} Encryption–Automatically. In Proceedings of the 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), Washington, DC, USA, 10–11 August 2015. [Google Scholar]
- Cremers, C.J.F. Scyther: Semantics and Verification of Security Protocols; Eindhoven University of Technology: Eindhoven, The Netherlands, 2006. [Google Scholar]
- Paul, T.; Ogunfunmi, T. Wireless LAN Comes of Age: Understanding the IEEE 802.11n Amendment. IEEE Circuits Syst. Mag. 2008, 8, 28–54. [Google Scholar] [CrossRef]
- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Further Higher-Speed Physical Layer Extension in the 2.4 GHz Band. In IEEE Std 802.11g/D1.1; IEEE: Piscataway, NJ, USA, 2001.
- Krausz, T.; Sztrik, J. Performance evaluation of wireless networks speed depending on the encryption. Ann. Math. Inform. 2013, 42, 45–55. [Google Scholar]
- He, B.; Nahrstedt, K. An integrated solution to delay and security support in wireless networks. In Proceedings of the IEEE Wireless Communications and Networking Conference, Las Vegas, NV, USA, 3–6 April 2006; Volume 4, pp. 2211–2215. [Google Scholar] [CrossRef]
- Hayajneh, T.; Ullah, S.; Mohd, B.J.; Balagani, K.S. An Enhanced WLAN Security System with FPGA Implementation for Multimedia Applications. IEEE Syst. J. 2017, 11, 2536–2545. [Google Scholar] [CrossRef]
- Broch, J.; Maltz, D.A.; Johnson, D.B.; Hu, Y.C.; Jetcheva, J. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom ’98, Dallas, TX, USA, 25–30 October 1998; Association for Computing Machinery: New York, NY, USA, 1998; pp. 85–97. [Google Scholar] [CrossRef]
Message Type | Delay Constraint (ms) | Usage |
---|---|---|
Type 1A | 3–10 | Fault isolation and protection (e.g., trip command) |
Type 1B | 2–100 | Normal (routine communication) and other fast messages |
Type 4 | 3–10 | Raw data |
Type 2 | 100 | Monitoring and readings transfer (medium speed) |
Type 3 | 500 | Low speed data transfer |
Type 6 | 1000 | File transfer |
System Parameter | Value |
---|---|
MAC Header | 208 bits |
26 s | |
5.583 | |
MAC Slot Time | 20 s |
Short Inter-frame Space (SIFS) | 10 s |
Distributed Inter-frame (DIFS) | 50 s |
SSBC Number of Nodes | 50 |
Data Rate SSC | 54 Mbps |
Data Rate SSBC | 300 Mbps |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hittini, H.; Abdrabou, A.; Zhang, L. FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems. Sensors 2020, 20, 679. https://doi.org/10.3390/s20030679
Hittini H, Abdrabou A, Zhang L. FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems. Sensors. 2020; 20(3):679. https://doi.org/10.3390/s20030679
Chicago/Turabian StyleHittini, Hosam, Atef Abdrabou, and Liren Zhang. 2020. "FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems" Sensors 20, no. 3: 679. https://doi.org/10.3390/s20030679
APA StyleHittini, H., Abdrabou, A., & Zhang, L. (2020). FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems. Sensors, 20(3), 679. https://doi.org/10.3390/s20030679