Abstract
In the previous chapter, we offered a comprehensive study on modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. However, only modeling and detection cannot provide defense against jamming attacks, and is only the first setup towards anti-jamming communication for wireless smart grid applications. Hence, spread spectrum systems, which provide jamming resilience via multiple frequency and code channels, must be adapted to the smart grid for secure wireless communications, while at the same time providing latency guarantee for control messages. An open question is how to minimize message delay for timely smart grid communication under any potential jamming attack.To address this issue, we provide a paradigm shift from the case-by-case methodology, which is widely used in existing works to investigate well-adopted attack models (also used in the previous chapter), to the worst-case methodology, which offers delay performance guarantee for smart grid applications under any attack. We first define a generic jamming process that characterizes a wide range of existing attack models. Then, we show that in all strategies under the generic process, the worst-case message delay is a U-shaped function of network traffic load. This indicates that, interestingly, increasing a fair amount of traffic can in fact improve the worst-case delay performance. As a result, we demonstrate a lightweight yet promising system, TACT (transmitting adaptive camouflage traffic), to combat jamming attacks. TACT minimizes the message delay by generating extra traffic called camouflage to balance the network load at the optimum. Experiments show that TACT can decrease the probability that a message is not delivered on time in order of magnitude for smart grid applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Mathematically, a function is said to be U-shaped if it is first-decreasing, then-increasing.
- 2.
1 A denotes the indicator function, which has the value 1 for A and the value 0 for A c.
- 3.
The Future Renewable Electric Energy Delivery and Management (FREEDM) systems center at North Carolina State University, Raleigh NC.
References
Akyol B, Kirkham H, Clements S, Hadley M (2010) A survey of wireless communications for the electric power system. Technical Report, Pacific Northwest National Laboratory
Baran M, Shen Z, Liu Z (2010) Power management strategies for the Green Hub. In: FREEDM systems center annual conference
Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM ’08, pp 1265–1273
Chiang JT, Hu YC (2008) Dynamic jamming mitigation for wireless broadcast networks. In: Proceedings of IEEE INFOCOM ’08
Cleveland F (2007) Enhancing the reliability and security of the information infrastructure used to manage the power system. In: Proceedings of the IEEE power & energy society general meeting (PES ’07)
Cleveland F (2007) Uses of wireless communications to enhance power system reliability. In: Proceedings of the IEEE power & energy society general meeting (PES ’07)
El-Khattam W, Sidhu TS, Seethapathy R (2010) Evaluation of two anti-islanding schemes for a radial distribution system equipped with self-excited induction generator wind turbines. IEEE Trans Energy Convers 25:107–117
Gardner J (2011) Spread spectrum communications for SCADA systems. Pipeline Gas J 238:1–6
Glisic SG, Mammela A, Kaasila VP, Pajkovic MD (1995) Rejection of frequency sweeping signal in DS spread spectrum systems using complex adaptive filters. IEEE Trans Commun 43(1):136–145
Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
IEC Standard (2003) IEC 61850: communication networks and systems in substations
Kanabar PM, Kanabar MG, El-Khattam W, Sidhu TS, Shami A (2009) Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources. In: Proceedings of the IEEE power & energy society general meeting (PES ’09)
Li H, Lai L, Qiu RC (2011) A denial-of-service jamming game for remote state monitoring in smart grid. In: Proceedings of 45th annual conference on information sciences and systems (CISS)
Liu Y, Ning P, Dai H, Liu A (2010) Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: Proceedings of IEEE INFOCOM’10
Lu X, Wang W, Ma J (2012) Authentication and integrity in the smart grid: an empirical study in substation automation systems. Int J Distrib Sens Netw 2012:1–13
Mohagheghi S, Stoupis J, Wang Z (2009) Communication protocols and networks for power systems - current status and future trends. In: Proceedings of power systems conference and exposition (PES ’09)
Popper C, Strasser M, Capkun S (2009) Jamming-resistant broadcast communication without shared keys. In: Proceedings of USENIX security symposium (Security ’09)
Pöpper C, Strasser M, Čapkun S (2010) Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE J Sel Areas Commun (Special Issue on Mission Critical Networking, IEEE) 28:703–715
Sidhu TS, Yin Y (2007) Modelling and simulation for performance evaluation of IEC61850-based substation communication systems. IEEE Trans Power Deliv 22(3):1482–1489
Strasser M, Capkun S, Popper C, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proceedings of IEEE symposium on security and privacy, pp 64–78
Strasser M, Popper C, Capkun S (2009) Efficient uncoordinated FHSS anti-jamming communication. In: Proceedings of MobiHoc ’09
The Smart Grid Interoperability Panel - Cyber Security Working Group (2010) Guidelines for smart grid cyber security. NIST IR-7628 1–3
Wang W, Xu Y, Khanna M (2011) A survey on the communication architectures in smart grid. Comput Netw 55:3604–3629
Wilhelm M, Martinovic I, Schmitt JB, Lenders V (2011) Short paper: reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of ACM conference on wireless security (WiSec)
Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc ’05, pp 46–57
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Lu, Z., Wang, W., Wang, C. (2015). Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming. In: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-23288-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-23288-1_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23287-4
Online ISBN: 978-3-319-23288-1
eBook Packages: Computer ScienceComputer Science (R0)