Skip to main content

Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming

  • Chapter
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

In the previous chapter, we offered a comprehensive study on modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. However, only modeling and detection cannot provide defense against jamming attacks, and is only the first setup towards anti-jamming communication for wireless smart grid applications. Hence, spread spectrum systems, which provide jamming resilience via multiple frequency and code channels, must be adapted to the smart grid for secure wireless communications, while at the same time providing latency guarantee for control messages. An open question is how to minimize message delay for timely smart grid communication under any potential jamming attack.To address this issue, we provide a paradigm shift from the case-by-case methodology, which is widely used in existing works to investigate well-adopted attack models (also used in the previous chapter), to the worst-case methodology, which offers delay performance guarantee for smart grid applications under any attack. We first define a generic jamming process that characterizes a wide range of existing attack models. Then, we show that in all strategies under the generic process, the worst-case message delay is a U-shaped function of network traffic load. This indicates that, interestingly, increasing a fair amount of traffic can in fact improve the worst-case delay performance. As a result, we demonstrate a lightweight yet promising system, TACT (transmitting adaptive camouflage traffic), to combat jamming attacks. TACT minimizes the message delay by generating extra traffic called camouflage to balance the network load at the optimum. Experiments show that TACT can decrease the probability that a message is not delivered on time in order of magnitude for smart grid applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Mathematically, a function is said to be U-shaped if it is first-decreasing, then-increasing.

  2. 2.

    1 A denotes the indicator function, which has the value 1 for A and the value 0 for A c.

  3. 3.

    The Future Renewable Electric Energy Delivery and Management (FREEDM) systems center at North Carolina State University, Raleigh NC.

References

  1. Akyol B, Kirkham H, Clements S, Hadley M (2010) A survey of wireless communications for the electric power system. Technical Report, Pacific Northwest National Laboratory

    Book  Google Scholar 

  2. Baran M, Shen Z, Liu Z (2010) Power management strategies for the Green Hub. In: FREEDM systems center annual conference

    Google Scholar 

  3. Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM ’08, pp 1265–1273

    Google Scholar 

  4. Chiang JT, Hu YC (2008) Dynamic jamming mitigation for wireless broadcast networks. In: Proceedings of IEEE INFOCOM ’08

    Google Scholar 

  5. Cleveland F (2007) Enhancing the reliability and security of the information infrastructure used to manage the power system. In: Proceedings of the IEEE power & energy society general meeting (PES ’07)

    Google Scholar 

  6. Cleveland F (2007) Uses of wireless communications to enhance power system reliability. In: Proceedings of the IEEE power & energy society general meeting (PES ’07)

    Google Scholar 

  7. El-Khattam W, Sidhu TS, Seethapathy R (2010) Evaluation of two anti-islanding schemes for a radial distribution system equipped with self-excited induction generator wind turbines. IEEE Trans Energy Convers 25:107–117

    Article  Google Scholar 

  8. Gardner J (2011) Spread spectrum communications for SCADA systems. Pipeline Gas J 238:1–6

    Google Scholar 

  9. Glisic SG, Mammela A, Kaasila VP, Pajkovic MD (1995) Rejection of frequency sweeping signal in DS spread spectrum systems using complex adaptive filters. IEEE Trans Commun 43(1):136–145

    Article  Google Scholar 

  10. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge

    Book  Google Scholar 

  11. IEC Standard (2003) IEC 61850: communication networks and systems in substations

    Google Scholar 

  12. Kanabar PM, Kanabar MG, El-Khattam W, Sidhu TS, Shami A (2009) Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources. In: Proceedings of the IEEE power & energy society general meeting (PES ’09)

    Google Scholar 

  13. Li H, Lai L, Qiu RC (2011) A denial-of-service jamming game for remote state monitoring in smart grid. In: Proceedings of 45th annual conference on information sciences and systems (CISS)

    Google Scholar 

  14. Liu Y, Ning P, Dai H, Liu A (2010) Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: Proceedings of IEEE INFOCOM’10

    Google Scholar 

  15. Lu X, Wang W, Ma J (2012) Authentication and integrity in the smart grid: an empirical study in substation automation systems. Int J Distrib Sens Netw 2012:1–13

    Google Scholar 

  16. Mohagheghi S, Stoupis J, Wang Z (2009) Communication protocols and networks for power systems - current status and future trends. In: Proceedings of power systems conference and exposition (PES ’09)

    Google Scholar 

  17. Popper C, Strasser M, Capkun S (2009) Jamming-resistant broadcast communication without shared keys. In: Proceedings of USENIX security symposium (Security ’09)

    Google Scholar 

  18. Pöpper C, Strasser M, Čapkun S (2010) Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE J Sel Areas Commun (Special Issue on Mission Critical Networking, IEEE) 28:703–715

    Google Scholar 

  19. Sidhu TS, Yin Y (2007) Modelling and simulation for performance evaluation of IEC61850-based substation communication systems. IEEE Trans Power Deliv 22(3):1482–1489

    Article  Google Scholar 

  20. Strasser M, Capkun S, Popper C, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proceedings of IEEE symposium on security and privacy, pp 64–78

    Google Scholar 

  21. Strasser M, Popper C, Capkun S (2009) Efficient uncoordinated FHSS anti-jamming communication. In: Proceedings of MobiHoc ’09

    Google Scholar 

  22. The Smart Grid Interoperability Panel - Cyber Security Working Group (2010) Guidelines for smart grid cyber security. NIST IR-7628 1–3

    Google Scholar 

  23. Wang W, Xu Y, Khanna M (2011) A survey on the communication architectures in smart grid. Comput Netw 55:3604–3629

    Article  Google Scholar 

  24. Wilhelm M, Martinovic I, Schmitt JB, Lenders V (2011) Short paper: reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of ACM conference on wireless security (WiSec)

    Google Scholar 

  25. Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc ’05, pp 46–57

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Lu, Z., Wang, W., Wang, C. (2015). Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming. In: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-23288-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23288-1_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23287-4

  • Online ISBN: 978-3-319-23288-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics