Skip to main content

2015 | OriginalPaper | Buchkapitel

2. Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we aim at modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics, such as packet loss and throughput are used to measure the network performance, we introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. Our modeling approach is inspired by the similarity between the behavior of a jammer who attempts to disrupt the delivery of a time-critical message and the behavior of a gambler who tends to win a gambling game. Therefore, by gambling-based modeling and real-time experiments, we find that there exist a phase transition phenomenon for successful time-critical message delivery under a variety of jamming attacks. That is, as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly, then increases dramatically to 1. Based on analytical and experimental results, we design the jamming attack detection based on estimation (JADE) scheme to achieve efficient and robust jamming detection, and implement the JADE system in a wireless network for power substations in the smart grid.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The end-to-end delay of a message is defined as the time interval from the instant that the transmitter’s application layer generates the message to the instant that the receiver’s application layer successfully receives it.
 
2
The value of \(\frac{p_{a}} {1-p_{a}}\mathbb{E}(d_{n})\) does not affect the interpretation of our gambling game mapping. It will be shown later that this value is essential to our martingale construction.
 
3
Note that the reason for \(D_{u}\! >\!\sigma\) is that the MAC layer still needs to finish an ongoing transmission even though the application layer is aware that the cumulative delay exceeds the constant \(\sigma\).
 
Literatur
1.
Zurück zum Zitat Aad I, Hubaux JP, Knightly E (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Netw 16:791–802CrossRef Aad I, Hubaux JP, Knightly E (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Netw 16:791–802CrossRef
2.
Zurück zum Zitat Akyol B, Kirkham H, Clements S, Hadley M (2010) A survey of wireless communications for the electric power system. Technical Report, Pacific Northwest National LaboratoryCrossRef Akyol B, Kirkham H, Clements S, Hadley M (2010) A survey of wireless communications for the electric power system. Technical Report, Pacific Northwest National LaboratoryCrossRef
3.
Zurück zum Zitat Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM ’08, pp 1265–1273 Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM ’08, pp 1265–1273
4.
Zurück zum Zitat Chiang JT, Hu YC (2008) Dynamic jamming mitigation for wireless broadcast networks. In: Proceedings of IEEE INFOCOM ’08 Chiang JT, Hu YC (2008) Dynamic jamming mitigation for wireless broadcast networks. In: Proceedings of IEEE INFOCOM ’08
5.
Zurück zum Zitat Cleveland F (2007) Uses of wireless communications to enhance power system reliability. In: Proceedings of the IEEE Power & Energy Society General Meeting (PES ’07) Cleveland F (2007) Uses of wireless communications to enhance power system reliability. In: Proceedings of the IEEE Power & Energy Society General Meeting (PES ’07)
6.
Zurück zum Zitat David W (1991) Probability with martingales. Cambridge University Press, CambridgeMATH David W (1991) Probability with martingales. Cambridge University Press, CambridgeMATH
7.
Zurück zum Zitat Emrich S (2007) Dispelling the myths associated with spread spectrum radio technology in electric power SCADA networks. In: Proceedings of the IEEE Power & Energy Society General Meeting (PES ’07) Emrich S (2007) Dispelling the myths associated with spread spectrum radio technology in electric power SCADA networks. In: Proceedings of the IEEE Power & Energy Society General Meeting (PES ’07)
9.
Zurück zum Zitat Hamieh A, Ben-Othman J (2009) Detection of jamming attacks in wireless ad hoc networks using error distribution. In: Proceedings of IEEE ICC ’09 Hamieh A, Ben-Othman J (2009) Detection of jamming attacks in wireless ad hoc networks using error distribution. In: Proceedings of IEEE ICC ’09
10.
Zurück zum Zitat IEC Standard (2003) IEC 61850: communication networks and systems in substations IEC Standard (2003) IEC 61850: communication networks and systems in substations
11.
Zurück zum Zitat Kanabar PM, Kanabar MG, El-Khattam W, Sidhu TS, Shami A (2009) Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources. In: Proceedings of the IEEE Power & Energy Society General Meeting (PES ’09) Kanabar PM, Kanabar MG, El-Khattam W, Sidhu TS, Shami A (2009) Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources. In: Proceedings of the IEEE Power & Energy Society General Meeting (PES ’09)
12.
Zurück zum Zitat Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proceedings of IEEE INFOCOM’07, pp 1307–1315 Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proceedings of IEEE INFOCOM’07, pp 1307–1315
13.
Zurück zum Zitat Liu Y, Ning P, Dai H, Liu A (2010) Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: Proceedings of IEEE INFOCOM ’10 Liu Y, Ning P, Dai H, Liu A (2010) Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: Proceedings of IEEE INFOCOM ’10
14.
Zurück zum Zitat Lu X, Lu Z, Wang W, Ma J (2011) On network performance evaluation toward the smart grid: a case study of DNP3 over TCP/IP. In: Proceedings of IEEE global communications conference (Globecom’ 11) Lu X, Lu Z, Wang W, Ma J (2011) On network performance evaluation toward the smart grid: a case study of DNP3 over TCP/IP. In: Proceedings of IEEE global communications conference (Globecom’ 11)
16.
Zurück zum Zitat Malone D, Duffy K, Leith D (2007) Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans Netw 15:159–172CrossRef Malone D, Duffy K, Leith D (2007) Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans Netw 15:159–172CrossRef
17.
Zurück zum Zitat Navda V, Bohra A, Ganguly S, Rubenstein D (2007) Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proceedings of IEEE INFOCOM ’07, pp 2526–2530 Navda V, Bohra A, Ganguly S, Rubenstein D (2007) Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proceedings of IEEE INFOCOM ’07, pp 2526–2530
18.
Zurück zum Zitat NIST News Release (2011) Smart grid panel agrees on standards and guidelines for wireless communication, meter upgrades NIST News Release (2011) Smart grid panel agrees on standards and guidelines for wireless communication, meter upgrades
19.
Zurück zum Zitat Office of the National Coordinator for Smart Grid Interoperability (2009) NIST framework and roadmap for smart grid interoperability standards, release 1.0. NIST Special Publication 1108 Office of the National Coordinator for Smart Grid Interoperability (2009) NIST framework and roadmap for smart grid interoperability standards, release 1.0. NIST Special Publication 1108
20.
Zurück zum Zitat Popper C, Strasser M, Capkun S (2009) Jamming-resistant broadcast communication without shared keys. In: Proceedings of USENIX security symposium (Security ’09) Popper C, Strasser M, Capkun S (2009) Jamming-resistant broadcast communication without shared keys. In: Proceedings of USENIX security symposium (Security ’09)
21.
Zurück zum Zitat Sang L, Arora A (2009) Capabilities of low-power wireless jammers. In: Proceedings of IEEE INFOCOM ’09 mini-conference Sang L, Arora A (2009) Capabilities of low-power wireless jammers. In: Proceedings of IEEE INFOCOM ’09 mini-conference
22.
Zurück zum Zitat Sidhu TS, Yin Y (2007) Modelling and simulation for performance evaluation of IEC61850-based substation communication systems. IEEE Trans Power Deliv 22(3):1482–1489CrossRef Sidhu TS, Yin Y (2007) Modelling and simulation for performance evaluation of IEC61850-based substation communication systems. IEEE Trans Power Deliv 22(3):1482–1489CrossRef
23.
Zurück zum Zitat Strasser M, Capkun S, Popper C, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proceedings of IEEE symposium on security and privacy, pp 64–78 Strasser M, Capkun S, Popper C, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proceedings of IEEE symposium on security and privacy, pp 64–78
24.
Zurück zum Zitat Strasser M, Popper C, Capkun S (2009) Efficient uncoordinated FHSS anti-jamming communication. In: Proceedings of MobiHoc ’09 Strasser M, Popper C, Capkun S (2009) Efficient uncoordinated FHSS anti-jamming communication. In: Proceedings of MobiHoc ’09
25.
Zurück zum Zitat Toledo AL, Wang X (2008) Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Trans Inf Forensics Secur 3:347–358CrossRef Toledo AL, Wang X (2008) Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Trans Inf Forensics Secur 3:347–358CrossRef
26.
Zurück zum Zitat Wi-Fi Alliance (2009) WiFi for the smart grid: mature, interoperable, security-protected technology for advanced utility management communications Wi-Fi Alliance (2009) WiFi for the smart grid: mature, interoperable, security-protected technology for advanced utility management communications
27.
Zurück zum Zitat Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc ’05, pp 46–57 Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc ’05, pp 46–57
28.
Zurück zum Zitat Zhou HJ, Guo CX, Qin J (2010) Efficient application of GPRS and CDMA networks in SCADA system. In: Proceedings of IEEE power and energy society general meeting (PES ’10) Zhou HJ, Guo CX, Qin J (2010) Efficient application of GPRS and CDMA networks in SCADA system. In: Proceedings of IEEE power and energy society general meeting (PES ’10)
Metadaten
Titel
Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid
verfasst von
Zhuo Lu
Wenye Wang
Cliff Wang
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-23288-1_2

Premium Partner