skip to main content
10.1145/2459976.2460012acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Using mobile agents and overlay networks to secure electrical networks

Published: 08 January 2013 Publication History

Abstract

The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of an electrical network can affect the agents' ability to monitor the network. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected within the network will on average be inspected less frequently. This results in lower observability into network operations and it also allows issues, either simple faults or adversarial actions, to persist longer in the network before they can be identified and addressed.
This paper discusses creation and use of overlay networks that create a virtual grid graph that can provide faster coverage and a more uniform average agent sampling rate. Using overlays, agents wander a virtual neighborhood consisting of points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results show that using an overlay can often provide better network coverage and a uniform inspection rate, which can improve cyber security by providing a faster detection of threats.

References

[1]
David P. Chassin and Christian Posse. Evaluating north american electric grid reliability using the Barabási Albert network model. Physica A, 355:667--677, 2005.
[2]
Michael B. Crouse, Jacob L. White, Errin W. Fulp, and Glenn A. Fink. Using swarming agents for scalable security in large network environments. In Proceedings of the 54th IEEE International Midwest Symposium on Circuits and Systems, 2011.
[3]
G. Deconinck, W. Labeeuw, S. Vandael, H. Beitollahi, K. De Craemer, Rui Duan, Zhifeng Qui, P. C. Ramaswamy, B. Vande Meerssche, I. Vervenne, and R. Belmans. Communication overlays and agents for dependable smart power grids. In Critical Infrastructure (CRIS), 2010 5th International Conference on, sept. 2010.
[4]
R. Duan and G. Deconinck. Agent coordination for supply and demand match in microgrids with auction mechanism. In Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA), 2008 First International Conference on, pages 1--4, nov. 2008.
[5]
Glenn A. Fink, Kenneth S. Berenhaut, and Christopher S. Oehmen. Directional bias and pheromone for detection and verification on networks. In Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2012.
[6]
Jereme N. Haack, Glenn A. Fink, Wendy M. Maiden, David McKinnon, and Errin W. Fulp. Ant-based cyber defense. In Proceedings of the 8th International Conference on Information Technology New Generations, 2011.
[7]
Olle Häggström and Matematisk Statistik. Finite Markov Chains and Algorithmic Applications. Cambridge University Press, 2001.
[8]
P. Hines, S. Blumsack, E. Cotilla Sanchez, and C. Barrows. The topological and electrical structure of power grids. In 43rd Hawaii International Conference on System Sciences (HICSS), pages 1--10, jan. 2010.
[9]
Sarvapali D. Ramchurn, Perukrishnen Vytelingum, Alex Rogers, and Nick Jennings. Agent-based control for decentralised demand side management in the smart grid. In The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, AAMAS '11, pages 5--12, 2011.
[10]
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A scalable content-addressable network. SIGCOMM Computer Communications Review, 31(4):161--172, August 2001.
[11]
Albert Reka and Barabási. Statistical mechanics of complex networks. Rev. Mod. Phys., 74:47--97, June 2002.
[12]
Duncan J. Watts and Steven H. Strogatz. Collective dynamics of small-world networks. Nature, 393(6684):440--442, June 1998.

Cited By

View all
  • (2014)Effects of network delays on swarming in a multi-agent security systemProceedings of the 1st International Workshop on Agents and CyberSecurity10.1145/2602945.2602955(1-8)Online publication date: 6-May-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. multiagent systems
  2. smart grid

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Effects of network delays on swarming in a multi-agent security systemProceedings of the 1st International Workshop on Agents and CyberSecurity10.1145/2602945.2602955(1-8)Online publication date: 6-May-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media