skip to main content
10.1145/2642687.2642703acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Design of a trust security model for smart meters in an urban power grid network

Published:21 September 2014Publication History

ABSTRACT

In this paper, a network of smart meters that are part of the next generation electrical power system is considered, and are assumed to send their readings wirelessly. Cyber-attacks against such network will be addressed. An independent, distributed, and lightweight trust evaluation model is proposed and evaluated. The trust model is implemented at two levels: first at the smart meter level, where nodes collect information on its neighbor nodes and forward it to the collecting node; and second at the collecting node level, where malicious nodes are detected and isolated by requesting from the nodes to stop communicating with them. Simulation results present how fast the network use the collected data from the nodes to detect all malicious nodes.

References

  1. Y. Zhang, L. Wang and W. Sun, "Trust System Design Optimization in Smart Grid Network Infrastructure", IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 184--195, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Xiang, W. Liu and Q. Bai, "Trust-based Geographical Routing For Smart Grid Communication Networks," IEEE 3rd SmartGridComm, pp. 704--709, 2012.Google ScholarGoogle Scholar
  3. J. Zhang, R. Shankaran, M. Orgun, V. Varadharajan and A. Sattar, "A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks," in IEEE International Conference on Embedded and Ubiquitous Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Bao, I.-R. Chen, M. Chang and J.-H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE Transactions on Network and Service Managment, vol. 9, no. 2, pp. 169--183, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Fadul, K. Hopkinson, C. Sheffield, J. Moore and T. Andel, "Trust Management and Security in the Future Communication-Based 'Smart' Electric Power Grid", 44th International Conference on System Sciences, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. N. Ericsson and A. Torkilseng, "Management of information security for an electric power utility-On security domains and use of ISO/IEC17799 standard," IEEE Trans. Power Del., vol. 20 no. 2, pp. 683--690, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Xiang, Q. Bai and W. Liu, "Self-adjustable Trust-based Energy Efficient Routing for Smart Grid Systems," in IEEE International Conferences on Web Intelligence and Intelligent Agent Technology, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Skopik and Z. Ma, "Attack Vectors to Metering Data in Smart Grids under Security Constraints," in IEEE 36th International Conference on Computer Software and Applications Workshops, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Design of a trust security model for smart meters in an urban power grid network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Q2SWinet '14: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks
        September 2014
        146 pages
        ISBN:9781450330275
        DOI:10.1145/2642687

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 September 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Q2SWinet '14 Paper Acceptance Rate14of30submissions,47%Overall Acceptance Rate46of131submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader