| Literature DB >> 26307998 |
Xinyu Yang1, Xiaofei He2, Wei Yu3, Jie Lin4, Rui Li5, Qingyu Yang6, Houbing Song7.
Abstract
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes.Entities:
Keywords: code injection attack; smart grid; smart measurement devices; software-based attestation
Year: 2015 PMID: 26307998 PMCID: PMC4570448 DOI: 10.3390/s150820799
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An example of the advanced metering infrastructure (AMI).
Figure 2An example of a wireless mesh network for smart grid communication.
Figure 3The “challenge-response” protocol [11].
Notation.
| The value of node | |
| The probability of node | |
| λ | The number of attacks in a unit of time |
| The number of periods to compute the risk value | |
| The risk value of node | |
| The current period | |
| The number of attestation failure of node | |
| The total number of nodes in the network | |
| The number of hops in a path | |
| The unit of time | |
| The single verification time | |
| β | The scaling factor for an attestation interval |
| The number of verification in a time duration | |
| The maximum end-to-end delay in the network | |
| The average one-hop delay in the network |
Figure 4The process of delay-resilient remote memory attestation [27].
Figure 5The attestation efficiency comparison. (a) Successful attestation; (b) number of attestations; (c) number of undetected attacks.
Figure 6The attestation overhead comparison. (a) Successful attestation; (b) the number of attestations; (c) the number of undetected attacks.
Figure 7The response time vs. the number of hops. (a) Low overhead; (b) high overhead.