{"title":"Design of a trust security model for smart meters in an urban power grid network","authors":"Aljawharah Alnasser, N. Rikli","doi":"10.1145/2642687.2642703","DOIUrl":null,"url":null,"abstract":"In this paper, a network of smart meters that are part of the next generation electrical power system is considered, and are assumed to send their readings wirelessly. Cyber-attacks against such network will be addressed. An independent, distributed, and lightweight trust evaluation model is proposed and evaluated. The trust model is implemented at two levels: first at the smart meter level, where nodes collect information on its neighbor nodes and forward it to the collecting node; and second at the collecting node level, where malicious nodes are detected and isolated by requesting from the nodes to stop communicating with them. Simulation results present how fast the network use the collected data from the nodes to detect all malicious nodes.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Q2S and Security for Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2642687.2642703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In this paper, a network of smart meters that are part of the next generation electrical power system is considered, and are assumed to send their readings wirelessly. Cyber-attacks against such network will be addressed. An independent, distributed, and lightweight trust evaluation model is proposed and evaluated. The trust model is implemented at two levels: first at the smart meter level, where nodes collect information on its neighbor nodes and forward it to the collecting node; and second at the collecting node level, where malicious nodes are detected and isolated by requesting from the nodes to stop communicating with them. Simulation results present how fast the network use the collected data from the nodes to detect all malicious nodes.