首页> 外文学位 >Defending against multifaceted attacks in wireless networks and power grid networks.
【24h】

Defending against multifaceted attacks in wireless networks and power grid networks.

机译:防御无线网络和电网网络中的多方面攻击。

获取原文
获取原文并翻译 | 示例

摘要

It is well known that cyber security plays a critical role in ensuring functionality and reliability of increasingly ubiquitous communication systems and critical infrastructures. Compared with the traditional attacks that target individual users, protocols, or components in the complicated systems, the emerging attacks can 1) exploit collaboration among multiple users or network nodes, 2) exploit vulnerabilities in multiple protocols, which can be in different protocol layers, simultaneous and coordinately, and 3) exploit relationship among multiple network components aiming to cause cascading failures, in which the failure of one or several components propagates to other components.;In this dissertation, we investigate attacks that exploit multiple user, multiple protocols, or multiple components, referred to as multifaceted attacks, in networking systems. We focus on studying two systems: the cognitive radio networks and the power grid networks. In particular, this dissertation has four parts.;Secure Collaborative Spectrum Sensing;Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. The basic idea is to allow secondary users to use the spectrum that is allocated to the primary user when the primary user is absent. For example, when a TV transmitter (primary user) is not using the allocated spectrum, some mobile users (secondary users) can use this spectrum to exchange data among themselves such as in the mobile ad hoc networks. Therefore, an important task in cognitive radio networks is to detect whether the primary user exists or not. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection through multiple user collaboration. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their sensing information honestly. However, it is known that wireless devices can be compromised by malicious parties. Compromised nodes can send false sensing information to mislead the system and undermine the collaboration. In this part, we propose defense methods that can detect untrustworthy secondary users in cognitive radio networks. Compared with existing defense methods, the proposed scheme can effectively differentiate malicious nodes and honest nodes. As a result, it can significantly improve the performance of collaborative spectrum sensing. For example, when there are 10 secondary users, with the primary user detection rate equals to 0.99, one malicious user can make the false alarm rate (Pf) increase to 72%. The proposed scheme can reduces it to 5%. Two malicious users can make Pf increase to 85%, the proposed scheme reduces it to 8%.;Cross Layer Attack and Defense in Cognitive Radio Networks;The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries of network layers. In this work, we design cross-layer attack strategies that can largely increase the attackers' power or reducing their risk of being detected. As a case study, we investigate the coordinated report-false-sensing-data attack (PHY layer) and smallback- off-window attack (MAC layer). Furthermore, we propose a trust-based crosslayer defense framework that relies on abnormal detection in individual layers and cross-layer trust fusion. Simulation results demonstrate that the proposed defense framework can significantly reduce the maximum damage caused by attackers.;Modeling of Cascading Failures in Power Systems --- Part I: Foundations, Models, and Assessment Metrics;With the continuous growing energy demand and environmental concerns, it has recently attracted significant attention of academia, industry, and governments in the development of a smart electric power grid to provide affordable, reliable, efficient, and secure supply of electricity. Among many enabling technologies toward such a smart grid, security has been widely identified as one of the key components for such a complex system. In Part I of this two-part series study, we present a comprehensive analysis of the foundations, system models, and assessment metrics for power system cascading failures. The proposed models and metrics carefully consider the relationship among multiple components (e.g. substations) in the power grid systems and how such relationship affects the propagation of failures from one component to other parts of the network. The objective in this part is to understand the limitations of traditional largest-load based attack strategies and provide critical insights to understand the power grid behavior subject to complex attacks.;Modeling of Cascading Failures in Power Systems --- Part II: Attack Strategies and Simulation Analysis;This is the second part of a two-part study addressing topology-based modeling of cascading failures in power systems. Part I presents a comprehensive analysis of the foundations, system models, and assessment metrics to understand this problem. In Part II, we study specific attack strategies and analyze their simulation results based on the Western North American power grid benchmark under two representative topology based models. The goal is to analyze the power grid behavior and find effective attack strategies when the attacker can take down one or multiple nodes. The first model we investigated is the non-recoverable model, in which overloaded nodes fail to operate, and the second network model is recoverable model, in which overloaded nodes are still in function but their performance in power delivery is reduced. In both network models, the proposed attack strategies, which represent novel ways for joint consideration of load and topology, are much more destructive than the traditional load based strategies.
机译:众所周知,网络安全在确保日益普及的通信系统和关键基础设施的功能和可靠性方面起着至关重要的作用。与针对复杂系统中单个用户,协议或组件的传统攻击相比,新出现的攻击可以:1)利用多个用户或网络节点之间的协作; 2)利用多个协议中的漏洞,这些协议可以位于不同的协议层, 3)利用多个网络组件之间的关系来导致级联故障,其中一个或几个组件的故障传播到其他组件。;本文研究利用多个用户,多个协议或网络系统中的多个组件,称为多方面攻击。我们专注于研究两个系统:认知无线电网络和电网网络。尤其是,本文分为四个部分:安全协作频谱感知;认知无线电是解决无线网络中频谱稀缺问题的革命性范式。基本思想是允许次要用户在不存在主要用户时使用分配给主要用户的频谱。例如,当电视发射机(主要用户)未使用分配的频谱时,某些移动用户(次要用户)可以使用此频谱在彼此之间交换数据,例如在移动自组织网络中。因此,认知无线电网络中的一项重要任务是检测主要用户是否存在。在认知无线电网络中,协作频谱感知被认为是通过多用户协作来提高主要用户检测性能的有效方法。对于当前的协作频谱感测方案,通常假定二级用户诚实地报告其感测信息。但是,已知无线设备可能会受到恶意方的破坏。受损的节点可能会发送错误的感知信息,从而误导系统并破坏协作。在这一部分中,我们提出了防御方法,可以检测认知无线电网络中不可信的二级用户。与现有的防御方法相比,该方案可以有效地区分恶意节点和诚实节点。结果,它可以显着提高协作频谱感测的性能。例如,当次要用户有10个时,主要用户的检测率等于0.99,则一个恶意用户可使假警报率(Pf)增加到72%。提出的方案可以将其降低到5%。两个恶意用户可使Pf增加到85%,拟议的方案将其降低到8%。认知无线电网络中的跨层攻击和防御;现有关于认知无线电网络中安全问题的研究主要集中在单个网络中的攻击和防御。层。但是,攻击者不一定将自己限制在网络层的边界内。在这项工作中,我们设计了跨层攻击策略,可以大大提高攻击者的能力或降低其被检测到的风险。作为案例研究,我们研究了协同的报告错误检测数据攻击(PHY层)和小窗口偏离窗口攻击(MAC层)。此外,我们提出了一种基于信任的跨层防御框架,该框架依赖于各个层中的异常检测和跨层信任融合。仿真结果表明,提出的防御框架可以显着减少攻击者造成的最大损失。电力系统级联故障建模---第一部分:基础,模型和评估指标;随着能源需求和环境关注的不断增长,最近,它在开发智能电网以提供可负担,可靠,高效和安全的电力供应方面引起了学术界,工业界和政府的极大关注。在实现此类智能电网的众多支持技术中,安全性已被广泛认为是此类复杂系统的关键组件之一。在这个分为两部分的系列研究的第一部分中,我们对基础,系统模型进行了全面的分析。,以及电源系统级联故障的评估指标。提出的模型和指标仔细考虑了电网系统中多个组件(例如变电站)之间的关系,以及这种关系如何影响故障从一个组件传播到网络其他部分的情况。本部分的目的是了解传统的基于最大负载的攻击策略的局限性,并提供重要的见解,以了解遭受复杂攻击的电网行为。电力系统级联故障建模---第二部分:攻击策略和仿真分析;这是由两部分组成的研究的第二部分,该研究针对电力系统中级联故障的基于拓扑的建模。第一部分介绍了对基础,系统模型和评估指标的全面分析,以了解此问题。在第二部分中,我们研究了特定的攻击策略,并基于两个典型的基于拓扑的模型,基于北美西部电网基准分析了它们的仿真结果。目的是分析电网行为,并在攻击者可以拆除一个或多个节点时找到有效的攻击策略。我们研究的第一个模型是不可恢复的模型,其中过载的节点无法运行,第二个网络模型是可恢复的模型,其中过载的节点仍然起作用,但其供电性能降低。在这两种网络模型中,所提出的攻击策略(代表了共同考虑负载和拓扑的新颖方法)比传统的基于负载的策略更具破坏性。

著录项

  • 作者

    Wang, Wenkai.;

  • 作者单位

    University of Rhode Island.;

  • 授予单位 University of Rhode Island.;
  • 学科 Engineering Computer.;Engineering Electronics and Electrical.;Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 137 p.
  • 总页数 137
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号