当前位置: X-MOL 学术Soft Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A two-step trace model for the detection of UVI attacks against power grids in the wireless network
Soft Computing ( IF 4.1 ) Pub Date : 2021-01-05 , DOI: 10.1007/s00500-020-05520-4
R. B. Benisha , S. Raja Ratna

Due to the extensive development of information transmission in the SCADA power grids, securing the network has become more challenging for guaranteed measurements and transformations. An ultraviolet injection attack (UVI) is infused with malicious data and obstruct in planning the centers that cause a high reduction in the power grids. To overcome this problem, two-step trace model is used that includes both tracing and prevention. In the first step, data from different nodes are used for tracing the UVI attacks. Additionally, the Redundancy measurement unit is employed to enhance the measurement values. In the second step, a Game-theoretic stable algorithm is established to optimize the consumption of resistance nodes. Experimental results are simulated and compared to improve performance efficiency and accuracy.



中文翻译:

两步跟踪模型,用于检测对无线网络中电网的UVI攻击

由于SCADA电网中信息传输的广泛发展,确保测量和转换的网络安全性变得越来越具有挑战性。紫外线注入攻击(UVI)注入了恶意数据,并阻碍了规划中心的工作,从而导致电网大量减少。为了克服此问题,使用了两步跟踪模型,该模型包括跟踪和预防。第一步,将来自不同节点的数据用于跟踪UVI攻击。另外,冗余度测量单元用于增强测量值。第二步,建立了博弈论稳定算法来优化电阻节点的消耗。仿真实验结果并进行比较,以提高性能效率和准确性。

更新日期:2021-01-05
down
wechat
bug