A Distributed Hierarchy Framework for Enhancing Cyber Security of Control Center Applications.

作者: Gurunath Gurrala , Rajesh Sundaresan , Himanshu Tyagi , Ashish Joglekar , Kuraganti Chetan Kumar

DOI:

关键词: Protocol (object-oriented programming)Computer scienceDistributed Computing EnvironmentGridTrust management (information system)Distributed computing

摘要: Recent cyber-attacks on power grids highlight the necessity to protect critical functionalities of a control center vital for safe operation grid. Even in distributed framework one central acts as coordinator majority architectures. Such can become prime target cyber well physical attacks, and, hence, single point failure lead complete loss visibility If which runs functions computing environment be randomly chosen between available centers secure framework, ability attacker causing reduced great extent. To achieve this, novel hierarchy based is proposed this paper. The ensures that data aggregation and are carried out at random location, incorporates security features such attestation trust management detect compromised agents. A theoretical result proved evolution convergence values protocol. It also shown system nominally robust so long number nodes strictly less than one-half minus 1. For demonstration, Kalman filter-based state estimation using phasor measurements used function secured. framework's implementation feasibility tested hardware cluster Parallella boards. validated simulations IEEE 118 bus system.

参考文章(36)
Shai Halevi, Silvio Micali, Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing international cryptology conference. pp. 201- 215 ,(1996) , 10.1007/3-540-68697-5_16
Ittai Abraham, Danny Dolev, Joseph Y. Halpern, Distributed Protocols for Leader Election: A Game-Theoretic Perspective international symposium on distributed computing. pp. 61- 75 ,(2013) , 10.1007/978-3-642-41527-2_5
Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth, New Results for Timing-Based Attestation ieee symposium on security and privacy. pp. 239- 253 ,(2012) , 10.1109/SP.2012.45
Gary L. Peterson, An O(nlog n) Unidirectional Algorithm for the Circular Extrema Problem ACM Transactions on Programming Languages and Systems. ,vol. 4, pp. 758- 762 ,(1982) , 10.1145/69622.357194
Saurabh Ganeriwal, Laura K. Balzano, Mani B. Srivastava, Reputation-based framework for high integrity sensor networks ACM Transactions on Sensor Networks. ,vol. 4, pp. 15- ,(2008) , 10.1145/1362542.1362546
Jonathan Katz, Chiu-Yuen Koo, On expected constant-round protocols for Byzantine agreement Journal of Computer and System Sciences. ,vol. 75, pp. 91- 112 ,(2009) , 10.1016/J.JCSS.2008.08.001
Hamed Tebianian, Benjamin Jeyasurya, Dynamic state estimation in power systems using Kalman filters electrical power and energy conference. pp. 1- 5 ,(2013) , 10.1109/EPEC.2013.6802979