Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids

Brycent Chatfield, Rami J. Haddad, Lei Chen

Research output: Contribution to book or proceedingConference articlepeer-review

13 Scopus citations

Abstract

Transformation of the traditional power grid into a smart grid hosts an array of vulnerabilities associated with communication networks. Furthermore, wireless mediums used throughout the smart grid promote an environment where Denial of Service (DoS) attacks are very effective. In wireless mediums, jamming is the typical DoS attack technique employed to diminish system operations thus affecting smart grid stability. In this study, an intrusion detection system (IDS) is proposed to detect jamming attacks in the smart grid. This IDS algorithm analyzes received signal strength indicator (RSSI) and packet loss rate (PLR) of 802.11 network traffic in smart grid communication systems to detect jamming attacks. Experimental results corroborate theoretical analysis.

Original languageEnglish
Title of host publication2018 International Conference on Computing, Networking and Communications, ICNC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages367-371
Number of pages5
ISBN (Electronic)9781538636527
DOIs
StatePublished - Jun 19 2018
Event2018 International Conference on Computing, Networking and Communications, ICNC 2018 - Maui, United States
Duration: Mar 5 2018Mar 8 2018

Publication series

Name2018 International Conference on Computing, Networking and Communications, ICNC 2018

Conference

Conference2018 International Conference on Computing, Networking and Communications, ICNC 2018
Country/TerritoryUnited States
CityMaui
Period03/5/1803/8/18

Scopus Subject Areas

  • Computer Science Applications
  • Hardware and Architecture
  • Computer Networks and Communications

Keywords

  • Intrusion Detection System
  • Jamming
  • Smart grid

Fingerprint

Dive into the research topics of 'Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids'. Together they form a unique fingerprint.

Cite this