This document discusses robust false data injection attacks in electricity markets by limited adversaries. It proposes a worst-case robust attack strategy for adversaries with only partial network information, modeled as bounded uncertainties. The strategy formulates designing such attacks as a convex semi-definite programming problem to efficiently find attacks that remain undetectable under any potential network configuration within the uncertainty bounds. The strategy is analyzed theoretically and tested on the IEEE 14-bus system to evaluate its robustness against different uncertainty levels.
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...CSCJournals
The proposed approach in this paper selects a fixed Visitor Location Register (VLR) as a Fixed Local Anchor (FLA) for each group of Registration Areas (RAs). During call delivery process, the calling VLR/FLA caches are updated with the called Mobile Terminal’s (MT’s) location information and the called VLR and FLA caches are updated with the calling MT’s location information. Furthermore, the FLA and the old VLR caches are updated with MT’s new location information during inter-RA handoff as a part of informing this to the FLA of that region. But for another case, it updates the new FLA, old FLA, and old VLR caches with new location information together with directly informing this to the HLR. This location caching policy in local anchor strategy maximizes the probability of finding MTs’ location information in caches. As a result, it minimizes the total number of HLR access for finding MT’s location information prior to deliver a call. So, it significantly reduces the total location management cost in terms of location registration cost and call delivery cost. The analytical and experimental results also demonstrate that the proposed method outperforms all other previous methods regardless of the MT’s calling and mobility pattern.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
Distributed throughput maximization in wireless networks using the stability ...Nexgen Technology
The document proposes a game-theoretical framework to design distributed algorithms that control transmission range in wireless networks to maximize throughput. It defines the stability region as the set of input rates under which queues are stable. The goal is to adapt the stability region to end-to-end flows by having flows control node transmission ranges. Based on this, a new algorithm called WiMAX-Mesh-NTC is developed for IEEE 802.16 networks that maximizes throughput while guaranteeing stability. Simulation results show it achieves throughput levels that are at least 90% of optimal in 72% of scenarios.
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...IJECEIAES
In this work, we are interested in implementing, developing and evaluating multi-antenna techniques used for multi-user two-way wireless relay networks that provide a good tradeoff between the computational complexity and performance in terms of symbol error rate and achievable data rate. In particular, a variety of newly multi-antenna techniques is proposed and studied. Some techniques based on orthogonal projection enjoy low computational complexity. However, the performance penalty associated with them is high. Other techniques based on maximum likelihood strategy enjoy high performance, however, they suffer from very high computational complexity. The Other techniques based on randomization strategy provide a good trade-off between the computational complexity and performance where they enjoy low computational complexity with almost the same performance as compared to the techniques based on maximum likelihood strategy.
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...CSCJournals
The proposed approach in this paper selects a fixed Visitor Location Register (VLR) as a Fixed Local Anchor (FLA) for each group of Registration Areas (RAs). During call delivery process, the calling VLR/FLA caches are updated with the called Mobile Terminal’s (MT’s) location information and the called VLR and FLA caches are updated with the calling MT’s location information. Furthermore, the FLA and the old VLR caches are updated with MT’s new location information during inter-RA handoff as a part of informing this to the FLA of that region. But for another case, it updates the new FLA, old FLA, and old VLR caches with new location information together with directly informing this to the HLR. This location caching policy in local anchor strategy maximizes the probability of finding MTs’ location information in caches. As a result, it minimizes the total number of HLR access for finding MT’s location information prior to deliver a call. So, it significantly reduces the total location management cost in terms of location registration cost and call delivery cost. The analytical and experimental results also demonstrate that the proposed method outperforms all other previous methods regardless of the MT’s calling and mobility pattern.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
Distributed throughput maximization in wireless networks using the stability ...Nexgen Technology
The document proposes a game-theoretical framework to design distributed algorithms that control transmission range in wireless networks to maximize throughput. It defines the stability region as the set of input rates under which queues are stable. The goal is to adapt the stability region to end-to-end flows by having flows control node transmission ranges. Based on this, a new algorithm called WiMAX-Mesh-NTC is developed for IEEE 802.16 networks that maximizes throughput while guaranteeing stability. Simulation results show it achieves throughput levels that are at least 90% of optimal in 72% of scenarios.
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...IJECEIAES
In this work, we are interested in implementing, developing and evaluating multi-antenna techniques used for multi-user two-way wireless relay networks that provide a good tradeoff between the computational complexity and performance in terms of symbol error rate and achievable data rate. In particular, a variety of newly multi-antenna techniques is proposed and studied. Some techniques based on orthogonal projection enjoy low computational complexity. However, the performance penalty associated with them is high. Other techniques based on maximum likelihood strategy enjoy high performance, however, they suffer from very high computational complexity. The Other techniques based on randomization strategy provide a good trade-off between the computational complexity and performance where they enjoy low computational complexity with almost the same performance as compared to the techniques based on maximum likelihood strategy.
23 9754 assessment paper id 0023 (ed l)2IAESIJEECS
This paper presents a risk assessment method for assessing the cyber security of power systems in view of the role of protection systems. This paper examines the collision of transmission and bus line protection systems positioned in substations on the cyber-physical performance of the power systems. The projected method simulates the physical feedback of power systems to hateful attacks on protection system settings and parameters. The relationship between protection device settings, protection logic, and circuit breaker logic is analyzed. The expected load reduction (ELC) indicator is used in this paper to determine potential losses in the system due to cyber attacks. The Monte Carlo simulation is used to calculate ELC’s account to assess the capabilities of the attackers and bus arrangements are changed. The influence of the projected risk assessment method is illustrated by the use of the 9-bus system and the IEEE-68 bus system.
This document proposes and evaluates a stealthy false data injection attack on electricity markets. The attack aims to change electricity prices without detection by exploiting correlations between line measurements using independent component analysis. Simulations show the attack can infer linear measurement structures without network knowledge and inject undetectable false data to influence prices. This reveals potential smart grid vulnerabilities that require strengthened security.
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...ijwmn
Recently, the applications scope of Wireless Sensor Networks (WSNs) has been broadened. WSN communication security is important because sensor nodes are vulnerable to various security attacks when deployed in an open environment. An adversary could exploit this vulnerability to inject false reports into the network. En-route filtering techniques have been researched to block false reports. The CFFS scheme
filters the false report by collaboratively validating the report by clustering the nodes. However, CFFS is not considered effective against repetitive attacks. Repeated attacks have a significant impact on network lifetime. In this paper, we propose a method to detect repetitive attacks with cluster-based false data
filtering and to identify the compromised nodes and quickly block them. The proposed scheme uses fuzzy logic to determine the distribution of additional keys according to the network conditions, thereby improving energy efficiency.
This document presents a study on a proposed distributed attack detection algorithm using experimental and simulation analysis. The key points are:
1) The algorithm detects distributed denial of service attacks in wireless sensor networks using detector nodes that monitor traffic and reconstruct patterns to identify attacks.
2) Performance is affected by algorithmic parameters like time epoch length and number of detector nodes, and network parameters like node density and energy.
3) Simulation experiments quantify the attack detection rate, false positive/negative rates, and node energy utilization under variations in these parameters.
Packet hiding methods for preventing selectiveveenasraj
This document discusses selective jamming attacks in wireless networks. It describes how an adversary with internal knowledge of network protocols and secrets can classify packets in real-time based on the first few symbols and then selectively jam important packets. This allows the adversary to launch effective denial-of-service attacks with low effort. The document then proposes and analyzes three schemes to prevent real-time packet classification and mitigate these selective jamming attacks while minimizing overhead.
A security method for multiple attacks in sensor networks against false repor...ieijjournal
This document describes a proposed security method to detect multiple attacks in wireless sensor networks. The method aims to improve energy efficiency while maintaining security when both a probabilistic voting-based filtering scheme (PVFS) and a localized encryption and authentication protocol (LEAP) are applied simultaneously. The proposed method uses four new types of keys and eliminates redundant functions of applying PVFS and LEAP together, in order to reduce energy consumption without lowering detection capabilities against false report injection, false vote injection, and wormhole attacks. Experimental results showed the proposed method can save up to 11% more energy compared to simply applying PVFS and LEAP concurrently under multiple attack scenarios.
SINR Analysis and Interference Management of Macrocell Cellular Networks in D...umere15
This document analyzes signal-to-interference-plus-noise ratio (SINR) and interference management in 5G macrocell cellular networks operating at 30 GHz in dense urban environments. It first investigates appropriate interference models for predicting outage events. It then creates a network simulation with 19 sites based on real geospatial data from NIT Srinagar, with each site having multiple cells. SINR maps are generated and compared for single antennas versus antenna arrays. The interference ball model is used to simplify interference calculation by only considering nearby interferers. Configuration parameters from ITU-R reports are used to simulate the network according to dense urban specifications.
Mitigating Interference to GPS Operation Using Variable Forgetting Factor Bas...IJCNCJournal
In this paper, an interference method based on signal processing is proposed. The approach is based on
utilizing the maximum likelihood properties of the received signal. The approach is built on maximizing the
probability of the desired data. The GPS data, which is constructed using Binary Phase Shift Keying
(BPSK) modulation, is transmitted as “1’s” and as “0’s.” carried on 1575.42MHz carrier called the L1
frequency. The statistics of the GPS data and interference are utilized in terms of their distribution and
variance. The statistics are used to update (adaptively) the forgetting factor (Lambda) of the Recursive
Least Squares (RLS) filter. The proposed method is called Maximum Likelihood Variable Forgetting Factor
(ML VFF). The adaptive update takes on assigning lambda to the maximum of the probabilities of the
symbols based on the statistics mentioned.
Performance Analysis of the Distance Relay Characteristics in a Compensated T...MohammadMomani26
The present work investigates the effect of the FACTS devices on distance relay operation. FACTS devices have different power system performance, stability, and load ability advantages. This paper presents FACTS technologies' effect on the distance protective relay using the measured impedance between the fault location and the relaying point. Different factors and parameters are changed to see their impacts on the studied system. It is shown that the measured impedance is affected by the presence of the FACTS devices depending on their type (series, parallel, and hybrid), fault location, and the operation point of the FACTS device. The analyses present that the shunt FACTS devices' effect may cause overreach problems to the relay; however, series FACTS devices may cause underreach problems in distance characteristics. MATLAB 2019b does the simulation test; the simulation results prove the mathematical analysis. The numerical analysis in this paper may be used for researchers in fault analysis and protection coordinators.
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
This document discusses using game theory techniques to safeguard the automatic generation control (AGC) in smart grids from false data injection attacks. It first provides background on AGC and how false data can affect its performance and potentially cause blackouts. It then discusses using a game theory model to represent the interactions between attackers injecting false data and defenders protecting the system. The risks of different attack events are calculated and fed into the game model. Dynamic programming is used to determine optimal defense strategies based on resource constraints. Simulation results show the approach can minimize risks to the AGC under different attack scenarios.
This document proposes a crowdsourcing-based scheme called CrowdLoc to localize wireless jammers. CrowdLoc has three phases: 1) Sensor nodes at the boundary of the jammed region record received signal strength measurements from the jammer and share them. 2) These boundary nodes cooperate to share the measurements. 3) Based on the crowdsourced measurements, CrowdLoc estimates the jammer's position using a novel Range-based Jammer Localization technique that is independent of propagation parameters. Experimental results show CrowdLoc localization accuracy is close to the theoretical Cramer-Rao Bound for most areas.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
This document presents a method for joint congestion control and scheduling in wireless networks using sliding mode control. It formulates the problem using network utility maximization to maximize total utility while satisfying capacity constraints. Dual decomposition is used to separate the problem into congestion control and scheduling subproblems. A sliding mode controller is designed for congestion control based on queue length feedback. The scheduling problem depends on Lagrangian prices from the congestion control problem. Simulation results show improved packet delivery ratio, throughput, and performance under varying signal-to-noise ratios. The method jointly optimizes congestion control and scheduling using a sliding mode approach.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
Performance Analysis of Massive MIMO Downlink System with Imperfect Channel S...IJRES Journal
We investigate the ergodic sum rate and required transmit power of a single-cell massive
multiple-input multiple-output (MIMO) downlink system. The system considered in this paper is based on two
linear beamforming schemes, that is, maximum ratio transmission (MRT) beamforming and zero-forcing (ZF)
beamforming. What’s more, we use minimum mean square error (MMSE) channel estimation to get imperfect
channel state information (CSI). Compared with the perfect CSI case, both theoretical analysis and simulation
results show that the system performance is different when the imperfect CSI is taken into account.
This document proposes a low-complexity linear precoding scheme called LSQR-based precoding for massive MIMO systems. It aims to reduce the complexity of conventional zero-forcing precoding, which requires computationally expensive matrix inversion. The proposed method uses an iterative LSQR algorithm based on QR decomposition to compute the precoding matrix without direct matrix inversion. Simulation results show it can achieve near-optimal performance of zero-forcing precoding with lower complexity.
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
This document discusses selective jamming attacks in wireless networks and methods to prevent them. It begins by introducing the open nature of wireless networks leaves them vulnerable to jamming attacks. It then discusses different types of jamming attacks and notes that selective jamming, which targets specific important packets, is more effective than continuous jamming. The document proposes using cryptographic techniques like commitment schemes and puzzles combined with physical layer parameters to prevent real-time packet classification and selective jamming. It reviews related work on jamming attacks and defenses. Finally, it outlines the problem statement, system model, and the contribution of using symmetric encryption and resisting brute force block encryption attacks to reduce jamming through packet hiding.
This document proposes a new metric called "-stealthiness" to characterize the resilience of stochastic cyber-physical systems to attacks. The metric quantifies how difficult it is to detect an attack while allowing some degradation of control performance.
The document considers a system with process and measurement noise regulated by a Kalman filter. An attacker can hijack the control input to maximize estimation error while remaining undetected. -Stealthiness means no detector can achieve both high detection probability and an exponentially fast decreasing false alarm rate.
The main results provide bounds on the largest estimation error an "-stealthy" attacker can induce, and characterize an optimal "-stealthy" attack strategy. These results quantify the fundamental tradeoff between control performance
ICI and PAPR enhancement in MIMO-OFDM system using RNS codingIJECEIAES
The Inter-Carrier-Interference (ICI) is considered a bottleneck in the utilization of Multiple-Input-Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, due to the sensitivity of the OFDM towards frequency offsets which lead to loss of orthogonality, interference and performance degradation. In this paper Residue Numbers as a coding scheme is impeded in MIMO-OFDM systems, where the ICI levels is measured and evaluated with respect to conventional ICI mitigation techniques implemented in MIMO-OFDM. The Carrier-to-Interference Ratio (CIR), the system Bit-Error-Rate (BER) and the Complementary Cumulative Distribution Function (CCDF) for MIMO-OFDM system with Residue Number System (RNS) coding are analyzed and evaluated. The results had demonstrated a performance of transmission model with and without RNS.
A PROPOSAL ANALYTICAL MODEL AND SIMULATION OF THE ATTACKS IN ROUTING PROTOCOL...GiselleginaGloria
This document proposes analytical models and simulations to study attacks and node mobility in mobile ad hoc networks (MANETs). It presents mathematical models to simulate blackhole, blackmail, bandwidth saturation, and overflow attacks based on malicious nodes and hop count. A model is also proposed to simulate node mobility using a graphical theory approach. The document describes implementing the models in C code to simulate the effects of attacks on transmission time under varying conditions like fraction of malicious nodes and number of hops. The results show that transmission time for successful transmissions decreases with increasing malicious nodes or hops. The document concludes the models can evaluate performance and the proposed mobility metric accounts for link state changes.
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node
mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical
theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole
cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the
number of hops. We conducted a simulation of the attacks with a C implementation of the proposed
mathematical models.
energy disaggregation with sparse coding MenghengXue
The document discusses energy disaggregation, which is the task of taking a whole-home energy signal and separating it into its component appliances. It describes using sparse coding techniques like non-negative sparse coding and discriminative disaggregation to find basis functions and activation coefficients to model each appliance's energy usage and disaggregate a new whole-home signal without providing the individual appliance signals. The goal is to estimate the activation coefficients to separate out the energy used by each appliance.
Energy Disaggregation with Discriminative Sparse CodingMenghengXue
The document discusses energy disaggregation, which is the task of taking a whole-home energy signal and separating it into its component appliances. It describes using sparse coding techniques like non-negative sparse coding and discriminative disaggregation to find basis functions and activation coefficients to model each appliance's energy usage and disaggregate a new whole-home signal without providing the individual appliance signals. The goal is to estimate the activation coefficients to separate out the energy used by each appliance.
23 9754 assessment paper id 0023 (ed l)2IAESIJEECS
This paper presents a risk assessment method for assessing the cyber security of power systems in view of the role of protection systems. This paper examines the collision of transmission and bus line protection systems positioned in substations on the cyber-physical performance of the power systems. The projected method simulates the physical feedback of power systems to hateful attacks on protection system settings and parameters. The relationship between protection device settings, protection logic, and circuit breaker logic is analyzed. The expected load reduction (ELC) indicator is used in this paper to determine potential losses in the system due to cyber attacks. The Monte Carlo simulation is used to calculate ELC’s account to assess the capabilities of the attackers and bus arrangements are changed. The influence of the projected risk assessment method is illustrated by the use of the 9-bus system and the IEEE-68 bus system.
This document proposes and evaluates a stealthy false data injection attack on electricity markets. The attack aims to change electricity prices without detection by exploiting correlations between line measurements using independent component analysis. Simulations show the attack can infer linear measurement structures without network knowledge and inject undetectable false data to influence prices. This reveals potential smart grid vulnerabilities that require strengthened security.
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...ijwmn
Recently, the applications scope of Wireless Sensor Networks (WSNs) has been broadened. WSN communication security is important because sensor nodes are vulnerable to various security attacks when deployed in an open environment. An adversary could exploit this vulnerability to inject false reports into the network. En-route filtering techniques have been researched to block false reports. The CFFS scheme
filters the false report by collaboratively validating the report by clustering the nodes. However, CFFS is not considered effective against repetitive attacks. Repeated attacks have a significant impact on network lifetime. In this paper, we propose a method to detect repetitive attacks with cluster-based false data
filtering and to identify the compromised nodes and quickly block them. The proposed scheme uses fuzzy logic to determine the distribution of additional keys according to the network conditions, thereby improving energy efficiency.
This document presents a study on a proposed distributed attack detection algorithm using experimental and simulation analysis. The key points are:
1) The algorithm detects distributed denial of service attacks in wireless sensor networks using detector nodes that monitor traffic and reconstruct patterns to identify attacks.
2) Performance is affected by algorithmic parameters like time epoch length and number of detector nodes, and network parameters like node density and energy.
3) Simulation experiments quantify the attack detection rate, false positive/negative rates, and node energy utilization under variations in these parameters.
Packet hiding methods for preventing selectiveveenasraj
This document discusses selective jamming attacks in wireless networks. It describes how an adversary with internal knowledge of network protocols and secrets can classify packets in real-time based on the first few symbols and then selectively jam important packets. This allows the adversary to launch effective denial-of-service attacks with low effort. The document then proposes and analyzes three schemes to prevent real-time packet classification and mitigate these selective jamming attacks while minimizing overhead.
A security method for multiple attacks in sensor networks against false repor...ieijjournal
This document describes a proposed security method to detect multiple attacks in wireless sensor networks. The method aims to improve energy efficiency while maintaining security when both a probabilistic voting-based filtering scheme (PVFS) and a localized encryption and authentication protocol (LEAP) are applied simultaneously. The proposed method uses four new types of keys and eliminates redundant functions of applying PVFS and LEAP together, in order to reduce energy consumption without lowering detection capabilities against false report injection, false vote injection, and wormhole attacks. Experimental results showed the proposed method can save up to 11% more energy compared to simply applying PVFS and LEAP concurrently under multiple attack scenarios.
SINR Analysis and Interference Management of Macrocell Cellular Networks in D...umere15
This document analyzes signal-to-interference-plus-noise ratio (SINR) and interference management in 5G macrocell cellular networks operating at 30 GHz in dense urban environments. It first investigates appropriate interference models for predicting outage events. It then creates a network simulation with 19 sites based on real geospatial data from NIT Srinagar, with each site having multiple cells. SINR maps are generated and compared for single antennas versus antenna arrays. The interference ball model is used to simplify interference calculation by only considering nearby interferers. Configuration parameters from ITU-R reports are used to simulate the network according to dense urban specifications.
Mitigating Interference to GPS Operation Using Variable Forgetting Factor Bas...IJCNCJournal
In this paper, an interference method based on signal processing is proposed. The approach is based on
utilizing the maximum likelihood properties of the received signal. The approach is built on maximizing the
probability of the desired data. The GPS data, which is constructed using Binary Phase Shift Keying
(BPSK) modulation, is transmitted as “1’s” and as “0’s.” carried on 1575.42MHz carrier called the L1
frequency. The statistics of the GPS data and interference are utilized in terms of their distribution and
variance. The statistics are used to update (adaptively) the forgetting factor (Lambda) of the Recursive
Least Squares (RLS) filter. The proposed method is called Maximum Likelihood Variable Forgetting Factor
(ML VFF). The adaptive update takes on assigning lambda to the maximum of the probabilities of the
symbols based on the statistics mentioned.
Performance Analysis of the Distance Relay Characteristics in a Compensated T...MohammadMomani26
The present work investigates the effect of the FACTS devices on distance relay operation. FACTS devices have different power system performance, stability, and load ability advantages. This paper presents FACTS technologies' effect on the distance protective relay using the measured impedance between the fault location and the relaying point. Different factors and parameters are changed to see their impacts on the studied system. It is shown that the measured impedance is affected by the presence of the FACTS devices depending on their type (series, parallel, and hybrid), fault location, and the operation point of the FACTS device. The analyses present that the shunt FACTS devices' effect may cause overreach problems to the relay; however, series FACTS devices may cause underreach problems in distance characteristics. MATLAB 2019b does the simulation test; the simulation results prove the mathematical analysis. The numerical analysis in this paper may be used for researchers in fault analysis and protection coordinators.
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
This document discusses using game theory techniques to safeguard the automatic generation control (AGC) in smart grids from false data injection attacks. It first provides background on AGC and how false data can affect its performance and potentially cause blackouts. It then discusses using a game theory model to represent the interactions between attackers injecting false data and defenders protecting the system. The risks of different attack events are calculated and fed into the game model. Dynamic programming is used to determine optimal defense strategies based on resource constraints. Simulation results show the approach can minimize risks to the AGC under different attack scenarios.
This document proposes a crowdsourcing-based scheme called CrowdLoc to localize wireless jammers. CrowdLoc has three phases: 1) Sensor nodes at the boundary of the jammed region record received signal strength measurements from the jammer and share them. 2) These boundary nodes cooperate to share the measurements. 3) Based on the crowdsourced measurements, CrowdLoc estimates the jammer's position using a novel Range-based Jammer Localization technique that is independent of propagation parameters. Experimental results show CrowdLoc localization accuracy is close to the theoretical Cramer-Rao Bound for most areas.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
This document presents a method for joint congestion control and scheduling in wireless networks using sliding mode control. It formulates the problem using network utility maximization to maximize total utility while satisfying capacity constraints. Dual decomposition is used to separate the problem into congestion control and scheduling subproblems. A sliding mode controller is designed for congestion control based on queue length feedback. The scheduling problem depends on Lagrangian prices from the congestion control problem. Simulation results show improved packet delivery ratio, throughput, and performance under varying signal-to-noise ratios. The method jointly optimizes congestion control and scheduling using a sliding mode approach.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
Performance Analysis of Massive MIMO Downlink System with Imperfect Channel S...IJRES Journal
We investigate the ergodic sum rate and required transmit power of a single-cell massive
multiple-input multiple-output (MIMO) downlink system. The system considered in this paper is based on two
linear beamforming schemes, that is, maximum ratio transmission (MRT) beamforming and zero-forcing (ZF)
beamforming. What’s more, we use minimum mean square error (MMSE) channel estimation to get imperfect
channel state information (CSI). Compared with the perfect CSI case, both theoretical analysis and simulation
results show that the system performance is different when the imperfect CSI is taken into account.
This document proposes a low-complexity linear precoding scheme called LSQR-based precoding for massive MIMO systems. It aims to reduce the complexity of conventional zero-forcing precoding, which requires computationally expensive matrix inversion. The proposed method uses an iterative LSQR algorithm based on QR decomposition to compute the precoding matrix without direct matrix inversion. Simulation results show it can achieve near-optimal performance of zero-forcing precoding with lower complexity.
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
This document discusses selective jamming attacks in wireless networks and methods to prevent them. It begins by introducing the open nature of wireless networks leaves them vulnerable to jamming attacks. It then discusses different types of jamming attacks and notes that selective jamming, which targets specific important packets, is more effective than continuous jamming. The document proposes using cryptographic techniques like commitment schemes and puzzles combined with physical layer parameters to prevent real-time packet classification and selective jamming. It reviews related work on jamming attacks and defenses. Finally, it outlines the problem statement, system model, and the contribution of using symmetric encryption and resisting brute force block encryption attacks to reduce jamming through packet hiding.
This document proposes a new metric called "-stealthiness" to characterize the resilience of stochastic cyber-physical systems to attacks. The metric quantifies how difficult it is to detect an attack while allowing some degradation of control performance.
The document considers a system with process and measurement noise regulated by a Kalman filter. An attacker can hijack the control input to maximize estimation error while remaining undetected. -Stealthiness means no detector can achieve both high detection probability and an exponentially fast decreasing false alarm rate.
The main results provide bounds on the largest estimation error an "-stealthy" attacker can induce, and characterize an optimal "-stealthy" attack strategy. These results quantify the fundamental tradeoff between control performance
ICI and PAPR enhancement in MIMO-OFDM system using RNS codingIJECEIAES
The Inter-Carrier-Interference (ICI) is considered a bottleneck in the utilization of Multiple-Input-Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, due to the sensitivity of the OFDM towards frequency offsets which lead to loss of orthogonality, interference and performance degradation. In this paper Residue Numbers as a coding scheme is impeded in MIMO-OFDM systems, where the ICI levels is measured and evaluated with respect to conventional ICI mitigation techniques implemented in MIMO-OFDM. The Carrier-to-Interference Ratio (CIR), the system Bit-Error-Rate (BER) and the Complementary Cumulative Distribution Function (CCDF) for MIMO-OFDM system with Residue Number System (RNS) coding are analyzed and evaluated. The results had demonstrated a performance of transmission model with and without RNS.
A PROPOSAL ANALYTICAL MODEL AND SIMULATION OF THE ATTACKS IN ROUTING PROTOCOL...GiselleginaGloria
This document proposes analytical models and simulations to study attacks and node mobility in mobile ad hoc networks (MANETs). It presents mathematical models to simulate blackhole, blackmail, bandwidth saturation, and overflow attacks based on malicious nodes and hop count. A model is also proposed to simulate node mobility using a graphical theory approach. The document describes implementing the models in C code to simulate the effects of attacks on transmission time under varying conditions like fraction of malicious nodes and number of hops. The results show that transmission time for successful transmissions decreases with increasing malicious nodes or hops. The document concludes the models can evaluate performance and the proposed mobility metric accounts for link state changes.
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node
mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical
theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole
cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the
number of hops. We conducted a simulation of the attacks with a C implementation of the proposed
mathematical models.
energy disaggregation with sparse coding MenghengXue
The document discusses energy disaggregation, which is the task of taking a whole-home energy signal and separating it into its component appliances. It describes using sparse coding techniques like non-negative sparse coding and discriminative disaggregation to find basis functions and activation coefficients to model each appliance's energy usage and disaggregate a new whole-home signal without providing the individual appliance signals. The goal is to estimate the activation coefficients to separate out the energy used by each appliance.
Energy Disaggregation with Discriminative Sparse CodingMenghengXue
The document discusses energy disaggregation, which is the task of taking a whole-home energy signal and separating it into its component appliances. It describes using sparse coding techniques like non-negative sparse coding and discriminative disaggregation to find basis functions and activation coefficients to model each appliance's energy usage and disaggregate a new whole-home signal without providing the individual appliance signals. The goal is to estimate the activation coefficients to separate out the energy used by each appliance.
The document discusses NICTA's work developing portable motion analysis technologies using inertial measurement units (IMUs). It summarizes several applications including monitoring arm movements in stroke patients, detecting gait events in Parkinson's disease patients, measuring sway in epilepsy patients, and assessing surgeons' proficiency. For each application, it describes the customer problem, NICTA's technical approach using IMUs, results compared to existing technologies, and benefits of NICTA's solution such as low-cost portable monitoring of patients in their natural environments.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
2. where N = J + M. Based on the DC power flow model, the
linearized line flow vector is given by
f = Hx, (2)
where H ∈ RL×N
is the distribution factor matrix [7]. The system
contains K = L + J + M sensors to measure load, generation, and
line flows, which can be represented by a linearized measurement
vector z ∈ RK×1
such that
z = Hsx + w , (3)
where we have defined Hs = [IN HT
]T
, and w ∈ RK×1
represents an additive noise column vector whose elements are
independent Gaussian random variables with zero means, i.e., w ∼
N(0, Σ), where Σ is a diagonal matrix with the kth
diagonal element
to be σ2
k. Then the weighted least square (WLS) estimator of the
linearized state estimate vector is given by
ˆx = Kz , (4)
where K = (HH
s Σ−1
Hs)−1
HH
s Σ−1
. Finally, we denote the
measurement residue used for bad data detection [19] as
r = z − Hs ˆx
(4)
=(I − HsK)z . (5)
B. Attack Model
An adversary aims to launch an FDIA by compromising a set of
measurement sensors and tampering with their recording data. Hence,
the corrupted measurement data received by the SO can be stated as
z = z + za, (6)
where za is the injected attack vector. Under such an attack, the
compromised state estimates ˆx based on the attacked measurement
data z can be expressed as
ˆx
(4)
= Kz = ˆx + Kza. (7)
Accordingly, the residue value used for bad data detection becomes
r
(5)
= r + ra , (8)
where ra = (I−Q)za, in which we have defined Q = HsK. Based
on this, if the attacker can inject attack vectors resulting in small
ra, the detector cannot distinguish between r and r. Therefore, we
define the ε-feasible attack such that the ∞-norm of ra is controlled
below the desired threshold ε, i.e.,
ra ∞ = max{r1, r2, . . . , rK } ≤ ε . (9)
Accordingly, the individual residue test corresponding to the state
parameter k ∈ {1, . . . .K} can be cast as
ek(I − Q)za 2 ≤ ε, ∀k ∈ {1, . . . , K} , (10)
where ek ∈ R1×K
is the standard unit vector with 1 in the kth
column. This constraint can be interpreted as attacker’s undetectable
condition and such condition strongly hinges on the attacker’s perfect
and instantaneous knowledge of network dynamics Q. In reality,
however, network information is too extensive to be completely
accessible by an attacker. In this paper, we assume that the attacker
has limited access to only a noisy version of Q, i.e.,
Q = ˜Q + ∆Q (11)
where ˜Q is the actual network dynamic matrix and ∆Q denotes
the attacker’s uncertainties about network dynamics and we assume
such uncertainties are bounded and confined within an origin-centered
hyper-spherical region of radius β, i.e.,
∆Q 2 ≤ β . (12)
Hence, from the attacker’s perspective, the network dynamic infor-
mation belongs to the set
A(β) = {Q | Q = ˜Q + ∆Q, ∆Q 2 ≤ β} . (13)
Due to the uncertainty associated with Q, the undetectability of
injected attack vector za also faces uncertainties. If the attacker
constructs an attack vector such that for all realizations of Q it
remains undetectable by the BDDs, it immediately ensures a worst-
case guarantee. Motivated by this, the ε-robust attack is defined as
follows.
Definition 1: An attack vector za is called ε-robust if it satisfies
ek(I − Q)za 2 ≤ ε, ∀Q ∈ A(β), ∀k ∈ {1, . . . , K} , (14)
which is equivalent to
sup
Q∈A(β)
ek(I − Q)za 2 ≤ ε, ∀k ∈ {1, . . . , K} . (15)
C. Electricity Markets
The deregulated electricity market consists of DA and RT markets.
A DC optimal power flow (DCOPF) model is adopted by the SOs to
determine the LMPs in both markets [7].
1) Day-Ahead Market: In the DA market, the SOs perform opti-
mal dispatch calculations to minimize the aggregate cost given the
dispatchable load forecast . Accordingly, the optimal dispatch p∗
is
the solution to the following problem:
minimize
p
1M · C(p)
subject to 1M · p = 1J ·
pmin
m ≤ pm ≤ pmax
m , ∀m ∈ {1, . . . , M}
fmin
l ≤ fl ≤ fmax
l , ∀l ∈ {1, . . . , L}
, (16)
where C(p) = [C1(p1), . . . , CM (pM )]T
is the cost vector associated
with each generator m, and 1M ∈ R1×M
denotes a row vector of all
ones, pmin
m and pmax
m are lower and upper bounds on power available
from each generator m, respectively, and similarly, fmin
l and fmax
l
are lower and upper bounds on transmission flow allowable on each
line l, respectively.
2) Real-Time Market: In the RT market, due to variations in
actual load or generation, the SOs update dispatch p∗
via performing
incremental dispatch calculation to achieve real-time optimal system
operation [20]. By categorizing the positive congestion set as
Ω+ = {l ∈ {1, . . . , L} | ˆfl ≥ fmax
l } , (17)
the negative congestion set as
Ω− = {l ∈ {1, . . . , L} | ˆfl ≤ fmin
l } , (18)
and the non-congestion set as
Ω0 = {l ∈ {1, . . . , L} | fmin
l < ˆfl < fmax
l } , (19)
1371
3. the optimal dispatch can be found as the solution to the following
incremental linear programming problem [3]:
minimize
∆p
1M · C(ˆp + ∆p)
subject to 1M · ∆p = 0
∆pmin
m ≤ ∆pm ≤ ∆pmax
m , ∀m ∈ {1, . . . , M}
∆fl ≤ 0, ∀l ∈ Ω+
∆fl ≥ 0, ∀l ∈ Ω−
,
(20)
where ∆p = [∆p1, . . . , ∆pM ]T
denotes the vector of change in
power of each generator m, in which ∆pm is lower and upper
bounded by ∆pmin
m and ∆pmax
m , respectively. Similarly, ∆fl rep-
resents the change in transmission flow on each line l. Also, ˆp
denotes the vector of estimated power generation by each generator
m. Finally, following the discussions in [7], by defining λref as the
LMP of a reference bus, we denote the LMP corresponding to each
load bus j by
λj = λref + HT
j · α, ∀j ∈ {1, . . . , J} , (21)
where Hj represents the jth
column of H and we have defined α =
[α1, . . . , αL]T
, such that αl denotes the shadow price on line l, and
its value depends on the congestion condition of the corresponding
line given by
αl ≥ 0, if l ∈ Ω+
αl ≤ 0, if l ∈ Ω−
αl = 0, if l ∈ Ω0
. (22)
Based on (21), the LMP difference between two load buses j1 and
j2 is given by
λj1 − λj2 = (Hj1 − Hj2 )T
· α . (23)
D. Profit Model
In this subsection, we assume the attacker is an independent entity
who can participate in virtual bidding in the electricity market and
has access the following categories of information:
1) Partial information about the network dynamics with bounded
uncertainties as formalized earlier.
2) States of optimal power generations p∗
, expected loads ∗
, and
the optimal power flows f∗
reported by the SOs in the DA
market.
The attacker in interested in maximizing its probability of making
profitable bids, which can be achieved by injecting an attack vector
za to manipulate measurements sent to the SOs, and misleading the
calculation of a set of LMPs to shift towards the desired direction.
Specifically, the attacker buys and sells equal amounts of energy P at
load locations j1 and j2 with nodal prices λDA
j1
and λDA
j2
, respectively.
After injecting the attack vector za, the attacker sells and buys the
same amounts of energy P at nodal prices λRT
j1
and λRT
j2
on load
buses j1 and j2 in the RT market, respectively. Hence, by defining
the sets
L+ = {l ∈ {1, · · · , L} : Hl,j1 > Hl,j2 } , (24)
L− = {l ∈ {1, · · · , L} : Hl,j1 < Hl,j2 } , (25)
and based on (23), the attacker’s profit can be expressed by
g(z ) = (λRT
j1
− λRT
j2
+ λDA
j2
− λDA
j1
) · P
=
l∈L+
(Hl,j1 − Hl,j2 ) · αl
Network Dynamic Uncertainty Ratio ξ
0 0.05 0.1 0.15 0.2
ProfitConfidenceδ(MWh)
0
2
4
6
8
10
12
14
16
Attack with 1 line congested
Attack with 2 lines congested
Attack with 3 lines congested
Fig. 1: Profit confidence δ versus network dynamic uncertainty ratio
ξ in IEEE 14-bus system.
+
l∈L−
(Hl,j2 − Hl,j1 ) · αl + λDA
j2
− λDA
j1
· P . (26)
As shown in [7], the following conditions suffice to ensure that profit
g(z ) is positive:
1) λDA
j2
− λDA
j1
≥ 0 ;
2) ∀l ∈ L+ we have ˆfl > fmin
l , i.e., l /∈ Ω− ; and
3) ∀l ∈ L− we have ˆfl < fmax
l , i.e., l /∈ Ω+,
(27)
where ˆfl denotes the compromised line flow estimate. The first
condition can be easily satisfied in the DA market. For the last
two conditions, from the attacker’s perspective, ˆfl on each line is
a random variable with mean
E[ ˆfl ] = f∗
l + elHKza , (28)
where f∗
l is the DA optimal power flow on each line l.
Proposition 1: Matrices H and Hs defined in (2) and (3),
respectively, are related according to
H = [0L×N IL]Hs. (29)
Based on this proposition and by recalling Q = HsK, (28) can be
expressed as
E[ ˆfl ] = f∗
l + el[0 I]HsKza
= f∗
l + el[0 I]Qza . (30)
Hence, the attacker aims to inject za to ensure the last two
profitable conditions to hold with high likelihood. Motivated by this,
we define δ-profitable attacks as follows.
Definition 2: An attack za is δ-profitable if ∀Q ∈ A(β), the
following two conditions are satisfied.
f∗
l + el[0 I]Qza ≤ fmax
l − δ, ∀ l ∈ L−
f∗
l + el[0 I]Qza ≥ fmin
l + δ, ∀ l ∈ L+
, (31)
which in turn can be equivalently cast as
sup
Q∈A(β)
{el[0 I]Qza} ≤ fmax
l − δ − f∗
l , ∀l ∈ L−
inf
Q∈A(β)
{el[0 I]Qza} ≥ fmin
l + δ − f∗
l , ∀l ∈ L+
. (32)
where δ is an introduced parameter to represent the attacker’s profit
confidence [7], and increasing δ will guarantee the last two conditions
in (27) to be satisfied with higher probability.
1372
4. Location (Bus Number)
0 2 4 6 8 10 12 14
NodalPrice($/MWh)
34
35
36
37
38
39
40
41
42
Attack with full information (ξ = 0)
No attack (za = 0)
λRT
2
=λRT
4
λRT
4
λRT
2
virtual selling at Bus 2
virtual buying at Bus 4
(a) Attack with full information.
Location (Bus Number)
0 2 4 6 8 10 12 14
NodalPrice($/MWh)
34
35
36
37
38
39
40
41
42
Attack with uncertainty ξ = 0.05
No attack (za = 0)
λRT
4
λRT
2
λRT
2
λRT
4
virtual buying at Bus 4
virtual selling at Bus 2
(b) Attack with uncertainty ratio ξ = 0.05.
Fig. 2: Real-time LMPs at each bus under attack with full information and with certain network dynamic uncertainty ratio ξ = 0.05 (one
line congested) in the IEEE 14-bus system.
III. ROBUST ATTACK FORMULATION AND SOLUTION
Based on the notations and definitions provided in Section II, the
attacker’s strategy is to find an ε-robust attack vector za such that
its profit confidence δ is maximized:
max
za∈S
δ
s.t. ek(I − Q)za 2 ≤ ε, ∀Q ∈ A(β), ∀k ∈ {1, . . . , K}
f∗
l + el[0 I]Qza ≤ fmax
l − δ, ∀Q ∈ A(β), ∀l ∈ L−
f∗
l + el[0 I]Qza ≥ fmin
l + δ, ∀Q ∈ A(β), ∀l ∈ L+
δ > 0
,
(33)
where S represents the attack vector space. Since there exists an
infinite number of Q ∈ A(β), there is an infinite number of nonlinear
and non-convex constraints in (33). Hence, (33) is a semi-infinite non-
convex quadratic program, which is NP-hard in general and, thus
intractable. In the next section, we will show that due to the special
structure of constraints, the problem (33) can be simplified to an
equivalent convex semi-definite programming (SDP) problem and can
be solved efficiently in polynomial time.
IV. WORST-CASE ROBUST ATTACK FORMULATION AND
SOLUTION
In this section, through solving (33) we develop a robust optimal
approach for limited adversaries with bounded network dynamic
uncertainties. For this purpose, we show that (33) can be equivalently
cast as a convex SDP problem. Specifically, we show that (15) can
be converted to proper linear matrix inequality (LMI) constraints by
the following theorem.
Theorem 1: The ε-robust constraints
ek(I − Q)za 2 ≤ ε, ∀Q ∈ A(β), ∀k ∈ {1, . . . , K} : (34)
can be can be satisfied if and only if there exists a γ ≥ 0 such that
for ∀k ∈ {1, . . . , K}
T k =
ε2
zT
a (I − ˜Q)T
eT
k −βzT
a
ek(I − ˜Q)za 1 − γ 0
−βza 0 γI
0 , (35)
i.e., T k is semi-positive definite.
Next we show that the δ-profitable constraints in (32) can be
expressed as equivalent convex quadratic constraints as formalized
in the following theorem.
Theorem 2: The δ-profitable constraints in (32) can be equivalently
stated as
β za 2 + ˜qlza ≤ −δ − f∗
l + fmax
l , ∀l ∈ L−
β za 2 − ˜qlza ≤ −δ + f∗
l − fmin
l , ∀l ∈ L+
, (36)
where we have defined
˜ql = el[0 I] ˜Q . (37)
As a result, theorems 1 and 2 conclude that problem (33) can be
equivalently cast an SDP problem as follows.
maximize
za∈S,γ≥0
δ
subject to T k 0, ∀k ∈ {1, . . . , K}
β za 2 + ˜qlza ≤ −δ − f∗
l + fmax
l , ∀l ∈ L−
β za 2 − ˜qlza ≤ −δ + f∗
l − fmin
l , ∀l ∈ L+
δ > 0
,
(38)
which can be solved efficiently.
V. SIMULATIONS
In this section, we provide simulation results in the standard IEEE
14-bus system to evaluate the impact of attack vectors injected by
limited adversaries on electricity market operations. In all simulation
settings, the ε-robust threshold is set to be 0.5, and we define
ξ = β/ Q 2 to denote the attacker’s network dynamic uncertainty
ratio. All the simulations are conducted using Matlab-based software
packages including MATPOWER [21] and convex programming
solver CVX [22].
A. Varying Degree of Uncertainties
In this subsection, we aim to investigate the connection between
the attacker’s profit confidence δ and its uncertainty ratio ξ. Fig. 1
illustrates the variations of profit confidence along with the increasing
uncertainty ratio in the IEEE 14-bus system. It is observed that
with perfect information (ξ = 0), the attacker’s profit confidence is
maximized. With the expanding uncertainty ratio, its profit confidence
declines monotonically and becomes 0MWh when its uncertainty
researches a certain level. The underlying reason is that the injected
attack vector za is limited by the ε-robust constraints (15). With the
continuous increase of β (or equivalently ξ), the room for injecting
attack vector, and subsequently, the attacker’s ability to manipulate
the state estimates, shrinks rapidly, and beyond a certain uncertainty
1373
5. level, the attacker cannot inject effective attack vectors to affect LMPs
in the RT Market.
Fig. 1 also demonstrates that when more transmission lines are
congested, under the same increasing rate of the uncertainty ratio the
attacker’s profit confidence decreases faster. The underlying cause
is that the injected attack vector za is also constrained by the δ-
profitable constraints (32). With more lines congested, a stricter
requirement is enforced on the attackers to inject false data to relieve
a larger system congestion pattern, which accordingly, lowers the
attacker’s capability to make profit.
B. Locational Marginal Prices
In this case study, the objective is to evaluate the impact of attacks
under model uncertainty on the LMP shift in the RT market. In
the DA market, it is assumed that there exists one congested line
(connecting buses 2 and 4). We provide figures 2(a) and 2(b) to
show the LMP shifts in the RT market by the attacker with complete
and partial network dynamic information, i.e., ξ = 0 and ξ = 0.05,
respectively. Based on such LMP shifts, the attack strategies under
two cases are also provided in both figures. In the DA market, the
attacker chooses to buy and sell the same amount of virtual energy at
buses 2 and 4, respectively. After injecting false data za and in the
RT market, the attacker decides to sell and buy the same amount of
virtual energy at the corresponding buses, respectively. Based on (26),
the attacker’s virtual bidding profit g(z ) with partial information
(ξ = 0.05) is about 3.53/MWh and it is smaller than the profit with
full information (ξ = 0), which is approximately $7.07/MWh.
VI. CONCLUSION
In this paper, we have studied the impact of false data injection
attacks by limited adversaries with partial information about network
dynamics. Specifically, we assume that the attackers have uncertain-
ties about the parameters characterizing the network. Such uncertain-
ties are assumed to be confined within known hyper-spherical regions.
We have proposed a worst-case robust approach to develop attack
strategies that ensure worst-case guarantees for profitable attacks. We
have shown that designing such worst-case robust attack strategies
can be posed as solving a semi-definite programming problem, which
could by solved efficiently. Simulation results have been provided in
the standard IEEE 14-bus system to assess the effects of attacker’s
network dynamic uncertainty on its profit in the electricity markets.
REFERENCES
[1] S. Hunt, Making competition work in electricity. John Wiley
and Sons, 2002, vol. 146.
[2] A. J. Wood and B. F. Wollenberg, Power generation, operation,
and control. John Wiley and Sons, 2012.
[3] A. Ott, “Experience with PJM market operation, system design,
and implementation,” IEEE Transactions on Power Systems,
vol. 18, no. 2, pp. 528–534, May 2003.
[4] M. Negrete-Pincetic, F. Yoshida, and G. Gross, “Towards quan-
tifying the impacts of cyber attacks in the competitive electricity
market environment,” in Proc. IEEE PowerTech Conference,
Bucharest, Romania, Jun. 2009, pp. 1–8.
[5] F. Pasqualetti, F. Dorfler, and F. Bullo, “Cyber-physical attacks
in power networks: Models, fundamental limitations and moni-
tor design,” in Proc. IEEE Conference on Decision and Control,
Orlando, FL, Dec. 2011, pp. 2195–2201.
[6] S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, and A. Tajer,
“Coordinated data-injection attack and detection in the smart
grid: A detailed look at enriching detection solutions,” IEEE
Signal Processing Magazine, vol. 29, no. 5, pp. 106–115, Sep.
2012.
[7] L. Xie, Y. Mo, and B. Sinopoli, “Integrity data attacks in power
market operations,” IEEE Transactions on Smart Grid, vol. 2,
no. 4, pp. 659–666, Dec. 2011.
[8] L. Jia, R. Thomas, and L. Tong, “Malicious data attack on real-
time electricity market,” in Proc IEEE International Conference
on Acoustics, Speech and Signal Processing, Prague, May 2011,
pp. 5952–5955.
[9] X. Lei, D. x. Yu, and X. l. Bai, “Research on multistep electricity
price model with bidirectional regulation for large consumers,”
in Proc. International Conference on Electrical and Control
Engineering, Jun. 2010, pp. 4114–4117.
[10] J. Lin, W. Yu, and X. Yang, “On false data injection attack
against multistep electricity price in electricity market in smart
grid,” in Proc. IEEE Global Communications Conference, Dec.
2013, pp. 760–765.
[11] D.-H. Choi and L. Xie, “Ramp-induced data attacks on look-
ahead dispatch in real-time power markets,” IEEE Transactions
on Smart Grid, vol. 4, no. 3, pp. 1235–1243, Sep. 2013.
[12] L. Jia, R. Thomas, and L. Tong, “Impacts of malicious data
on real-time price of electricity market operations,” in Proc.
Hawaii International Conference on System Science, Maui, HI,
Jan. 2012, pp. 1907–1914.
[13] M. Esmalifalak, G. Shi, Z. Han, and L. Song, “Bad data
injection attack and defense in electricity market using game
theory study,” IEEE Transactions on Smart Grid, vol. 4, no. 1,
pp. 160–169, Mar. 2013.
[14] L. Jia, R. Thomas, and L. Tong, “On the nonlinearity effects on
malicious data attack on power system,” in Proc. IEEE Power
and Energy Society General Meeting, San Diego, CA, Jul. 2012,
pp. 1–8.
[15] A. Tajer, S. Kar, H. V. Poor, and S. Cui, “Distributed joint cyber
attack detection and state recovery in smart grids,” in Proc.
IEEE International Conference on Smart Grid Communications,
Brussels, Belgium, Oct. 2011, pp. 202–207.
[16] A. Anwar, A. N. Mahmood, and M. Pickering, “Data-driven
stealthy injection attacks on smart grid with incomplete mea-
surements,” in Proc. Pacific-Asia Workshop on Intelligence and
Security Informatics, Mar. 2016, pp. 180–192.
[17] M. R. Garey and D. S. Johnson, Computers and Intractability:
A Guide to the Theory of NP-Completeness. New York, NY:
W. H. Freeman and Co., 1979.
[18] Y. Nesterov and A. Nemirovskii, Interior-Point Polynomial
Algorithms in Convex Programming. Philadelphia, PA: Society
for Industrial and Applied Mathematics, 1994.
[19] Y. Liu, P. Ning, and M. K. Reiter, “False data injection at-
tacks against state estimation in electric power grids,” in Proc.
ACM Conference on Computer and Communications Security,
Chicago, IL, Nov. 2009, pp. 21–32.
[20] F. Li, Y. Wei, and S. Adhikari, “Improving an unjustified
common practice in ex post lmp calculation: An expanded
version,” in Proc. IEEE Power and Energy Society General
Meeting, Minneapolis, MN, July 2010, pp. 1–4.
[21] R. D. Zimmerman, C. E. Murillo-Sanchez, and R. J. Thomas,
“Matpower: Steady-state operations, planning, and analysis
tools for power systems research and education,” IEEE Trans-
actions on Power Systems, vol. 26, no. 1, pp. 12–19, Feb. 2011.
[22] M. Grant and S. Boyd, “CVX: Matlab software for disciplined
convex programming, version 2.1,” http://cvxr.com/cvx, Mar.
2014.
1374