Secure and reliable surveillance over cognitive radio sensor networks in smart grid

نویسندگان

  • Uthpala Subodhani Premarathne
  • Ibrahim Khalil
  • Mohammed Atiquzzaman
چکیده

In view of recent attacks on smart grid surveillance is of vital importance to enforce surveillance based disaster recovery management operations to ensure seamless energy generation anddistribution. The reliability of disaster recoverymanagement depends on availability and privacy preservation of surveillance data. In this paperwe propose a reliable privacy preserving smart grid surveillance architecture over cognitive radio sensor networks. Cognitive radio sensor networks are capable of facilitating reliable communications through opportunistic spectrum sensing capabilities as opposed to fixed radio terminal networks based surveillance architectures. The main privacy preserving feature is a novel energy aware physical unclonable function (PUF) based cryptographic key generation method. The proposed solution determines the encryption key length depending on the remaining energy reserve to facilitate data transmission over an expected period of time with minimum channel interferences. Based on the experimental evaluation, the PUF pattern matching based key generation is viable for 32 bits pattern length over a cognitive radio sensor with optimum power utilization and with a probability of reproducibility of a bit pattern (i− p) = 0. We have also performed experiments to validate the reliability model using real-world data. In conclusion, our proposed cognitive radio sensor based solution provide more pragmatic insights in reliability assurances for surveillance in smart grid. © 2015 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid

The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected ...

متن کامل

Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants

The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

A Survey on MAC Protocols for Wireless Sensor Networks and Cognitive Radio Sensor networks Design

1. Introduction Wireless Sensor Networks (WSNs) has been a wide research topic for more than a decade. Typically, a WSN consists of spatially distributed autonomous sensors to monitor physical or environmental conditions. These sensors generate report over the network on the occurrence of any event. For a WSN to provide better reliability and improved lifetime, an efficient Medium Access Contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Pervasive and Mobile Computing

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2015