access icon free Defense against unknown broadband jammer for time-critical operation in smart grid

In this work, the authors consider the communication network of a power substation, where multiple intelligent electronic devices (IEDs) transmit their delay sensitive control and monitoring messages to a common receiver over a wireless network; in the presence of a broadband jammer, which is capable of jamming multiple channels simultaneously. The objective of the IEDs is to successfully transmit their messages within a specified time, whereas the jammer wants to obstruct IED's transmission. A novel utility function is designed for the players, that addresses the time-critical nature of communication. Due to the conflicting interest of the IEDs and the jammer, they model the interaction between them as a repeated Bayesian zero-sum game, which also addresses the repeated interaction among the IEDs and the jammer, and the unavailability of exact information about the jammer. The equilibrium strategies for both the scenarios of perfect and imperfect monitoring are derived and verified through simulation results. Further, the performance of the proposed game model in various scenarios is thoroughly compared in the result section. Finally, the efficacy of the proposed defence strategies is tested in a practical communication network of a power substation under jamming, which is simulated in Optimised Network Engineering Tool (OPNET).

Inspec keywords: smart power grids; game theory; Bayes methods; substations; jamming

Other keywords: smart grid; delay sensitive control; practical communication network; monitoring messages; repeated interaction; common receiver; perfect monitoring; unknown broadband jammer; multiple intelligent electronic devices; specified time; imperfect monitoring; time-critical operation; IEDs; Optimised Network Engineering Tool; power substation; wireless network; jamming multiple channels; repeated Bayesian zero-sum game

Subjects: Computer communications; Game theory; Electromagnetic compatibility and interference; Substations; Other topics in statistics; Radio links and equipment

References

    1. 1)
      • 21. El-Bardan, R., Brahma, S., Varshney, P.K.: ‘Strategic power allocation with incomplete information in the presence of a jammer’, IEEE Trans. Commun., 2016, 64, (8), pp. 34673479.
    2. 2)
      • 15. Aziz, F.M., Shamma, J.S., Stüber, G.L.: ‘Jammer-type estimation in LTE with a smart jammer repeated game’, IEEE Trans. Veh. Technol., 2017, 66, (8), pp. 74227431.
    3. 3)
      • 4. Guan, Y., Ge, X.: ‘Distributed secure estimation over wireless sensor networks against random multichannel jamming attacks’, IEEE Access, 2017, 5, pp. 1085810870.
    4. 4)
      • 29. Szepesvari, C., Littman, M.L.: ‘A unified analysis of value-function-based reinforcement-learning algorithms’, Neural Comput., 1999, 11, pp. 20172060.
    5. 5)
      • 14. Lu, Z., Wang, W., Wang, C.: ‘Modeling, evaluation and detection of jamming attacks in time-critical wireless applications’, IEEE Trans. Mob. Comput., 2014, 13, (8), pp. 17461759.
    6. 6)
      • 27. Duff, M.: ‘Optimal learning: Computational procedures for Bayes-adaptive Markov decision processes’. PhD dissertation, University of Massachusetts, 2002.
    7. 7)
      • 30. Koenig, S., Simmons, R.G.: ‘Complexity analysis of real-time reinforcement learning’. Proc. Eleventh National Conf. on AI, Washington, DC, USA, 1993, pp. 99105.
    8. 8)
      • 28. Dearden, R., Friedman, N., Andre, D.: ‘Model based Bayesian exploration’. Proc. Uncertainty in Artificial Intelligence (UAI), Stockholm, Sweden, August 1999, pp. 150159.
    9. 9)
      • 18. Danak, A., Mannor, S.: ‘A robust learning approach to repeated auctions with monitoring and entry fees’, IEEE Trans. Comput. Intell. AI in Games, 2011, 3, (4), pp. 302315.
    10. 10)
      • 1. IEC 61850: ‘IEC Standard for Communication Network and Systems in Substations’, 2003–04, 1st edn..
    11. 11)
      • 25. Choi, M., Choi, J., Park, J., et al: ‘State estimation with delayed measurements considering uncertainty of time delay’. Proc. IEEE Int. Conf. Robotics and Automation, Kobe, 2009, pp. 39873992.
    12. 12)
      • 22. Karupongsiri, C., Munasinghe, K.S., Jamalipour, A.: ‘A novel communication mechanism for smart meter packet transmission on LTE networks’. Proc. IEEE SmartGridComm, Sydney, NSW, 2016, pp. 122127.
    13. 13)
      • 16. Li, L., Langbort, C., Shamma, J.S.: ‘An LP approach for solving two-player zero-sum repeated bayesian games’, 2007, arXiv:1703.01957v2.
    14. 14)
      • 23. Cena, G., Bertolotti, I.C., Valenzano, A., et al: ‘Evaluation of response times in industrial WLANs’, IEEE Trans. Ind. Inf., 2007, 3, (3), pp. 191201.
    15. 15)
      • 19. Parikh, P.P., Sidhu, T.S., Shami, A.: ‘A comprehensive investigation of wireless LAN for IEC 61850-based smart distribution substation applications’, IEEE Trans. Ind. Inf., 2013, 9, (3), pp. 14661476.
    16. 16)
      • 6. Gao, Y., Xiao, Y., Wu, M., et al: ‘Game theory-based anti-jamming strategies for frequency hopping wireless communications’, IEEE Trans. Wirel. Commun., 2018, 17, (8), pp. 53145326.
    17. 17)
      • 17. Han, Z., Zheng, R., Poor, H.V.: ‘Repeated auctions with Bayesian nonparametric learning for spectrum access in cognitive radio networks’, IEEE Trans. Wirel. Commun., 2011, 10, (3), pp. 890900.
    18. 18)
      • 3. Cumanan, K., Xing, H., Xu, P., et al: ‘Physical layer security jamming: theoretical limits and practical designs in wireless networks’, IEEE Access, 2017, 5, pp. 36033611.
    19. 19)
      • 7. Garnaev, A., Liu, Y., Trappe, W.: ‘Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown’, IEEE Trans. Signal Inf. Process. Netw., 2016, 2, (1), pp. 4956.
    20. 20)
      • 24. Sydney, K.M., Du, C., Ngwira, S.M.: ‘The feasibility of a WLAN based power substation monitoring platform’. Proc. Int. Conf. on Advances in Computing and Communication Engineering (ICACCE), Durban, 2016, pp. 8590.
    21. 21)
      • 10. Fang, S., Liu, Y., Ning, P.: ‘Wireless communications under broadband reactive jamming attacks’, IEEE Trans. Depend. Sec. Comput., 2016, 13, (3), pp. 394408.
    22. 22)
      • 12. Wei, S., Kannan, R., Chakravarthy, V., et al: ‘CSI usage over parallel fading channels under jamming attacks: a game theory study’, IEEE Trans. Commun., 2012, 60, (4), pp. 11671175.
    23. 23)
      • 5. Huo, Y., Tian, Y., Ma, L., et al: ‘Jamming strategies for physical layer security’, IEEE Wirel. Commun., 2018, 25, (1), pp. 148153.
    24. 24)
      • 9. Hanawal, M.K., Abdel-Rahman, M.J., Krunz, M.: ‘Joint adaptation of frequency hopping and transmission rate for anti-jamming wireless systems’, IEEE Trans. Mob. Comput., 2016, 15, (9), pp. 22472259.
    25. 25)
      • 20. Ghosh, S., Bhatnagar, M.R., Panigrahi, B.K.: ‘Non-cooperative game based defense against broadband jammer in time-critical wireless applications’. Proc. IEEE SmartGridComm, Sydney, NSW, November 2016, pp. 154159.
    26. 26)
      • 26. Fudenberg, D., Tirole, J.: ‘Game theory’ (MIT Press, Massachusetts, MA, USA, 1991).
    27. 27)
      • 31. Boyd, S., Vandenberghe, L.: ‘Convex optimization’ (Cambridge University Press, New York, NY, USA, 2004).
    28. 28)
      • 11. Liu, Y., Ning, P.: ‘BitTrickle: defending against broadband and high-power reactive jamming attacks’. Proc. IEEE INFOCOM, Orlando, FL, USA, March 2012, pp. 909917.
    29. 29)
      • 8. Chang, G.-Y., Wang, S.-Y., Liu, Y.-X.: ‘A jamming-resistant channel hopping scheme for cognitive radio networks’, IEEE Trans. Wirel. Commun., 2017, 16, (10), pp. 67126725.
    30. 30)
      • 13. Banawan, K., Ulukus, S., Wang, P., et al: ‘Multiband jamming strategies with minimum rate constraints’. Proc. IEEE Wireless Communications and Networking Conf. (WCNC), Doha, 2016, pp. 16.
    31. 31)
      • 2. Bianchi, G.: ‘Performance analysis of the IEEE 802.11 distributed coordination function’, IEEE J. Sel. Areas Commun., 2000, 18, (3), pp. 535547.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2019.0005
Loading

Related content

content/journals/10.1049/iet-com.2019.0005
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading