ABSTRACT:

The use of synchrophasor data for observation and control is expected to enhance the operation and efficiency of the next generation of power systems. However, the specific characteristics of the data generated by synchrophasors makes them particularly vulnerable to cyber attacks. This paper presents a set of strategies to protect the anonymity of synchrophasor data against passive traffic analysis attacks. Considering the periodic nature of synchrophasor data, we propose defense mechanisms based on packet concatenation and random packet drops as a countermeasure against attacks that may use the timing as well as data volume information to compromise the network. In contrast to existing defenses against traffic analysis attacks, our scheme can be easily deployed using the current networking infrastructure as it is based on end-to-end principles and does not require any specialized routers. The proposed defense mechanisms are evaluated using both analysis and simulations.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE :Cost-Optimal Caching for D2D Networks With User Mobility: Modeling, Analysis, and Computational Approaches - 2018ABSTRACT:Caching well-liked files at the user equipments (UEs) provides an efficient way to alleviate
PROJECT TITLE :Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure - 2018ABSTRACT:This Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security
PROJECT TITLE :Stickler: Defending against Malicious Content Distribution Networks in an Unmodified BrowserABSTRACT:Web site publishers will derive enormous performance advantages and price savings by directing traffic to their
PROJECT TITLE :Simulation, Analysis, and Verification of Substrate Currents for Layout Optimization of Smart Power ICsABSTRACT:Today circuit failures in Smart Power ICs because of substrate couplings are partially addressed during
PROJECT TITLE :Modeling, Analysis, and Scheduling of Cluster Tools With Two Independent ArmsABSTRACT:Twin-armed cluster tools for semiconductor manufacturing sometimes have had two arms fixed in opposite directions. Recently,

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry