-
MISGUIDE: Security-Aware Attack Analytics for Smart Grid Load Frequency Control
Authors:
Nur Imtiazul Haque,
Prabin Mali,
Mohammad Zakaria Haider,
Mohammad Ashiqur Rahman,
Sumit Paudyal
Abstract:
Incorporating advanced information and communication technologies into smart grids (SGs) offers substantial operational benefits while increasing vulnerability to cyber threats like false data injection (FDI) attacks. Current SG attack analysis tools predominantly employ formal methods or adversarial machine learning (ML) techniques with rule-based bad data detectors to analyze the attack space. H…
▽ More
Incorporating advanced information and communication technologies into smart grids (SGs) offers substantial operational benefits while increasing vulnerability to cyber threats like false data injection (FDI) attacks. Current SG attack analysis tools predominantly employ formal methods or adversarial machine learning (ML) techniques with rule-based bad data detectors to analyze the attack space. However, these attack analytics either generate simplistic attack vectors detectable by the ML-based anomaly detection models (ADMs) or fail to identify critical attack vectors from complex controller dynamics in a feasible time. This paper introduces MISGUIDE, a novel defense-aware attack analytics designed to extract verifiable multi-time slot-based FDI attack vectors from complex SG load frequency control dynamics and ADMs, utilizing the Gurobi optimizer. MISGUIDE can identify optimal (maliciously triggering under/over frequency relays in minimal time) and stealthy attack vectors. Using real-world load data, we validate the MISGUIDE-identified attack vectors through real-time hardware-in-the-loop (OPALRT) simulations of the IEEE 39-bus system.
△ Less
Submitted 7 November, 2024;
originally announced November 2024.
-
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Authors:
Waqas Aman,
Zeeshan Haider,
S. Waqas H. Shah,
M. Mahboob Ur Rahman,
Octavia A. Dobre
Abstract:
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the i…
▽ More
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the impersonation attack by Eve, Bob utilizes the distance of the transmit node as the feature/fingerprint to carry out feature-based authentication at the physical layer. Due to authentication at Bob, due to lack of channel knowledge at the transmit node (Alice or Eve), and due to the threshold-based decoding error model, the relevant dynamics of the considered system could be modelled by a Markov chain (MC). Thus, we compute the state-transition probabilities of the MC, and the moment generating function for the service process corresponding to each state. This enables us to derive a closed-form expression of the EC in terms of authentication parameters. Furthermore, we compute the optimal transmission rate (at Alice) through gradient-descent (GD) technique and artificial neural network (ANN) method. Simulation results show that the EC decreases under severe authentication constraints (i.e., more false alarms and more transmissions by Eve). Simulation results also reveal that the (optimal transmission rate) performance of the ANN technique is quite close to that of the GD method.
△ Less
Submitted 12 February, 2020;
originally announced February 2020.
-
Novel Relay Selection Protocol for Cooperative Networks
Authors:
Muhammad Asam,
Zeeshan Haider,
Tauseef Jamal,
Kashif Ghuman,
Aleena Ajaz
Abstract:
Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems. Recently, cooperative networking techniques have been investigated to increase the performance of low-cost wireless systems by using the diversity created by different single antenna devices. However, cooperative networking requires a medium acce…
▽ More
Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems. Recently, cooperative networking techniques have been investigated to increase the performance of low-cost wireless systems by using the diversity created by different single antenna devices. However, cooperative networking requires a medium access control layer able to handle source-relay-destination communications. Wireless cooperative relaying poses several challenges, being the most important one related to the relay selection mechanism, especially in the presence of mobile nodes. This position paper aims to describe our findings towards development of an efficient relay selection algorithm.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
Security Issues in WBANs
Authors:
Muhammad Asam,
Tauseef Jamal,
Aleena Ajaz,
Zeeshan Haider,
Shariq Aziz Butt
Abstract:
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. Being very critical in communication from body it f…
▽ More
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. Being very critical in communication from body it faces a lot of challenges which are to be tackled for the safety of life and benefit of the user. There is variety of challenges faced by WBANs. WBAN is favorite playground for attackers due to its usability in various applications. This article provides systematic overview of main challenges in WBANs in security perspectives.
△ Less
Submitted 7 November, 2019;
originally announced November 2019.
-
DoS Attacks at Cooperative MAC
Authors:
Zeeshan Haider,
Kiramat Ullah,
Tauseef Jamal
Abstract:
Cooperative networking brings performance improvement to most of the issues in wireless networks, such as fading or delay due to slow stations. However, due to cooperation when data is relayed via other nodes, there network is more prone to attacks. Since, channel access is very important for cooperation, most of the attacks happens at MAC. One of the most critical attack is denial of service, whi…
▽ More
Cooperative networking brings performance improvement to most of the issues in wireless networks, such as fading or delay due to slow stations. However, due to cooperation when data is relayed via other nodes, there network is more prone to attacks. Since, channel access is very important for cooperation, most of the attacks happens at MAC. One of the most critical attack is denial of service, which is reason of cooperation failure. Therefore, the cooperative network as well as simple wireless LAN must be defensive against DOS attacks. In this article we analyzed all possible of DoS attacks that can happen at MAC layer of WLAN. The cooperative protocols must consider defense against these attacks. This article also provided survey of available solutions to these attacks. At the end it described its damages and cost as well as how to handle these attacks while devising cooperative MAC.
△ Less
Submitted 30 November, 2018;
originally announced December 2018.
-
Analysis of Interference in Wireless Networks
Authors:
Zeeshan Haider,
Muhammad Saleem,
T. Jamal
Abstract:
As wireless systems grow rapidly worldwide, one of the most important things, wireless systems designers and service providers faces is interference. Interference decreases coverage, capacity [1], and limits the effectiveness of both new and existing systems. It is very difficult to avoid because wireless communications systems must exist together in extremely complex signal environments. These en…
▽ More
As wireless systems grow rapidly worldwide, one of the most important things, wireless systems designers and service providers faces is interference. Interference decreases coverage, capacity [1], and limits the effectiveness of both new and existing systems. It is very difficult to avoid because wireless communications systems must exist together in extremely complex signal environments. These environments are consisting of multiple operating wireless networks [2]. At the same instant, new technologies and signal sources in Wireless Local Area Networks (WLANs) and digital video broadcasting are jeopardized to wireless communications service. This article provides a survey and analysis of interference in Wireless Network and provides a taxonomy.
△ Less
Submitted 31 October, 2018;
originally announced October 2018.
-
Denial of Service Attack in Cooperative Networks
Authors:
Tauseef Jamal,
Zeeshan Haider,
Shariq Aziz Butt,
Assim Chohan
Abstract:
In Denial of Service (DoS) attack the network resources are either delayed or refused to be assigned to the requested user [1]. This may occurs due to verity of reasons, could be intentionally or unintentionally. The unintentional case is quite hard to mitigate. In this paper we will refer the former case in context of cooperative networks. In cooperative networks we relay the data via intermediat…
▽ More
In Denial of Service (DoS) attack the network resources are either delayed or refused to be assigned to the requested user [1]. This may occurs due to verity of reasons, could be intentionally or unintentionally. The unintentional case is quite hard to mitigate. In this paper we will refer the former case in context of cooperative networks. In cooperative networks we relay the data via intermediate nodes called relays. The relay selection is mechanism [2] need to be devised with focus on mitigating such attacks. In this paper we will enhance the relay selection mechanism address by [3] to propose the novel relay selection with emphasis on security of Wireless Local Area Networks.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Maximizing Secrecy Rate of an OFDM-based Multi-hop Underwater Acoustic Sensor Network
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Zeeshan Haider,
Junaid Qadir,
M. Wasim Nawaz,
Guftaar Ahmad Sardar Sidhu
Abstract:
In this paper, we consider an eavesdropping attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA…
▽ More
In this paper, we consider an eavesdropping attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA) channel between a sensor node and the sink node is prone to eavesdropping attack on each hop. Therefore, the problem at hand is to do (helper/relay) node selection (for data forwarding onto the next hop) as well as power allocation (across the OFDM sub-carriers) in a way that the secrecy rate is maximized at each hop. To this end, this problem of Node Selection and Power Allocation (NSPA) is formulated as a mixed binary-integer optimization program, which is then optimally solved via decomposition approach, and by exploiting duality theory along with the Karush-Kuhn-Tucker conditions. We also provide a computationally-efficient, sub-optimal solution to the NSPA problem, where we reformulate it as a mixed-integer linear program and solve it via decomposition and geometric approach. Moreover, when the UWA channel is multipath (and not just line-of-sight), we investigate an additional, machine learning-based approach to solve the NSPA problem. Finally, we compute the computational complexity of all the three proposed schemes (optimal, sub-optimal, and learning-based), and do extensive simulations to compare their performance against each other and against the baseline schemes (which allocate equal power to all the sub-carriers and do depth-based node selection). In a nutshell, this work proposes various (optimal and sub-optimal) methods for providing information-theoretic security at the physical layer of the protocol stack through resource allocation.
△ Less
Submitted 19 July, 2020; v1 submitted 4 July, 2018;
originally announced July 2018.