Assuring Cyber Security in Smart Grid Networks by Fuzzy-logic based Trust Management Model
Smart Grid constitutes a network many lightweight devices. Through this network, the devices can exchange information. Compromisation of these devices can breach the security of the network. In this paper, we have proposed a trust management model based on fuzzy system to address the above-mentioned...
Saved in:
Published in | 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON) pp. 1 - 4 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.11.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Smart Grid constitutes a network many lightweight devices. Through this network, the devices can exchange information. Compromisation of these devices can breach the security of the network. In this paper, we have proposed a trust management model based on fuzzy system to address the above-mentioned issue. we have successfully enhanced security of the smart online grid connected network system and eliminated compromised device. The model has been simulated in Xfuzzy-3.5. Simulation results depict that to be a trustworthy device, each device requires to maintain its trustworthiness behavior above the threshold, otherwise it will be treated as a malicious device. Simulation results show the maximum correctness and it is competent with the objective of this paper. Finally, the simulation results enhance the security in Smart Grid network through Trust management model which is satisfactory proven. |
---|---|
AbstractList | Smart Grid constitutes a network many lightweight devices. Through this network, the devices can exchange information. Compromisation of these devices can breach the security of the network. In this paper, we have proposed a trust management model based on fuzzy system to address the above-mentioned issue. we have successfully enhanced security of the smart online grid connected network system and eliminated compromised device. The model has been simulated in Xfuzzy-3.5. Simulation results depict that to be a trustworthy device, each device requires to maintain its trustworthiness behavior above the threshold, otherwise it will be treated as a malicious device. Simulation results show the maximum correctness and it is competent with the objective of this paper. Finally, the simulation results enhance the security in Smart Grid network through Trust management model which is satisfactory proven. |
Author | Arifeen, Md Murshedul Mahbub, Tasmima Noushiba Reza, S M Salim Remu, Sm Rakibul Hasan Islam, Md. Maynul Hossain, Dilshad Ara |
Author_xml | – sequence: 1 givenname: S M Salim surname: Reza fullname: Reza, S M Salim organization: Bangladesh University of Professionals,Dept. of ICT,Dhaka,Bangladesh – sequence: 2 givenname: Tasmima Noushiba surname: Mahbub fullname: Mahbub, Tasmima Noushiba organization: Bangladesh University of Professionals,Dept. of ICT,Dhaka,Bangladesh – sequence: 3 givenname: Md. Maynul surname: Islam fullname: Islam, Md. Maynul organization: Bangladesh University of Professionals,Dept. of ICT,Dhaka,Bangladesh – sequence: 4 givenname: Md Murshedul surname: Arifeen fullname: Arifeen, Md Murshedul organization: Bangladesh University of Professionals,Dept. of ICT,Dhaka,Bangladesh – sequence: 5 givenname: Sm Rakibul Hasan surname: Remu fullname: Remu, Sm Rakibul Hasan organization: AUST,Dept. of ICT,Dhaka,Bangladesh – sequence: 6 givenname: Dilshad Ara surname: Hossain fullname: Hossain, Dilshad Ara organization: International Islamic Univ Malaysia,Dept. of ICT,Kuala Lumpur,Malaysia |
BookMark | eNotjstqwzAURFVoF22aL8hGP-BUV7YiaWlMkwbSBJp0003Q49qIOnaRbYrz9TWkqzkDh2GeyH3TNkjIAtgSgOmXjzzfFod9pnSql5yBXsIdmWupQHIFQgkuHslX3nVDDE1Fi9FipEd0U-1HGhp6vJjY000Mnu6x_23jd0ftSNfD9TomdVsFR63p0NNTHLqevpvGVHjBZsLWY_1MHkpTdzj_zxn5XL-eirdkd9hsi3yXBADVJ84p6yC1AsErqYWxPPOWlSBKznxppLSIpctWagVSe4aTaicG5NxxUaYzsrjtBkQ8_8Qw3R7PmikpQKV_pDFRQg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/RAAICON48939.2019.1 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781728158525 1728158524 |
EndPage | 4 |
ExternalDocumentID | 9087518 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i118t-cc8bc13b5e1d8795ab24db0f15f20dfa77beefc4686179d0e3b5b8611e22c25f3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:15 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-cc8bc13b5e1d8795ab24db0f15f20dfa77beefc4686179d0e3b5b8611e22c25f3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_9087518 |
PublicationCentury | 2000 |
PublicationDate | 2019-Nov. |
PublicationDateYYYYMMDD | 2019-11-01 |
PublicationDate_xml | – month: 11 year: 2019 text: 2019-Nov. |
PublicationDecade | 2010 |
PublicationTitle | 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON) |
PublicationTitleAbbrev | RAAICON |
PublicationYear | 2019 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7477758 |
Snippet | Smart Grid constitutes a network many lightweight devices. Through this network, the devices can exchange information. Compromisation of these devices can... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Cyber Security Fuzzy Logic Smart Grid Trust Management |
Title | Assuring Cyber Security in Smart Grid Networks by Fuzzy-logic based Trust Management Model |
URI | https://ieeexplore.ieee.org/document/9087518 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61J08qrfgmB49mm8c-j6VYq9AqtoXipeQxC0XdSt09tL_eZHdtUTx4CyGQMBMyk2S-70PoOuVCgy8MiTgo4gvNiKQQkVBI7oexjk3k0MjDUTiY-g-zYNZAN1ssDACUxWfguWb5l2-WunBPZZ3E0a-zeA_txZRXWK2aSIjRpPPc7d73HkeOTcUhUFjisR-SKWXE6B-g4fdcVaHIq1fkytObXzSM_13MIWrvsHn4aRt1jlADshZ6sVYu8Ya4t1awwuNalQ4vMjx-t7sD360WBo-qmu9PrNa4X2w2a1KefNiFMoMnDn6Bd_Uw2OmkvbXRtH876Q1IrZpAFvaykBOtY6WZUAEw45TEpeK-UTRlQcqpSWUUKYBUW0fY5CUxFOxQZdsMONc8SMUxambLDE4QVkmgAzACqKK-trmkdJ82oTJCRtKo8BS1nF3mHxUxxrw2ydnf3edo33mlAvJdoGa-KuDSRvRcXZWu_ALZhKTH |
link.rule.ids | 310,311,786,790,795,796,802,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG0QD3pSA8bf9uDRjrXdzyMhIihMI5AQL2RtvyVEHQa3A_z1ttuUaDx465omW76v6eva772H0FXCuASHK-IzEMThkpLYBp94PGaOF8hA-YaNPIy83sS5m7rTGrr-5sIAQFF8BpZpFnf5aiFzc1TWCo38Og220LbGeTss2VqVlJB-bj212_3OQ2T0VAwHhYYW_WGaUmBGdw8Nv95Wloq8WHkmLLn-JcT438_ZR80NOw8_fuPOAapB2kDPOs4F4xB3VgKWeFT50uF5ikdven7g2-Vc4ais-v7AYoW7-Xq9IsXahw2YKTw2BAy8qYjBxinttYkm3Ztxp0cq3wQy178LGZEyEJJy4QJVxks8FsxRwk6omzBbJbHvC4BE6lTo7UuobNBDhW5TYEwyN-GHqJ4uUjhCWISudEFxsIXtSL2bjM21jScUj_1YCe8YNUxcZu-lNMasCsnJ392XaKc3Hg5mg350f4p2TYZKWt8ZqmfLHM41vmfiokjrJ7emqB0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+IEEE+International+Conference+on+Robotics%2C+Automation%2C+Artificial-intelligence+and+Internet-of-Things+%28RAAICON%29&rft.atitle=Assuring+Cyber+Security+in+Smart+Grid+Networks+by+Fuzzy-logic+based+Trust+Management+Model&rft.au=Reza%2C+S+M+Salim&rft.au=Mahbub%2C+Tasmima+Noushiba&rft.au=Islam%2C+Md.+Maynul&rft.au=Arifeen%2C+Md+Murshedul&rft.date=2019-11-01&rft.pub=IEEE&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FRAAICON48939.2019.1&rft.externalDocID=9087518 |