2013 |
Liu, S; Chen, B; Kundur, D; Zourntos, T; Butler-Purry, K L Progressive Switching Attacks for Instigating Cascading Failures in Smart Grid Inproceedings Proc. IEEE Power & Energy Society General Meeting, pp. 1-5, Vancouver, Canada, 2013. Links | BibTeX | Tags: CPS, smart grid @inproceedings{LiuCheKunZouButPESGM13, title = {Progressive Switching Attacks for Instigating Cascading Failures in Smart Grid}, author = {S Liu and B Chen and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuCheKunZouButPESGM13.pdf http://dx.doi.org/10.1109/PESMG.2013.6672314}, year = {2013}, date = {2013-07-22}, booktitle = {Proc. IEEE Power & Energy Society General Meeting}, pages = {1-5}, address = {Vancouver, Canada}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Wei, J; Kundur, D A Multi-Flock Approach to Rapid Dynamic Generator Coherency Identification Inproceedings Proc. IEEE Power & Energy Society General Meeting, pp. 1-5, Vancouver, Canada, 2013. Links | BibTeX | Tags: CPS, smart grid @inproceedings{WeiKunPESGM13, title = {A Multi-Flock Approach to Rapid Dynamic Generator Coherency Identification}, author = {J Wei and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/WeiKunPESGM13.pdf http://dx.doi.org/10.1109/PESMG.2013.6672614}, year = {2013}, date = {2013-07-22}, booktitle = {Proc. IEEE Power & Energy Society General Meeting}, pages = {1-5}, address = {Vancouver, Canada}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Jainsky, Julien; Kundur, Deepa Towards Preventative Steganalysis in Wireless Visual Sensor Networks Journal Article International Journal on Multimedia Technology, 2 (3), pp. 55-61, 2013. Links | BibTeX | Tags: forensics, mmsn @article{JaiKunIJMT12, title = {Towards Preventative Steganalysis in Wireless Visual Sensor Networks}, author = {Julien Jainsky and Deepa Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/JaiKunIJMT13.pdf http://www.ijmt.org/PaperInfo.aspx?ID=3647}, year = {2013}, date = {2013-06-01}, journal = {International Journal on Multimedia Technology}, volume = {2}, number = {3}, pages = {55-61}, keywords = {forensics, mmsn}, pubstate = {published}, tppubtype = {article} } |
Liu, Shan Coordinated Variable Structure Switching Attacks for Smart Grid PhD Thesis Texas A&M University, 2013. Abstract | BibTeX | Tags: CPS, PhD thesis, smart grid, thesis @phdthesis{LiuPhDThesis13, title = {Coordinated Variable Structure Switching Attacks for Smart Grid}, author = {Shan Liu}, year = {2013}, date = {2013-05-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through controlled switching sequence. Such switching is facilitated by cyber attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to eectively model the cyber-physical aspects of a smart grid, determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the dierent power system test cases including the single machine innite bus power system model and theWestern Electricity Coordinating Council (WECC) 3-machine, 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system framework. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of coordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances.}, keywords = {CPS, PhD thesis, smart grid, thesis}, pubstate = {published}, tppubtype = {phdthesis} } The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through controlled switching sequence. Such switching is facilitated by cyber attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to eectively model the cyber-physical aspects of a smart grid, determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the dierent power system test cases including the single machine innite bus power system model and theWestern Electricity Coordinating Council (WECC) 3-machine, 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system framework. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of coordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances. |
2012 |
Wei, J; Kundur, D A Flocking-Based Model for DoS-Resilient Communication Routing in Smart Grid Inproceedings Proc. IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, 2012. Links | BibTeX | Tags: smart grid @inproceedings{WeiKunGLOBECOM12, title = {A Flocking-Based Model for DoS-Resilient Communication Routing in Smart Grid}, author = {J Wei and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/WeiKunGLOBECOM12.pdf http://dx.doi.org/10.1109/GLOCOM.2012.6503660}, year = {2012}, date = {2012-12-03}, booktitle = {Proc. IEEE Global Communications Conference (GLOBECOM)}, address = {Anaheim, CA}, keywords = {smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Jainsky, Julien Sebastien Defenses Against Covert-Communications in Multimedia and Sensor Networks PhD Thesis Texas A&M University, 2012. Abstract | BibTeX | Tags: forensics, mmsn, PhD thesis, thesis @phdthesis{JaiPhDThesis12, title = {Defenses Against Covert-Communications in Multimedia and Sensor Networks}, author = {Julien Sebastien Jainsky}, year = {2012}, date = {2012-12-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the thesis looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This thesis also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption.}, keywords = {forensics, mmsn, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the thesis looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This thesis also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption. |
Wei, J; Kundur, D; Zourntos, T; Butler-Purry, K L Probing the Telltale Physics: Towards a Cyber-Physical Protocol to Mitigate Information Corruption in Smart Grid Systems Inproceedings Proc. IEEE International Conferenceon Smart Grid Communications (SmartGridComm), Tainan City, Taiwan, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{WeiKunZouButSGC12, title = {Probing the Telltale Physics: Towards a Cyber-Physical Protocol to Mitigate Information Corruption in Smart Grid Systems}, author = {J Wei and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/WeiKunZouButSGC12.pdf http://dx.doi.org/10.1109/SmartGridComm.2012.6486012}, year = {2012}, date = {2012-11-05}, booktitle = {Proc. IEEE International Conferenceon Smart Grid Communications (SmartGridComm)}, address = {Tainan City, Taiwan}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Liu, S; Kundur, D; Zourntos, T; Butler-Purry, K L Coordinated Variable Structure Switching Attack in the Presence of Model Error and State Estimation Inproceedings Proc. IEEE International Conferenceon Smart Grid Communications (SmartGridComm), Tainan City, Taiwan, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{LiuKunZouButSGC12, title = {Coordinated Variable Structure Switching Attack in the Presence of Model Error and State Estimation}, author = {S Liu and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuKunZouButSGC12.pdf http://dx.doi.org/10.1109/SmartGridComm.2012.6486003}, year = {2012}, date = {2012-11-05}, booktitle = {Proc. IEEE International Conferenceon Smart Grid Communications (SmartGridComm)}, address = {Tainan City, Taiwan}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Wei, J; Kundur, D; Zourntos, T; Butler-Purry, K L A Flocking-Based Dynamical Systems Paradigm for Smart Power System Analysis Inproceedings Proc. IEEE Power & Energy Society General Meeting, pp. 1-8, San Diego, California, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{WeiKunZouButPES12, title = {A Flocking-Based Dynamical Systems Paradigm for Smart Power System Analysis}, author = {J Wei and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/WeiKunZouButPESGM12.pdf http://dx.doi.org/10.1109/PESGM.2012.6344594}, year = {2012}, date = {2012-07-22}, booktitle = {Proc. IEEE Power & Energy Society General Meeting}, pages = {1-8}, address = {San Diego, California}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Wei, J; Kundur, D Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Inproceedings Proc. IEEE Power & Energy Society General Meeting, pp. 1-5, San Diego, California, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{WeiKunPES12, title = {Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid}, author = {J Wei and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/WeiKunPESGM12.pdf http://dx.doi.org/10.1109/PESGM.2012.6345633}, year = {2012}, date = {2012-07-22}, booktitle = {Proc. IEEE Power & Energy Society General Meeting}, pages = {1-5}, address = {San Diego, California}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Liu, S; Mashayekh, S; Kundur, D; Zourntos, T; Butler-Purry, K L A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks Inproceedings Proc. IEEE Power & Energy Society General Meeting, San Diego, California, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{LiuMasKunZouButPES12, title = {A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks}, author = {S Liu and S Mashayekh and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuMasKunZouButPESGM12.pdf http://dx.doi.org/10.1109/PESGM.2012.6344617}, year = {2012}, date = {2012-07-01}, booktitle = {Proc. IEEE Power & Energy Society General Meeting}, address = {San Diego, California}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Mashayekh, S; Feng, X; Liu, S; Butler-Purry, K L; Zourntos, T "Cyber Attack Impact Analysis for the Smart Grid," in Smart Grid Communications and Networking Book Chapter Poor, V; Han, Z; Hossain, E (Ed.): pp. 353-372, Cambridge University Press, 2012, ISBN: 9781107014138. Links | BibTeX | Tags: CPS, smart grid @inbook{KunMasFenLiuButZouChap12, title = {"Cyber Attack Impact Analysis for the Smart Grid," in Smart Grid Communications and Networking}, author = {D Kundur and S Mashayekh and X Feng and S Liu and K L Butler-Purry and T Zourntos}, editor = {V Poor and Z Han and E Hossain}, url = {http://www.cambridge.org/us/knowledge/isbn/item6658452/?site_locale=en_US}, isbn = {9781107014138}, year = {2012}, date = {2012-06-01}, pages = {353-372}, publisher = {Cambridge University Press}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inbook} } |
Parthasarathy, Saranya Bloom Filter Based Intrusion Detection for Smart Grid 2012. Abstract | BibTeX | Tags: MS Thesis, smart grid, thesis @masterthesis{ParMSThesis12, title = {Bloom Filter Based Intrusion Detection for Smart Grid}, author = {Saranya Parthasarathy}, year = {2012}, date = {2012-05-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n-gram analysis and Bloom Filter. The predictable and regular nature of the SCADA communication patterns is exploited to train the intrusion detection system. The protocol considered to test the proposed approach is MODBUS which is used for communication between a SCADA server and field devices in power system. The approach is tested for attacks like HMI compromise and Man-in-the-Middle. Bloom Filter is chosen because of its strong space advantage over other data structures like hash tables, linked lists etc. for representing sets. The advantage comes from its probabilistic nature and compact array structure. The false positive rates are found to be minimal with careful choice of parameters for Bloom Filter design. Also the memory-efficient property of Bloom Filter makes it suitable for implementation in resource constrained SCADA components. It is also established that the knowledge of physical state of the power system i.e., normal, emergency or restorative state can help in improving the accuracy of the proposed approach.}, keywords = {MS Thesis, smart grid, thesis}, pubstate = {published}, tppubtype = {masterthesis} } This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n-gram analysis and Bloom Filter. The predictable and regular nature of the SCADA communication patterns is exploited to train the intrusion detection system. The protocol considered to test the proposed approach is MODBUS which is used for communication between a SCADA server and field devices in power system. The approach is tested for attacks like HMI compromise and Man-in-the-Middle. Bloom Filter is chosen because of its strong space advantage over other data structures like hash tables, linked lists etc. for representing sets. The advantage comes from its probabilistic nature and compact array structure. The false positive rates are found to be minimal with careful choice of parameters for Bloom Filter design. Also the memory-efficient property of Bloom Filter makes it suitable for implementation in resource constrained SCADA components. It is also established that the knowledge of physical state of the power system i.e., normal, emergency or restorative state can help in improving the accuracy of the proposed approach. |
Kollegala, Revathi S The Robust Classification of Hyperspectral Images Using Adaptive Wavelet Kernel Support Vector Data Description (AWK-SVDD) 2012. Abstract | BibTeX | Tags: fusion, MS Thesis, thesis @masterthesis{KolMSThesis12, title = {The Robust Classification of Hyperspectral Images Using Adaptive Wavelet Kernel Support Vector Data Description (AWK-SVDD)}, author = {Revathi S Kollegala}, year = {2012}, date = {2012-05-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {Detection of targets in hyperspectral images is a specific case of one-class classification. It is particularly relevant in the area of remote sensing and has received considerable interest in the past few years. The thesis proposes the use of wavelet functions as kernels with Support Vector Data Description for target detection in hyperspectral images. Specifically, it proposes the Adaptive Wavelet Kernel Support Vector Data Description (AWK-SVDD) that learns the optimal wavelet function to be used given the target signature. The performance and computational requirements of AWK-SVDD is compared with that of existing methods and other wavelet functions. An introduction to target detection and target detection in the context of hyperspectral images is given. This thesis also includes an overview of the thesis and lists the contributions of the thesis. A brief mathematical background into one-class classification in reference to target detection is included. Also described are the existing methods and introduces essential concepts relevant to the proposed approach. The use of wavelet functions as kernels with Support Vector Data Description, the conditions for use of wavelet functions and the use of two functions in order to form the kernel are checked and analyzed. The proposed approach, AWKSVDD, is mathematically described. The details of the implementation and the results when applied to the Urban dataset of hyperspectral images with a random target signature are given. The results confirm the better performance of AWK-SVDD compared to conventional kernels, wavelet kernels and the two-function Morlet-Radial Basis Function kernel. The problems faced with convergence during the Support Vector Data Description optimization are discussed. The thesis concludes with the suggestions for future work.}, keywords = {fusion, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Detection of targets in hyperspectral images is a specific case of one-class classification. It is particularly relevant in the area of remote sensing and has received considerable interest in the past few years. The thesis proposes the use of wavelet functions as kernels with Support Vector Data Description for target detection in hyperspectral images. Specifically, it proposes the Adaptive Wavelet Kernel Support Vector Data Description (AWK-SVDD) that learns the optimal wavelet function to be used given the target signature. The performance and computational requirements of AWK-SVDD is compared with that of existing methods and other wavelet functions. An introduction to target detection and target detection in the context of hyperspectral images is given. This thesis also includes an overview of the thesis and lists the contributions of the thesis. A brief mathematical background into one-class classification in reference to target detection is included. Also described are the existing methods and introduces essential concepts relevant to the proposed approach. The use of wavelet functions as kernels with Support Vector Data Description, the conditions for use of wavelet functions and the use of two functions in order to form the kernel are checked and analyzed. The proposed approach, AWKSVDD, is mathematically described. The details of the implementation and the results when applied to the Urban dataset of hyperspectral images with a random target signature are given. The results confirm the better performance of AWK-SVDD compared to conventional kernels, wavelet kernels and the two-function Morlet-Radial Basis Function kernel. The problems faced with convergence during the Support Vector Data Description optimization are discussed. The thesis concludes with the suggestions for future work. |
El-Halabi, M; Farraj, A; Ly, H D; Kundur, D A Distortion-Theoretic Perspective for Redundant Metering Security in a Smart Grid Inproceedings Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-5, Montreal, Canada, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{ElHFarLyKunCCECE12, title = {A Distortion-Theoretic Perspective for Redundant Metering Security in a Smart Grid}, author = {M El-Halabi and A Farraj and H D Ly and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ElHFarLyKunCCECE12.pdf http://dx.doi.org/10.1109/CCECE.2012.6335004}, year = {2012}, date = {2012-04-30}, booktitle = {Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)}, pages = {1-5}, address = {Montreal, Canada}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Parthasarathy, S; Kundur, D Bloom Filter Based Intrusion Detection for Smart Grid SCADA Inproceedings Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-6, Montreal, Canada, 2012. Links | BibTeX | Tags: smart grid @inproceedings{ParKunCCECE12, title = {Bloom Filter Based Intrusion Detection for Smart Grid SCADA}, author = {S Parthasarathy and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ParKunCCECE12.pdf http://dx.doi.org/10.1109/CCECE.2012.6334816}, year = {2012}, date = {2012-04-30}, booktitle = {Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)}, pages = {1-6}, address = {Montreal, Canada}, keywords = {smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Wei, J; Kundur, D; Zourntos, T On the Use of Cyber-Physical Hierarchy for Smart Grid Security and Efficient Control Inproceedings Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-6, Montreal, Canada, 2012. Links | BibTeX | Tags: CPS, news3, smart grid @inproceedings{WeiKunZouCCECE12, title = {On the Use of Cyber-Physical Hierarchy for Smart Grid Security and Efficient Control}, author = {J Wei and D Kundur and T Zourntos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/WeiKunZouCCECE12.pdf http://dx.doi.org/10.1109/CCECE.2012.6334848}, year = {2012}, date = {2012-04-30}, booktitle = {Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)}, pages = {1-6}, address = {Montreal, Canada}, keywords = {CPS, news3, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Liu, S; Kundur, D; Zourntos, T; Butler-Purry, K L Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation Inproceedings Proc. First International Conference on High Confidence Network Systems (HiCoNS) at Cyber Physical Systems Week (CPSWeek) 2012, pp. 21-30, Beijing, China, 2012. Links | BibTeX | Tags: CPS, smart grid @inproceedings{LiuKunZouButHiCoNS12, title = {Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation}, author = {S Liu and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuKunZouButHiCoNS.pdf http://dx.doi.org/10.1145/2185505.2185509}, year = {2012}, date = {2012-04-17}, booktitle = {Proc. First International Conference on High Confidence Network Systems (HiCoNS) at Cyber Physical Systems Week (CPSWeek) 2012}, pages = {21-30}, address = {Beijing, China}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
2011 |
Liu, S; Feng, X; Kundur, D; Zourntos, T; Butler-Purry, K L Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Inproceedings Proc. Second IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 49-54, Brussels, Belgium, 2011. Links | BibTeX | Tags: CPS, news1, smart grid @inproceedings{LiuFenKunZouButSGC11, title = {Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation}, author = {S Liu and X Feng and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuFenKunZouButSGC11.pdf http://dx.doi.org/10.1109/SGMS.2011.6089026}, year = {2011}, date = {2011-10-17}, booktitle = {Proc. Second IEEE International Conference on Smart Grid Communications (SmartGridComm)}, pages = {49-54}, address = {Brussels, Belgium}, keywords = {CPS, news1, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Liu, S; Feng, X; Kundur, D; Zourntos, T; Butler-Purry, K L A Class of Cyber-Physical Switching Attacks for Power System Disruption Inproceedings Proc. 7th Cyber Security and Information Intelligence Research Workshop (CSIIRW), Oak Ridge National Laboratory, Tennessee, 2011. Links | BibTeX | Tags: CPS, news2, smart grid @inproceedings{LiuFenKunZouButCSIIRW11, title = {A Class of Cyber-Physical Switching Attacks for Power System Disruption}, author = {S Liu and X Feng and D Kundur and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuFenKunZouButCSIIRW11.pdf http://dx.doi.org/10.1145/2179298.2179316}, year = {2011}, date = {2011-10-12}, booktitle = {Proc. 7th Cyber Security and Information Intelligence Research Workshop (CSIIRW)}, address = {Oak Ridge National Laboratory, Tennessee}, keywords = {CPS, news2, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Feng, X; Mashayekh, S; Liu, S; Zourntos, T; Butler-Purry, K L Towards Modeling the Impact of Cyber Attacks on a Smart Grid Journal Article International Journal of Security and Networks, 6 (1), pp. 2-13, 2011. Links | BibTeX | Tags: CPS, dyn-sys, smart grid @article{KunFenMasLiuZouButIJSN11, title = {Towards Modeling the Impact of Cyber Attacks on a Smart Grid}, author = {D Kundur and X Feng and S Mashayekh and S Liu and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunFenMasLiuZouButIJSN11.pdf http://dx.doi.org/10.1504/IJSN.2011.039629}, year = {2011}, date = {2011-10-04}, journal = {International Journal of Security and Networks}, volume = {6}, number = {1}, pages = {2-13}, keywords = {CPS, dyn-sys, smart grid}, pubstate = {published}, tppubtype = {article} } |
Jainsky, J S; Kundur, D Ang, L -M; Seng, K P (Ed.): pp. 340-357, IGI Global, 2011, ISBN: 9781613501535. Links | BibTeX | Tags: forensics, mmsn @inbook{JaiKunChap11, title = {“Visual Sensor Network Processing and Preventative Steganalysis," in Visual Information Processing in Wireless Sensor Networks}, author = {J S Jainsky and D Kundur}, editor = {L -M Ang and K P Seng}, url = {http://www.igi-global.com/book/visual-information-processing-wireless-sensor/52741}, isbn = {9781613501535}, year = {2011}, date = {2011-09-01}, pages = {340-357}, publisher = {IGI Global}, keywords = {forensics, mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Jainsky, J S; Kundur, D Preventative Steganalysis in Wireless Visual Sensor Networks: Challenges and Solutions Inproceedings Proc. IEEE International Conference on Multimedia and Expo (ICME), pp. 1692-1695, Barcelona, Spain, 2011. Links | BibTeX | Tags: forensics @inproceedings{JaiKunICME11, title = {Preventative Steganalysis in Wireless Visual Sensor Networks: Challenges and Solutions}, author = {J S Jainsky and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/JaiKunICME11.pdf http://dx.doi.org/10.1109/ICME.2011.6012224}, year = {2011}, date = {2011-07-11}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo (ICME)}, pages = {1692-1695}, address = {Barcelona, Spain}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Dominguez-Conde, G; Kundur, D Improving the Visual Performance of S/DISCUS Inproceedings Proc. IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, Barcelona, Spain, 2011. @inproceedings{ConKunICME11, title = {Improving the Visual Performance of S/DISCUS}, author = {G Dominguez-Conde and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/DomKunICME11.pdf http://dx.doi.org/10.1109/ICME.2011.6011981}, year = {2011}, date = {2011-07-11}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo (ICME)}, pages = {1-6}, address = {Barcelona, Spain}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
2010 |
Kundur, D; Feng, X; Liu, S; Zourntos, T; Butler-Purry, K L Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Inproceedings Proc. IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 244-249, Gaithersburg, Maryland, 2010. Links | BibTeX | Tags: CPS, smart grid @inproceedings{KunFenLiuZouButSGC10, title = {Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid}, author = {D Kundur and X Feng and S Liu and T Zourntos and K L Butler-Purry}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunFenLiuZouButSGC10.pdf http://dx.doi.org/10.1109/SMARTGRID.2010.5622049}, year = {2010}, date = {2010-10-04}, booktitle = {Proc. IEEE International Conference on Smart Grid Communications (SmartGridComm)}, pages = {244-249}, address = {Gaithersburg, Maryland}, keywords = {CPS, smart grid}, pubstate = {published}, tppubtype = {inproceedings} } |
Okorafor, U N; Kundur, D Security-Aware Routing and Localization for a Directional Mission Critical Network Journal Article IEEE Journal on Selected Areas in Communications, 28 (5), pp. 664-676, 2010. @article{OkoKunJSAC10, title = {Security-Aware Routing and Localization for a Directional Mission Critical Network}, author = {U N Okorafor and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunJSAC10.pdf http://dx.doi.org/10.1109/JSAC.2010.100605}, year = {2010}, date = {2010-06-01}, journal = {IEEE Journal on Selected Areas in Communications}, volume = {28}, number = {5}, pages = {664-676}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Luh, W; Kundur, D Liu, R; Trappe, W (Ed.): pp. 39-64, Springer, 2010, ISBN: 978-1-4419-1384-5. Links | BibTeX | Tags: phys-layer @inbook{LuhKunChap10, title = {"Distributed Secret Sharing over the Gaussian Interference Wiretap Channel,” in Securing Wireless Communications at the Physical Layer}, author = {W Luh and D Kundur}, editor = {R Liu and W Trappe}, url = {http://www.springer.com/engineering/signals/book/978-1-4419-1384-5}, isbn = {978-1-4419-1384-5}, year = {2010}, date = {2010-01-01}, pages = {39-64}, publisher = {Springer}, keywords = {phys-layer}, pubstate = {published}, tppubtype = {inbook} } |
2009 |
Fei, C; Kwong, R; Kundur, D Secure Semi-Fragile Watermarking for Image Authentication Inproceedings Proc. First IEEE International Workshop on Information Forensics and Security (WIFS), pp. 141-145, London, UK, 2009. Links | BibTeX | Tags: drm, forensics @inproceedings{FeiKwoKunWIFS09, title = {Secure Semi-Fragile Watermarking for Image Authentication}, author = {C Fei and R Kwong and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKwoKunWIFS09.pdf http://dx.doi.org/10.1109/WIFS.2009.5386465}, year = {2009}, date = {2009-12-06}, booktitle = {Proc. First IEEE International Workshop on Information Forensics and Security (WIFS)}, pages = {141-145}, address = {London, UK}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Okorafor, U N; Kundur, D On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks Journal Article IEEE Transactions on Mobile Computing, 8 (10), pp. 1427-1440, 2009. @article{OkoKunTMC09, title = {On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks}, author = {U N Okorafor and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunTMC09.pdf http://dx.doi.org/10.1109/TMC.2009.57}, year = {2009}, date = {2009-10-01}, journal = {IEEE Transactions on Mobile Computing}, volume = {8}, number = {10}, pages = {1427-1440}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Kundur, D Directional Link Networks: Enabling Technologies for Multimedia Sensor Networks Journal Article COMSOC MMTC E-Letter, 4 (5), 2009. @article{KunMMTCELett09, title = {Directional Link Networks: Enabling Technologies for Multimedia Sensor Networks}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunMMTCE-Letter09.pdf}, year = {2009}, date = {2009-07-01}, journal = {COMSOC MMTC E-Letter}, volume = {4}, number = {5}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kwong, R; Kundur, D A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication Journal Article IEEE Transactions on Information Forensics and Security, 4 (2), pp. 179-192, 2009. @article{FeiKwoKunTIFS09, title = {A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication}, author = {C Fei and R Kwong and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKwoKunTIFS09.pdf http://dx.doi.org/10.1109/TIFS.2009.2015039}, year = {2009}, date = {2009-06-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {4}, number = {2}, pages = {179-192}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Czarlinska, A; Kundur, D Wireless Image Sensor Networks: Event Acquisition in Attack-Prone and Uncertain Environments Journal Article Multidimensional Systems and Signal Processing, 20 (2), pp. 135-164, 2009. @article{CzaKunMSSP09, title = {Wireless Image Sensor Networks: Event Acquisition in Attack-Prone and Uncertain Environments}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunMSSP09.pdf http://dx.doi.org/10.1007/s11045-008-0071-2}, year = {2009}, date = {2009-06-01}, journal = {Multidimensional Systems and Signal Processing}, volume = {20}, number = {2}, pages = {135-164}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Okorafor, U N; Kundur, D Jiang, Z; Pan, Y (Ed.): Chapter 5, pp. 93-106, Nova Science Publishers, 2009, ISBN: 978-1-60456-457-0. @inbook{OkoKunChap08, title = {"Security Aware Routing in Hierarchical Optical Sensor Networks" in From Problem to Solution: Wireless Sensor Networks}, author = {U N Okorafor and D Kundur}, editor = {Z Jiang and Y Pan}, url = {https://www.novapublishers.com/catalog/product_info.php?products_id=6983}, isbn = {978-1-60456-457-0}, year = {2009}, date = {2009-03-15}, pages = {93-106}, publisher = {Nova Science Publishers}, chapter = {5}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Merabti, M; Liu, Z; Yu, H H; Kundur, D Advances in Peer-to_Peer Content Search Journal Article Journal of Signal Processing Systems, 59 (3), pp. 309-318, 2009. @article{MerLiuYuKunJSPS10, title = {Advances in Peer-to_Peer Content Search}, author = {M Merabti and Z Liu and H H Yu and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MerLiuYuKunJSPS10.pdf http://dx.doi.org/10.1007/s11265-009-0343-6}, year = {2009}, date = {2009-02-05}, journal = {Journal of Signal Processing Systems}, volume = {59}, number = {3}, pages = {309-318}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Mathai, N J; Zourntos, T; Kundur, D Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation Journal Article EURASIP Journal on Advances in Signal Processing Special Issue on Signal Processing Advances in Robots and Autonomy, 2009 (Article ID 984752), pp. 9, 2009. Links | BibTeX | Tags: CPS, dyn-sys @article{MatZouKunJASP09, title = {Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation}, author = {N J Mathai and T Zourntos and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MatZouKunJASP09.pdf http://dx.doi.org/10.1155/2009/984752}, year = {2009}, date = {2009-01-01}, journal = {EURASIP Journal on Advances in Signal Processing Special Issue on Signal Processing Advances in Robots and Autonomy}, volume = {2009}, number = {Article ID 984752}, pages = {9}, keywords = {CPS, dyn-sys}, pubstate = {published}, tppubtype = {article} } |
2008 |
Shankar, S; Kundur, D; Sprintson, A Enhanced Availability in Randomly Deployed Wireless Sensor Networks via Hybrid Uni/Omni-Directional Antennas Inproceedings Proc. IEEE Military Communications Conference (MILCOM), San Diego, California, 2008. @inproceedings{ShaKunSprMILCOM08, title = {Enhanced Availability in Randomly Deployed Wireless Sensor Networks via Hybrid Uni/Omni-Directional Antennas}, author = {S Shankar and D Kundur and A Sprintson}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ShaKunMILCOM08.pdf http://dx.doi.org/10.1109/MILCOM.2008.4753565}, year = {2008}, date = {2008-11-01}, booktitle = {Proc. IEEE Military Communications Conference (MILCOM)}, address = {San Diego, California}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Luh, W; Kundur, D On Privacy and Security in Distributed Visual Sensor Networks Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 1692-1695, 2008. Links | BibTeX | Tags: mmsn, phys-layer @inproceedings{CzaLuhKunICIP08, title = {On Privacy and Security in Distributed Visual Sensor Networks}, author = {A Czarlinska and W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaLuhKunICIP08.pdf http://dx.doi.org/10.1109/ICIP.2008.4712099}, year = {2008}, date = {2008-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, pages = {1692-1695}, keywords = {mmsn, phys-layer}, pubstate = {published}, tppubtype = {inproceedings} } |
Luh, W; Kundur, D Distributed Secret Sharing for Discrete Memoryless Networks Journal Article IEEE Transactions on Information Forensics and Security, 3 (3), pp. 424-430, 2008. Links | BibTeX | Tags: phys-layer @article{LuhKunTIFS08, title = {Distributed Secret Sharing for Discrete Memoryless Networks}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunTIFS08.pdf http://dx.doi.org/10.1109/TIFS.2008.927422}, year = {2008}, date = {2008-09-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {3}, number = {3}, pages = {424-430}, keywords = {phys-layer}, pubstate = {published}, tppubtype = {article} } |
Okorafor, Unoma Ndili Secure Integrated Routing and Localization in Wireless Optical Sensor Networks PhD Thesis Texas A&M University, 2008. Abstract | BibTeX | Tags: mmsn, PhD thesis, thesis @phdthesis{OkoPhDThesis08, title = {Secure Integrated Routing and Localization in Wireless Optical Sensor Networks}, author = {Unoma Ndili Okorafor}, year = {2008}, date = {2008-08-31}, address = {College Station, Texas}, school = {Texas A&M University}, abstract = {Wireless ad hoc and sensor networks are envisioned to be self-organizing and autonomous networks, that may be randomly deployed where no fixed infrastructure is either feasible or cost-effective. The successful commercialization of such networks depends on the feasible implementation of network services to support security-aware applications. Recently, free space optical (FSO) communication has emerged as a viable technology for broadband distributed wireless optical sensor network (WOSN) applications. The challenge of employing FSO include its susceptibility to adverse weather conditions and the line of sight requirement between two communicating nodes. In addition, it is necessary to consider security at the initial design phase of any network and routing protocol. This dissertation addresses the feasibility of randomly deployed WOSNs employing broad beam FSO with regard to the network layer, in which two important problems are specifically investigated. First, we address the parameter assignment problem which considers the relationship amongst the physical layer parameters of node density, transmission radius and beam divergence of the FSO signal in order to yield probabilistic guarantees on network connectivity. We analyze the node isolation property of WOSNs, and its relation to the connectivity of the network. Theoretical analysis and experimental investigation were conducted to assess the effects of hierarchical clustering as well as fading due to atmospheric turbulence on connectivity, thereby demonstrating the design choices necessary to make the random deployment of the WOSN feasible. Second, we propose a novel light-weight circuit-based, secure and integrated routing and localization paradigm within the WOSN, that leverages the resources of the base station. Our scheme exploits the hierarchical cluster-based organization of the network, and the directionality of links to deliver enhanced security performance including per hop and broadcast authentication, confidentiality, integrity and freshness of routing signals. We perform security and attack analysis and synthesis to characterize the protocol’s performance, compared to existing schemes, and demonstrate its superior performance for WOSNs. Through the investigation of this dissertation, we demonstrate the fundamental tradeoff between security and connectivity in WOSNs, and illustrate how the transmission radius may be used as a high sensitivity tuning parameter to balance there two metrics of network performance. We also present WOSNs as a field of study that opens up several directions for novel research, and encompasses problems such as connectivity analysis, secure routing and localization, intrusion detection, topology control, secure data aggregation and novel attack scenarios.}, keywords = {mmsn, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } Wireless ad hoc and sensor networks are envisioned to be self-organizing and autonomous networks, that may be randomly deployed where no fixed infrastructure is either feasible or cost-effective. The successful commercialization of such networks depends on the feasible implementation of network services to support security-aware applications. Recently, free space optical (FSO) communication has emerged as a viable technology for broadband distributed wireless optical sensor network (WOSN) applications. The challenge of employing FSO include its susceptibility to adverse weather conditions and the line of sight requirement between two communicating nodes. In addition, it is necessary to consider security at the initial design phase of any network and routing protocol. This dissertation addresses the feasibility of randomly deployed WOSNs employing broad beam FSO with regard to the network layer, in which two important problems are specifically investigated. First, we address the parameter assignment problem which considers the relationship amongst the physical layer parameters of node density, transmission radius and beam divergence of the FSO signal in order to yield probabilistic guarantees on network connectivity. We analyze the node isolation property of WOSNs, and its relation to the connectivity of the network. Theoretical analysis and experimental investigation were conducted to assess the effects of hierarchical clustering as well as fading due to atmospheric turbulence on connectivity, thereby demonstrating the design choices necessary to make the random deployment of the WOSN feasible. Second, we propose a novel light-weight circuit-based, secure and integrated routing and localization paradigm within the WOSN, that leverages the resources of the base station. Our scheme exploits the hierarchical cluster-based organization of the network, and the directionality of links to deliver enhanced security performance including per hop and broadcast authentication, confidentiality, integrity and freshness of routing signals. We perform security and attack analysis and synthesis to characterize the protocol’s performance, compared to existing schemes, and demonstrate its superior performance for WOSNs. Through the investigation of this dissertation, we demonstrate the fundamental tradeoff between security and connectivity in WOSNs, and illustrate how the transmission radius may be used as a high sensitivity tuning parameter to balance there two metrics of network performance. We also present WOSNs as a field of study that opens up several directions for novel research, and encompasses problems such as connectivity analysis, secure routing and localization, intrusion detection, topology control, secure data aggregation and novel attack scenarios. |
Luh, William Distributed Secrecy for Information Theoretic Sensor Network Models PhD Thesis Texas A&M University, 2008. Abstract | BibTeX | Tags: PhD thesis, phys-layer, thesis @phdthesis{LuhPhDThesis08, title = {Distributed Secrecy for Information Theoretic Sensor Network Models}, author = {William Luh}, year = {2008}, date = {2008-08-15}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {This dissertation presents a novel problem inspired by the characteristics of sensor networks. The basic setup through-out the dissertation is that a set of sensor nodes encipher their data without collaboration and without any prior shared secret materials. The challenge is dealt by an eavesdropper who intercepts a subset of the enciphered data and wishes to gain knowledge of the uncoded data. This problem is challenging and novel given that the eavesdropper is assumed to know everything, including secret cryptographic keys used by both the encoders and decoders. We study the above problem using information theoretic models as a necessary first step towards an understanding of the characteristics of this system problem. This dissertation contains four parts. The first part deals with noiseless channels, and the goal is for sensor nodes to both source code and encipher their data. We derive inner and outer regions of the capacity region (i.e the set of all source coding and equivocation rates) for this problem under general distortion constraints. The main conclusion in this part is that unconditional secrecy is unachievable unless the distortion is maximal, rendering the data useless. In the second part we thus provide a practical coding scheme based on distributed source coding using syndromes (DISCUS) that provides secrecy beyond the equivocation measure, i.e. secrecy on each symbol in the message. The third part deals with discrete memoryless channels, and the goal is for sensor nodes to both channel code and encipher their data. We derive inner and outer regions to the secrecy capacity region, i.e. the set of all channel coding rates that achieve (weak) unconditional secrecy. The main conclusion in this part is that interference allows (weak) unconditional secrecy to be achieved in contrast with the first part of this dissertation. The fourth part deals with wireless channels with fading and additive Gaussian noise. We derive a general outer region and an inner region based on an equal SNR assumption, and show that the two are partially tight when the maximum available user powers are admissible.}, keywords = {PhD thesis, phys-layer, thesis}, pubstate = {published}, tppubtype = {phdthesis} } This dissertation presents a novel problem inspired by the characteristics of sensor networks. The basic setup through-out the dissertation is that a set of sensor nodes encipher their data without collaboration and without any prior shared secret materials. The challenge is dealt by an eavesdropper who intercepts a subset of the enciphered data and wishes to gain knowledge of the uncoded data. This problem is challenging and novel given that the eavesdropper is assumed to know everything, including secret cryptographic keys used by both the encoders and decoders. We study the above problem using information theoretic models as a necessary first step towards an understanding of the characteristics of this system problem. This dissertation contains four parts. The first part deals with noiseless channels, and the goal is for sensor nodes to both source code and encipher their data. We derive inner and outer regions of the capacity region (i.e the set of all source coding and equivocation rates) for this problem under general distortion constraints. The main conclusion in this part is that unconditional secrecy is unachievable unless the distortion is maximal, rendering the data useless. In the second part we thus provide a practical coding scheme based on distributed source coding using syndromes (DISCUS) that provides secrecy beyond the equivocation measure, i.e. secrecy on each symbol in the message. The third part deals with discrete memoryless channels, and the goal is for sensor nodes to both channel code and encipher their data. We derive inner and outer regions to the secrecy capacity region, i.e. the set of all channel coding rates that achieve (weak) unconditional secrecy. The main conclusion in this part is that interference allows (weak) unconditional secrecy to be achieved in contrast with the first part of this dissertation. The fourth part deals with wireless channels with fading and additive Gaussian noise. We derive a general outer region and an inner region based on an equal SNR assumption, and show that the two are partially tight when the maximum available user powers are admissible. |
Czarlinska, Alexandra Stealthy Attacks and Defense Strategies in Competing Sensor Networks PhD Thesis Texas A&M University, 2008. Abstract | BibTeX | Tags: mmsn, PhD thesis, thesis @phdthesis{CzaPhDThesis08, title = {Stealthy Attacks and Defense Strategies in Competing Sensor Networks}, author = {Alexandra Czarlinska}, year = {2008}, date = {2008-08-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment. The correctness of the collected data is especially important in applications involving societal welfare and safety, in which the acquired information may be utilized by end-users for decision-making. The distributed nature of sensor networks and their deployment in unattended and potentially hostile environments, however, renders this collection task challenging for both scalar and visual data. In this work we propose and address the twin problem of carrying out and defending against a stealthy attack on the information gathered by a sensor network at the physical sensing layer as perpetrated by a competing hostile network. A stealthy attack in this context is an intelligent attempt to disinform a sensor network in a manner that mitigates attack discovery. In comparison with previous sensor network security studies, we explicitly model the attack scenario as an active competition between two networks where difficulties arise from the pervasive nature of the attack, the possibility of tampering during data acquisition prior to encryption, and the lack of prior knowledge regarding the characteristics of the attack We examine the problem from the perspective of both the hostile and the legitimate network. The interaction between the networks is modeled as a game where a stealth utility is derived and shown to be consistent for both players in the case of stealthy direct attacks and stealthy cross attacks. Based on the stealth utility, the optimal attack and defense strategies are obtained for each network. For the legitimate network, minimization of the attacker’s stealth results in the possibility of attack detection through established paradigms and the ability to mitigate the power of the attack. For the hostile network, maximization of the stealth utility translates into the optimal attack avoidance. This attack avoidance does not require active communication among the hostile nodes but rather relies on a level of coordination which we quantify. We demonstrate the significance and effectiveness of the solution for sensor networks acquiring scalar and multidimensional data such as surveillance sequences and relate the results to existing image sensor networks. Finally we discuss the implications of these results for achieving secure event acquisition in unattended environments.}, keywords = {mmsn, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment. The correctness of the collected data is especially important in applications involving societal welfare and safety, in which the acquired information may be utilized by end-users for decision-making. The distributed nature of sensor networks and their deployment in unattended and potentially hostile environments, however, renders this collection task challenging for both scalar and visual data. In this work we propose and address the twin problem of carrying out and defending against a stealthy attack on the information gathered by a sensor network at the physical sensing layer as perpetrated by a competing hostile network. A stealthy attack in this context is an intelligent attempt to disinform a sensor network in a manner that mitigates attack discovery. In comparison with previous sensor network security studies, we explicitly model the attack scenario as an active competition between two networks where difficulties arise from the pervasive nature of the attack, the possibility of tampering during data acquisition prior to encryption, and the lack of prior knowledge regarding the characteristics of the attack We examine the problem from the perspective of both the hostile and the legitimate network. The interaction between the networks is modeled as a game where a stealth utility is derived and shown to be consistent for both players in the case of stealthy direct attacks and stealthy cross attacks. Based on the stealth utility, the optimal attack and defense strategies are obtained for each network. For the legitimate network, minimization of the attacker’s stealth results in the possibility of attack detection through established paradigms and the ability to mitigate the power of the attack. For the hostile network, maximization of the stealth utility translates into the optimal attack avoidance. This attack avoidance does not require active communication among the hostile nodes but rather relies on a level of coordination which we quantify. We demonstrate the significance and effectiveness of the solution for sensor networks acquiring scalar and multidimensional data such as surveillance sequences and relate the results to existing image sensor networks. Finally we discuss the implications of these results for achieving secure event acquisition in unattended environments. |
Shankar, Sonu Parameter Assignment for Improved Connectivity and Security in Randomly Deployed Wireless Sensor Networks via Hybrid Omni/Uni-Directional Antennas 2008. Abstract | BibTeX | Tags: mmsn, MS Thesis, thesis @masterthesis{ShaMSThesis08, title = {Parameter Assignment for Improved Connectivity and Security in Randomly Deployed Wireless Sensor Networks via Hybrid Omni/Uni-Directional Antennas}, author = {Sonu Shankar}, year = {2008}, date = {2008-08-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {Conguring a network system to operate at optimal levels of performance requires a comprehensive understanding of the effects of a variety of system parameters on crucial metrics like connectivity and resilience to network attacks. Traditionally, omni-directional antennas have been used for communication in wireless sensor networks. In this thesis, a hybrid communication model is presented where-in, nodes in a network are capable of both omni-directional and uni-directional communication. The effect of such a model on performance in randomly deployed wireless sensor networks is studied, specically looking at the effect of a variety of network parameters on network performance. The work in this thesis demonstrates that, when the hybrid communication model is employed, the probability of 100% connectivity improves by almost 90% and that of k-connectivity improves by almost 80% even at low node densities when compared to the traditional omni-directional model. In terms of network security, it was found that the hybrid approach improves network resilience to the collision attack by almost 85% and the cost of launching a successful network partition attack was increased by as high as 600%. The gains in connectivity and resilience were found to improve with increasing node densities and decreasing antenna beamwidths.}, keywords = {mmsn, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Conguring a network system to operate at optimal levels of performance requires a comprehensive understanding of the effects of a variety of system parameters on crucial metrics like connectivity and resilience to network attacks. Traditionally, omni-directional antennas have been used for communication in wireless sensor networks. In this thesis, a hybrid communication model is presented where-in, nodes in a network are capable of both omni-directional and uni-directional communication. The effect of such a model on performance in randomly deployed wireless sensor networks is studied, specically looking at the effect of a variety of network parameters on network performance. The work in this thesis demonstrates that, when the hybrid communication model is employed, the probability of 100% connectivity improves by almost 90% and that of k-connectivity improves by almost 80% even at low node densities when compared to the traditional omni-directional model. In terms of network security, it was found that the hybrid approach improves network resilience to the collision attack by almost 85% and the cost of launching a successful network partition attack was increased by as high as 600%. The gains in connectivity and resilience were found to improve with increasing node densities and decreasing antenna beamwidths. |
Czarlinska, A; Kundur, D Reliable Event-Detection in Wireless Visual Sensor Networks through Scalar Collaboration and Game Theoretic Consideration Journal Article IEEE Transactions on Multimedia, 10 (5), pp. 675-690, 2008. @article{CzaKunTMM08, title = {Reliable Event-Detection in Wireless Visual Sensor Networks through Scalar Collaboration and Game Theoretic Consideration}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunTMM08.pdf http://dx.doi.org/10.1109/TMM.2008.922775}, year = {2008}, date = {2008-08-01}, journal = {IEEE Transactions on Multimedia}, volume = {10}, number = {5}, pages = {675-690}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Mathai, Nebu John Cybernetic Automata: An Approach for the Realization of Economical Cognition for Multi-Robot Systems PhD Thesis Texas A&M University, 2008, ((Winner of TAMU 2008 U.S. Senator Phil Gramm Doctoral Award)). Abstract | BibTeX | Tags: CPS, dyn-sys, PhD thesis, thesis @phdthesis{MatPhDThesis08, title = {Cybernetic Automata: An Approach for the Realization of Economical Cognition for Multi-Robot Systems}, author = {Nebu John Mathai}, year = {2008}, date = {2008-05-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {(Winner of TAMU 2008 U.S. Senator Phil Gramm Doctoral Award) The multi-agent robotics paradigm has attracted much attention due to the variety of pertinent applications that are well-served by the use of a multiplicity of agents (including space robotics, search and rescue, and mobile sensor networks). The use of this paradigm for most applications, however, demands economical, lightweight agent designs for reasons of longer operational life, lower economic cost, faster and easily-verified designs, etc. An important contributing factor to an agent’s cost is its control architecture. Due to the emergence of novel implementation technologies carrying the promise of economical implementation, we consider the development of a technology-independent specification for computational machinery. To that end, the use of cybernetics toolsets (control and dynamical systems theory) is appropriate, enabling a principled specification of robotic control architectures in mathematical terms that could be mapped directly to diverse implementation substrates. This dissertation, hence, addresses the problem of developing a technologyindependent specification for lightweight control architectures to enable robotic agents to serve in a multi-agent scheme. We present the principled design of static and dynamical regulators that elicit useful behaviors, and integrate these within an overall architecture for both single and multi-agent control. Since the use of control theory can be limited in unstructured environments, a major focus of the work is on the engineering of emergent behavior. The proposed scheme is highly decentralized, requiring only local sensing and no inter-agent communication. Beyond several simulation-based studies, we provide experimental results for a two-agent system, based on a custom implementation employing field-programmable gate arrays.}, note = {(Winner of TAMU 2008 U.S. Senator Phil Gramm Doctoral Award)}, keywords = {CPS, dyn-sys, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } (Winner of TAMU 2008 U.S. Senator Phil Gramm Doctoral Award) The multi-agent robotics paradigm has attracted much attention due to the variety of pertinent applications that are well-served by the use of a multiplicity of agents (including space robotics, search and rescue, and mobile sensor networks). The use of this paradigm for most applications, however, demands economical, lightweight agent designs for reasons of longer operational life, lower economic cost, faster and easily-verified designs, etc. An important contributing factor to an agent’s cost is its control architecture. Due to the emergence of novel implementation technologies carrying the promise of economical implementation, we consider the development of a technology-independent specification for computational machinery. To that end, the use of cybernetics toolsets (control and dynamical systems theory) is appropriate, enabling a principled specification of robotic control architectures in mathematical terms that could be mapped directly to diverse implementation substrates. This dissertation, hence, addresses the problem of developing a technologyindependent specification for lightweight control architectures to enable robotic agents to serve in a multi-agent scheme. We present the principled design of static and dynamical regulators that elicit useful behaviors, and integrate these within an overall architecture for both single and multi-agent control. Since the use of control theory can be limited in unstructured environments, a major focus of the work is on the engineering of emergent behavior. The proposed scheme is highly decentralized, requiring only local sensing and no inter-agent communication. Beyond several simulation-based studies, we provide experimental results for a two-agent system, based on a custom implementation employing field-programmable gate arrays. |
Zourntos, T; Mathai, N J; Magierowski, S; Kundur, D A Bio-inspired Analog Scheme for Navigational Control of Lightweight Autonomous Agents Inproceedings Proc. IEEE International Conference on Robotics and Automation (ICRA), pp. 1132-1137, Pasadena, California, 2008. Links | BibTeX | Tags: dyn-sys @inproceedings{ZouMatMagKunICRA08, title = {A Bio-inspired Analog Scheme for Navigational Control of Lightweight Autonomous Agents}, author = {T Zourntos and N J Mathai and S Magierowski and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ZouMatMagKunICRA08.pdf http://dx.doi.org/10.1109/ROBOT.2008.4543356}, year = {2008}, date = {2008-05-01}, booktitle = {Proc. IEEE International Conference on Robotics and Automation (ICRA)}, pages = {1132-1137}, address = {Pasadena, California}, keywords = {dyn-sys}, pubstate = {published}, tppubtype = {inproceedings} } |
Luh, W; Kundur, D Secure Distributed Source Coding with Side-Information Journal Article IEEE Communication Letters, 12 (4), pp. 310-312, 2008. Links | BibTeX | Tags: phys-layer @article{LuhKunICL08, title = {Secure Distributed Source Coding with Side-Information}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunICL08.pdf http://dx.doi.org/10.1109/LCOMM.2008.080070.}, year = {2008}, date = {2008-04-01}, journal = {IEEE Communication Letters}, volume = {12}, number = {4}, pages = {310-312}, keywords = {phys-layer}, pubstate = {published}, tppubtype = {article} } |
Shankar, S; Kundur, D Towards Improved Connectivity with Hybrid Uni/Omni-Directional Antennas in Wireless Sensor Networks Inproceedings Proc. IEEE INFOCOM Workshops, pp. 1-4, Phoenix, Arizona, 2008. @inproceedings{ShaKunINFOCOM08, title = {Towards Improved Connectivity with Hybrid Uni/Omni-Directional Antennas in Wireless Sensor Networks}, author = {S Shankar and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ShaKunINFOCOM08.pdf http://dx.doi.org/10.1109/INFOCOM.2008.4544587}, year = {2008}, date = {2008-04-01}, booktitle = {Proc. IEEE INFOCOM Workshops}, pages = {1-4}, address = {Phoenix, Arizona}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Luh, W; Kundur, D Proc. IEEE INFOCOM Workshop on Mission Critical Networks, pp. 1-6, Phoenix, Arizona, 2008. @inproceedings{CzaLuhKunMCN08, title = {G-E-M Sensor Networks for Mission Critical Surveillance in Hostile Environments Sensor Networks for Mission Critical Surveillance in Hostile Environments}, author = {A Czarlinska and W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaLuhKunMCN08.pdf http://dx.doi.org/10.1109/INFOCOM.2008.4544592}, year = {2008}, date = {2008-04-01}, booktitle = {Proc. IEEE INFOCOM Workshop on Mission Critical Networks}, pages = {1-6}, address = {Phoenix, Arizona}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Okorafor, U N; Kundur, D A Secure Integrated Routing and Localization Scheme for Broadband Mission Critical Networks Inproceedings Proc. IEEE INFOCOM Workshop on Mission Critical Networks, pp. 1-6, Phoenix, Arizona, 2008, (Best paper award finalist.). @inproceedings{OkoKunMCN08a, title = {A Secure Integrated Routing and Localization Scheme for Broadband Mission Critical Networks}, author = {U N Okorafor and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunMCN08.pdf http://dx.doi.org/10.1109/INFOCOM.2008.4544580}, year = {2008}, date = {2008-04-01}, booktitle = {Proc. IEEE INFOCOM Workshop on Mission Critical Networks}, pages = {1-6}, address = {Phoenix, Arizona}, note = {Best paper award finalist.}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Kundur, D Coordination and Selfishness in Attacks on Visual Sensor Networks Inproceedings Proc. IEEE Wireless Communications & Networking Conference (WCNC), pp. 2391-2396, Las Vegas, Nevada, 2008. @inproceedings{CzaKunWCNC08, title = {Coordination and Selfishness in Attacks on Visual Sensor Networks}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunWCNC08.pdf http://dx.doi.org/10.1109/WCNC.2008.421}, year = {2008}, date = {2008-03-01}, booktitle = {Proc. IEEE Wireless Communications & Networking Conference (WCNC)}, pages = {2391-2396}, address = {Las Vegas, Nevada}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |