Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network

Providing adequate security measure during data transmission is one of the essential requirements of smart grid communication network (SGCN). In this paper, a novel trust management model is proposed to alleviate packet dropping attack between data aggregation points of SGCN. The concept of probabil...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computing 2017, Vol.99 (1), p.81-106
Hauptverfasser: Pugalendhi, GaneshKumar, Velusamy, Durgadevi, Paul, Anand, Kim, Ku-Jin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 106
container_issue 1
container_start_page 81
container_title Computing
container_volume 99
creator Pugalendhi, GaneshKumar
Velusamy, Durgadevi
Paul, Anand
Kim, Ku-Jin
description Providing adequate security measure during data transmission is one of the essential requirements of smart grid communication network (SGCN). In this paper, a novel trust management model is proposed to alleviate packet dropping attack between data aggregation points of SGCN. The concept of probability theory is used to calculate trust of every node in the network before transmitting the packet. Trust evaluation is conducted in four stages viz., Direct, Indirect, Integrated and Overall trust and in each stage, suitable equations are suggested to measure the trust of each node. A novel technique based on fuzzy set theory is used to route the packet through the trusted channel. Hop count, reliability and capacity of the link are the parameters considered for constructing if-then rules and membership function. A qualitative reasoning is performed using inference mechanism and a defuzzication strategy is applied on the calculated trust value to make decision. Simulations are carried out to evaluate the performance of the proposed approach by varying the trust threshold and malicious nodes. From the experiments, it is observed that for all the metrics, the proposed trusted routing using fuzzy theory helps to improve the network performance with much reliable communication and reduced packet loss.
doi_str_mv 10.1007/s00607-016-0518-5
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1879984912</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1879984912</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-e84fcef686a94fde8392826f9b0c71d5aeae174d1bf1a8f405153b2ea5645233</originalsourceid><addsrcrecordid>eNp1kUFr3DAQhUVIoZttfkBvglxyUTOyJVs-htCkgYVecuhNyPbYKLuWHEmmZI_95dHiHEogp4GZ7z1m5hHyncMPDlDfRIAKaga8YiC5YvKMbLgoKyZB1udkA8CBCSX_fCUXMT4DQFGqZkP-3S_H4ytrTcSeprDElGvwS7JupMnTySY7moR0Nt0eE-2Dn-fTzKSUO7TF9BfR0d4kQ804Bsy09Y7O3roUqXU0TiYkOgbb085P0-JstyIua33YfyNfBnOIePlet-Tp_ufT3S-2-_3weHe7Y10pmsRQiaHDoVKVacTQoyqbQhXV0LTQ1byXBg3yWvS8HbhRg8hvkGVboJGVkEVZbsn1ajsH_7JgTHqyscPDwTj0S9Rc1U2jRMOLjF59QJ_9ElxeLlOylrUqlMwUX6ku-BgDDnoONt_6qjnoUyh6DUXnUPQpFH3SFKsmZtaNGP5z_lT0Bnptkjk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1857578285</pqid></control><display><type>article</type><title>Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network</title><source>Business Source Complete</source><source>SpringerLink Journals - AutoHoldings</source><creator>Pugalendhi, GaneshKumar ; Velusamy, Durgadevi ; Paul, Anand ; Kim, Ku-Jin</creator><creatorcontrib>Pugalendhi, GaneshKumar ; Velusamy, Durgadevi ; Paul, Anand ; Kim, Ku-Jin</creatorcontrib><description>Providing adequate security measure during data transmission is one of the essential requirements of smart grid communication network (SGCN). In this paper, a novel trust management model is proposed to alleviate packet dropping attack between data aggregation points of SGCN. The concept of probability theory is used to calculate trust of every node in the network before transmitting the packet. Trust evaluation is conducted in four stages viz., Direct, Indirect, Integrated and Overall trust and in each stage, suitable equations are suggested to measure the trust of each node. A novel technique based on fuzzy set theory is used to route the packet through the trusted channel. Hop count, reliability and capacity of the link are the parameters considered for constructing if-then rules and membership function. A qualitative reasoning is performed using inference mechanism and a defuzzication strategy is applied on the calculated trust value to make decision. Simulations are carried out to evaluate the performance of the proposed approach by varying the trust threshold and malicious nodes. From the experiments, it is observed that for all the metrics, the proposed trusted routing using fuzzy theory helps to improve the network performance with much reliable communication and reduced packet loss.</description><identifier>ISSN: 0010-485X</identifier><identifier>EISSN: 1436-5057</identifier><identifier>DOI: 10.1007/s00607-016-0518-5</identifier><language>eng</language><publisher>Vienna: Springer Vienna</publisher><subject>Access control ; Analysis ; Artificial Intelligence ; Communication ; Communication networks ; Communications networks ; Computer Appl. in Administrative Data Processing ; Computer Communication Networks ; Computer networks ; Computer Science ; Cybersecurity ; Data encryption ; Data management ; Data transmission ; Electricity ; Electricity distribution ; Fuzzy logic ; Fuzzy sets ; Information Systems Applications (incl.Internet) ; Mathematical analysis ; Mathematical models ; Network security ; Networks ; Packets (communication) ; Performance evaluation ; Probability ; Public Key Infrastructure ; Routing (telecommunications) ; Sensors ; Smart grid technology ; Smart meters ; Software Engineering ; Studies ; Trust ; Wide area networks ; Wireless communications ; Wireless networks</subject><ispartof>Computing, 2017, Vol.99 (1), p.81-106</ispartof><rights>Springer-Verlag Wien 2016</rights><rights>Computing is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-e84fcef686a94fde8392826f9b0c71d5aeae174d1bf1a8f405153b2ea5645233</citedby><cites>FETCH-LOGICAL-c349t-e84fcef686a94fde8392826f9b0c71d5aeae174d1bf1a8f405153b2ea5645233</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00607-016-0518-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00607-016-0518-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Pugalendhi, GaneshKumar</creatorcontrib><creatorcontrib>Velusamy, Durgadevi</creatorcontrib><creatorcontrib>Paul, Anand</creatorcontrib><creatorcontrib>Kim, Ku-Jin</creatorcontrib><title>Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network</title><title>Computing</title><addtitle>Computing</addtitle><description>Providing adequate security measure during data transmission is one of the essential requirements of smart grid communication network (SGCN). In this paper, a novel trust management model is proposed to alleviate packet dropping attack between data aggregation points of SGCN. The concept of probability theory is used to calculate trust of every node in the network before transmitting the packet. Trust evaluation is conducted in four stages viz., Direct, Indirect, Integrated and Overall trust and in each stage, suitable equations are suggested to measure the trust of each node. A novel technique based on fuzzy set theory is used to route the packet through the trusted channel. Hop count, reliability and capacity of the link are the parameters considered for constructing if-then rules and membership function. A qualitative reasoning is performed using inference mechanism and a defuzzication strategy is applied on the calculated trust value to make decision. Simulations are carried out to evaluate the performance of the proposed approach by varying the trust threshold and malicious nodes. From the experiments, it is observed that for all the metrics, the proposed trusted routing using fuzzy theory helps to improve the network performance with much reliable communication and reduced packet loss.</description><subject>Access control</subject><subject>Analysis</subject><subject>Artificial Intelligence</subject><subject>Communication</subject><subject>Communication networks</subject><subject>Communications networks</subject><subject>Computer Appl. in Administrative Data Processing</subject><subject>Computer Communication Networks</subject><subject>Computer networks</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Data management</subject><subject>Data transmission</subject><subject>Electricity</subject><subject>Electricity distribution</subject><subject>Fuzzy logic</subject><subject>Fuzzy sets</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>Network security</subject><subject>Networks</subject><subject>Packets (communication)</subject><subject>Performance evaluation</subject><subject>Probability</subject><subject>Public Key Infrastructure</subject><subject>Routing (telecommunications)</subject><subject>Sensors</subject><subject>Smart grid technology</subject><subject>Smart meters</subject><subject>Software Engineering</subject><subject>Studies</subject><subject>Trust</subject><subject>Wide area networks</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>0010-485X</issn><issn>1436-5057</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kUFr3DAQhUVIoZttfkBvglxyUTOyJVs-htCkgYVecuhNyPbYKLuWHEmmZI_95dHiHEogp4GZ7z1m5hHyncMPDlDfRIAKaga8YiC5YvKMbLgoKyZB1udkA8CBCSX_fCUXMT4DQFGqZkP-3S_H4ytrTcSeprDElGvwS7JupMnTySY7moR0Nt0eE-2Dn-fTzKSUO7TF9BfR0d4kQ804Bsy09Y7O3roUqXU0TiYkOgbb085P0-JstyIua33YfyNfBnOIePlet-Tp_ufT3S-2-_3weHe7Y10pmsRQiaHDoVKVacTQoyqbQhXV0LTQ1byXBg3yWvS8HbhRg8hvkGVboJGVkEVZbsn1ajsH_7JgTHqyscPDwTj0S9Rc1U2jRMOLjF59QJ_9ElxeLlOylrUqlMwUX6ku-BgDDnoONt_6qjnoUyh6DUXnUPQpFH3SFKsmZtaNGP5z_lT0Bnptkjk</recordid><startdate>2017</startdate><enddate>2017</enddate><creator>Pugalendhi, GaneshKumar</creator><creator>Velusamy, Durgadevi</creator><creator>Paul, Anand</creator><creator>Kim, Ku-Jin</creator><general>Springer Vienna</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L.0</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>2017</creationdate><title>Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network</title><author>Pugalendhi, GaneshKumar ; Velusamy, Durgadevi ; Paul, Anand ; Kim, Ku-Jin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-e84fcef686a94fde8392826f9b0c71d5aeae174d1bf1a8f405153b2ea5645233</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Access control</topic><topic>Analysis</topic><topic>Artificial Intelligence</topic><topic>Communication</topic><topic>Communication networks</topic><topic>Communications networks</topic><topic>Computer Appl. in Administrative Data Processing</topic><topic>Computer Communication Networks</topic><topic>Computer networks</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Data management</topic><topic>Data transmission</topic><topic>Electricity</topic><topic>Electricity distribution</topic><topic>Fuzzy logic</topic><topic>Fuzzy sets</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>Network security</topic><topic>Networks</topic><topic>Packets (communication)</topic><topic>Performance evaluation</topic><topic>Probability</topic><topic>Public Key Infrastructure</topic><topic>Routing (telecommunications)</topic><topic>Sensors</topic><topic>Smart grid technology</topic><topic>Smart meters</topic><topic>Software Engineering</topic><topic>Studies</topic><topic>Trust</topic><topic>Wide area networks</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pugalendhi, GaneshKumar</creatorcontrib><creatorcontrib>Velusamy, Durgadevi</creatorcontrib><creatorcontrib>Paul, Anand</creatorcontrib><creatorcontrib>Kim, Ku-Jin</creatorcontrib><collection>CrossRef</collection><collection>Global News &amp; ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pugalendhi, GaneshKumar</au><au>Velusamy, Durgadevi</au><au>Paul, Anand</au><au>Kim, Ku-Jin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network</atitle><jtitle>Computing</jtitle><stitle>Computing</stitle><date>2017</date><risdate>2017</risdate><volume>99</volume><issue>1</issue><spage>81</spage><epage>106</epage><pages>81-106</pages><issn>0010-485X</issn><eissn>1436-5057</eissn><abstract>Providing adequate security measure during data transmission is one of the essential requirements of smart grid communication network (SGCN). In this paper, a novel trust management model is proposed to alleviate packet dropping attack between data aggregation points of SGCN. The concept of probability theory is used to calculate trust of every node in the network before transmitting the packet. Trust evaluation is conducted in four stages viz., Direct, Indirect, Integrated and Overall trust and in each stage, suitable equations are suggested to measure the trust of each node. A novel technique based on fuzzy set theory is used to route the packet through the trusted channel. Hop count, reliability and capacity of the link are the parameters considered for constructing if-then rules and membership function. A qualitative reasoning is performed using inference mechanism and a defuzzication strategy is applied on the calculated trust value to make decision. Simulations are carried out to evaluate the performance of the proposed approach by varying the trust threshold and malicious nodes. From the experiments, it is observed that for all the metrics, the proposed trusted routing using fuzzy theory helps to improve the network performance with much reliable communication and reduced packet loss.</abstract><cop>Vienna</cop><pub>Springer Vienna</pub><doi>10.1007/s00607-016-0518-5</doi><tpages>26</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0010-485X
ispartof Computing, 2017, Vol.99 (1), p.81-106
issn 0010-485X
1436-5057
language eng
recordid cdi_proquest_miscellaneous_1879984912
source Business Source Complete; SpringerLink Journals - AutoHoldings
subjects Access control
Analysis
Artificial Intelligence
Communication
Communication networks
Communications networks
Computer Appl. in Administrative Data Processing
Computer Communication Networks
Computer networks
Computer Science
Cybersecurity
Data encryption
Data management
Data transmission
Electricity
Electricity distribution
Fuzzy logic
Fuzzy sets
Information Systems Applications (incl.Internet)
Mathematical analysis
Mathematical models
Network security
Networks
Packets (communication)
Performance evaluation
Probability
Public Key Infrastructure
Routing (telecommunications)
Sensors
Smart grid technology
Smart meters
Software Engineering
Studies
Trust
Wide area networks
Wireless communications
Wireless networks
title Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T03%3A44%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Fuzzy-based%20trusted%20routing%20to%20mitigate%20packet%20dropping%20attack%20between%20data%20aggregation%20points%20in%20smart%20grid%20communication%20network&rft.jtitle=Computing&rft.au=Pugalendhi,%20GaneshKumar&rft.date=2017&rft.volume=99&rft.issue=1&rft.spage=81&rft.epage=106&rft.pages=81-106&rft.issn=0010-485X&rft.eissn=1436-5057&rft_id=info:doi/10.1007/s00607-016-0518-5&rft_dat=%3Cproquest_cross%3E1879984912%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1857578285&rft_id=info:pmid/&rfr_iscdi=true