Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1
Abstract
Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, and Phasor Measurement Units (PMUs), can lead to disastrous results. The vulnerability of the stationary GPS receivers to the Time Synchronization Attacks (TSAs) jeopardizes the GPS timing precision and trust level. In this paper, the PMU receiver clock deviation monitoring method is used. In this method, a deception and fraud reduction algorithm is presented based on clock deviation observations. A multi-layer perceptron neural network is trained to track clock behavior information behavior and maintain a valid trend under time-synchronization attack conditions that can dramatically mimic clock deviation. Finally, the results were compared with a strong and low-memory RE estimator, which is one of the most recent methods of counteracting TSA, as well as an extended Kalman filter and a Luenberger observer. This indicates the good performance of the proposed method.
Authors and Affiliations
Afsaneh Tavasoli,Niloofar Orouji,Mohammad Reza Mosavi,
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density
Satellite communication is considered a significant part of the enemy's communication information in electronic warfare due to its unique features and widespread use in communication systems. Therefore, from the electron...
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)
Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational o...
Mobile botnets detection using deep learning techniques
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment
Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced...
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV
This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located i...