You are on page 1of 5

ABSTRACT

In Cyber-Physical Networked Systems (CPNS), any adversary can infuse false estimations into
the controller through traded off sensor hubs, which undermine the security of the framework, as
well as expend system assets. To manage this issue, various in transit separating plans have been
intended for remote sensor systems. Be that as it may, these plans either need flexibility to the
quantity of traded off hubs or rely on upon the statically arranged courses and hub confinement,
which are not reasonable for CPNS. In this research work, we propose False Data Injection
Attack (FDIA), which can channel false infused information successfully and accomplish a high
versatility to the quantity of bargained hubs without depending on static courses and hub
restriction. FDIA receives polynomials rather than Message Authentication Codes (MACs) for
underwriting estimation reports to accomplish versatility to assaults. Every hub stores two sorts
of polynomials: confirmation polynomial and check polynomial, receive from the primitive
polynomial, and utilized for supporting and confirming the estimation reports. Through broad
hypothetical investigation and analyses, our information demonstrates that FDIA accomplishes
better separating limit and versatility to the huge number of traded off hubs in contrast with the
current plans.

i
LIST OF FIGURES

Fig No. FIGURE NAME PAGE No


1 System model of CPNS 1

3.1 Flow of Proposed Plan 16

5.1 Design of network 19


5.2 Naming and Id s Assignment 21
5.3.1 Carousel Attack 22
5.3.2 Carousel Attack 22

5.3.3 Stretch Attack 24


5.3.4 Stretch Attack 25

5.3.5 FDI Attack 26


5.4 Prevention 27
6.1 Energy Consumption of carousel attack 28

6.2 Energy Consumption of stretch attack 29

6.3 Energy Consumption of False Data Injection attack 30

6.4 Energy Consumption after Prevention 31

6.5 Time consumption of carousel attack 33


6.6 Time Consumption of Stretch Attack 33
6.7 Time Consumption of FDI Attack 33
6.8 Time Consumption After Prevention 34

ii
LIST OF TABLES
TABLE No. TABLE NAME PAGE No.

3.1 PROJECT PLAN 17

iii
LIST OF PUBLICATIONS

Sr TITLE AUTHORS NAME OF STATUS


No. JOURNAL/CONFERENCES

1 Survey on 1)Ms. Pooja International Journal of PUBLISHED


En-Route Shukla Engineering Trends and
Filtering Technology volume 31
Schemes for 2)Ms. A.S Number 4 January 2016.
False Data Bhattacharya ISSN-2231-5381
Injection Page No. 214-217
Attack in
CPNS
2 Cluster 1)Ms. Pooja 1st National Conference on PUBLISHED
Organisation Shukla Recent Innovations in
In Cyber Science, Engineering &
Physical 2)Ms. A.S Technology -2016
Network Bhattacharya May 18 ,2016
System for G.H.R.I.E.T.W, Nagpur
Id ISBN-978-93-5254-677-0
Assignments Page No.: 67-70

iv
LIST OF ABBREVIATIONS

ACRONYMS ABBREVIATIONS

CPNS Cyber Physical Network System

CPS Cyber Physical System

FDIA False Data Injection Attack

PCREF Polynomial-based Compromised Resilient En-route Filtering


Schemes

MACs Message Authentication Codes

MANET Mobile ad-hoc Network

EMS Energy Management System

SCADA Supervisory Control and data acquisition system

DOS Denial of Services

EAB En-route Authentication Bitmap

SEF Statistical En-Route Filtering

COS center of stimulus

ECSHA Efficient Cluster Head Algorithm

NED Network Description

You might also like