2023
DOI: 10.32604/cmc.2023.032694
|View full text |Cite
|
Sign up to set email alerts
|

Central Aggregator Intrusion Detection System for Denial of Service Attacks

Abstract: Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…In addition to detection methods, the literature also discusses strategies to mitigate the effects of DDoS attacks. For example, a Central Aggregator-Intrusion Detection System (CA-IDS) was proposed for EVs, noted for its higher throughput, lower jitter, and accuracy [108]. This system monitors and analyzes incoming traffic to EVs, effectively identifying and blocking malicious vehicles.…”
Section: Dos and Ddos Attacks In V2x Communication Scenariosmentioning
confidence: 99%
“…In addition to detection methods, the literature also discusses strategies to mitigate the effects of DDoS attacks. For example, a Central Aggregator-Intrusion Detection System (CA-IDS) was proposed for EVs, noted for its higher throughput, lower jitter, and accuracy [108]. This system monitors and analyzes incoming traffic to EVs, effectively identifying and blocking malicious vehicles.…”
Section: Dos and Ddos Attacks In V2x Communication Scenariosmentioning
confidence: 99%
“…The impact of vehicular bot-based DDoS attacks was measured based on the packet delivery ratio, packet loss ratio, throughput, jitter, and end-to-end delay by varying the number of bots, DDoS rate, and max bulk rate. By using NS-3, the mentioned variables can be used to analyze the efficiency and performance of the network [1,28].…”
Section: Performance Metricsmentioning
confidence: 99%