2023
DOI: 10.1109/access.2023.3286536
|View full text |Cite
|
Sign up to set email alerts
|

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures

Abstract: The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate of the wireless connection between smart meters in AMI, these infrastructures are considered Low-power and Lossy Networks (LLNs). The routing protocol in an AMI network is crucial for ensuring the availability and timeliness of data transfer. IPv6 Routing Protocol for Low-power and lossy networks (RPL) is an excellent routing option for the AMI communication configurati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 49 publications
0
8
0
Order By: Relevance
“…Sybil attacks are the most common and dangerous routing attacks in smart healthcare, targeting wireless sensor networks by forging device identities to steal patient medical information. Hassan et al [133] and Shaji and Nair [134] define a Sybil attack in smart healthcare as a security threat in which adversaries create multiple fake identities or nodes (Sybil nodes) from a single node in a healthcare network by observing their behavior to gain control or disrupt the communication lines, storage, and operation of an SHS, as well as to affect the overall network performance. A node in the smart healthcare network system provides the victim node with multiple fake identities to perform a single operation multiple times.…”
Section: Sybil Attacksmentioning
confidence: 99%
“…Sybil attacks are the most common and dangerous routing attacks in smart healthcare, targeting wireless sensor networks by forging device identities to steal patient medical information. Hassan et al [133] and Shaji and Nair [134] define a Sybil attack in smart healthcare as a security threat in which adversaries create multiple fake identities or nodes (Sybil nodes) from a single node in a healthcare network by observing their behavior to gain control or disrupt the communication lines, storage, and operation of an SHS, as well as to affect the overall network performance. A node in the smart healthcare network system provides the victim node with multiple fake identities to perform a single operation multiple times.…”
Section: Sybil Attacksmentioning
confidence: 99%
“…Unanticipated trends or deviations in the behavior of the devices within the smart healthcare CPS are indicated by irregularities in the Gini index. Alerts are set off by abrupt spikes or notable deviations, which indicate possible security risks [73]. Trust is evaluated in real time by the GBG-RPL.…”
Section: Utilization Of Gini Index For Trust Assessmentmentioning
confidence: 99%
“…where a i denotes the proportion of flow i in a network. The Gini index idea can be used to evaluate resource allocation and spot potential weaknesses in the context of CPS security [73]. Computational power, bandwidth, and storage are among the resources that are distributed among different system components and entities in CPS.…”
mentioning
confidence: 99%
“…In this section, we verify the performance of the proposed algorithms by some simulations on MATLAB 2022b. We refer to previous work on power Internet of Things routing [44][45][46] and list the main simulation parameters in Table 1. The scale of the network in Section 6.5 is extended from 60 m × 60 m as in Table 1 to 240 m × 240 m. Larger and larger network sizes require more and more network nodes for coverage, so correspondingly, we extend the number of STA nodes from 30 to 120, as shown in Table 1.…”
Section: Simulation Settingsmentioning
confidence: 99%