Skip to main content

Traffic Rerouting Strategy against Jamming Attacks for Islanded Microgrid

  • Conference paper
Book cover Advanced Computer Science and Information Technology (AST 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 195))

Abstract

In this paper, we design a communication framework using wireless paradigm for multiagent-based islanded microgrid operation and control. The vulnerability against radio interference attacks is fatal in the microgrid as an energy infrastructure. Thus, the ability to deal with radio interference attacks and maintain an acceptable level of service degradation in presence of the attacks is needed in the design of the communication framework. To solve the problem, we propose a traffic rerouting scheme in the design infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lasseter, R.H.: Microgrids. In: Proc. of Power Engineering Society Winter Meeting, pp. 146–149. ACM Press, New York (2001)

    Google Scholar 

  2. Kim, J.-Y., Kim, S.-K., Park, J.-H.: Contribution of an Energy Storage System for Stabilizing a Microgrid During Islanded Operation. J. Electr. Eng. Technol. 2, 194–200 (2009)

    Article  Google Scholar 

  3. Kim, J.-Y., Jeon, J.-H., Kim, S.-K., Cho, C., Park, J.-H., Kim, H.-M., Nam, K.-Y.: Cooperative Control Strategy of Energy Storage System and Microsources for Stabilizing the Microgrid during Islanded Operation. IEEE Trans. on Power Electronics 12, 3037–3048 (2010)

    Google Scholar 

  4. Jeon, J.-H., Kim, J.-Y., Kim, H.-M., Kim, S.-K., Cho, C., Kim, J.-M., Ahn, J.-B., Nam, K.-Y.: Development of Hardware In-the-Loop Simulation System for Testing Operation and Control Functions of Microgrid. IEEE Trans. on Power Electronics 25, 2919–2929 (2010)

    Article  Google Scholar 

  5. Kim, H.-M., Kinoshita, T.A.: New Challenge of Microgrid Operation. Commun. Comput. Inf. Sci. 78, 250–260 (2010)

    Google Scholar 

  6. Dimeas, A.L., Hatziargyriou, N.D.: Operation of a Multiagent System for Microgrid Control. IEEE Trans. Power System 3, 1147–1455 (2005)

    Google Scholar 

  7. Dimeas, A.L., Hatziargyriou, N.D.: Agent Based Control for Microgrids. In: Proc. of IEEE Power Energy Society General Meeting, pp. 1–5. IEEE Press, Los Alamitos (2007)

    Google Scholar 

  8. Kim, H.-M., Kinoshita, T., Lim, Y., Kim, T.-H.: A Bankruptcy Problem Approach to Load-Shedding in Multiagent-based Microgrid Operation. MDPI Sensors 10, 8888–8898 (2010)

    Article  Google Scholar 

  9. Kim, H.-M., Kinoshita, T.A.: Multiagent System for Microgrid Operation in the Grid-interconnected Mode. J. Electr. Eng. Technol. 2, 246–254 (2010)

    Article  Google Scholar 

  10. Kim, H.-M., Kinoshita, T.A., Shin, M.-C.: A Multiagent System for Autonomous Operation of Islanded Microgrid based on a Power Market Environment. MDPI Energies 12, 1972–1990 (2010)

    Article  Google Scholar 

  11. Kim, H.-M., Kinoshita, T., Lim, Y.: Talmudic Approach to Load-shedding of Islanded Microgrid Operation based on Multiagent System. Journal of Electrical Engineering & Technology 6, 284–292 (2011)

    Article  Google Scholar 

  12. Kim, H.-M., Wei, W., Kinoshita, T.: A New Modified CNP for Autonomous Microgrid Operation based on Multiagent System. Journal of Electrical Engineering & Technology 6, 139–146 (2011)

    Article  Google Scholar 

  13. Huang, F., Yang, Y., He, L.: A Flow-based Network Monitoring Framework for Wireless Mesh Networks. IEEE Wireless Communications 14, 48–55 (2007)

    Article  Google Scholar 

  14. Jiang, S., Xue, Y.: Providing Survivability against Jamming Attack for Multi-radio Multi-channel Wireless Mesh Networks. Elsevier Journal of Network and Computer Applications 34, 443–454 (2011)

    Article  Google Scholar 

  15. Xu, W., Trapper, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proc. of Intl. Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 46–57. ACM Press, New York (2005)

    Google Scholar 

  16. Draft Amendment to Standard for Information Technology - Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking. IEEE P802.11s/D3.0 (2009)

    Google Scholar 

  17. Hiertz, G.R., Denteneer, D., Max, S., Taori, R., Cardona, J., Berlemann, L., Walke, B.: IEEE 802.11s: The WLAN Mesh Standard. IEEE Wireless Communications 17, 104–111 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lim, Y., Kim, HM., Kinoshita, T., Kim, Th. (2011). Traffic Rerouting Strategy against Jamming Attacks for Islanded Microgrid. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Computer Science and Information Technology. AST 2011. Communications in Computer and Information Science, vol 195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24267-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24267-0_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24266-3

  • Online ISBN: 978-3-642-24267-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics