{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:05:55Z","timestamp":1762560355078,"version":"build-2065373602"},"reference-count":52,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,1,26]],"date-time":"2020-01-26T00:00:00Z","timestamp":1579996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006013","name":"United Arab Emirates University","doi-asserted-by":"publisher","award":["UPAR 31N226"],"award-info":[{"award-number":["UPAR 31N226"]}],"id":[{"id":"10.13039\/501100006013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this paper, a false data injection prevention protocol (FDIPP) for smart grid distribution systems is proposed. The protocol is designed to work over a novel hierarchical communication network architecture that matches the distribution system hierarchy and its vast number of entities. The proposed protocol guarantees both system and data integrity via preventing packet injection, duplication, alteration, and rogue node access. Therefore, it prevents service disruption or damaging power network assets due to drawing the wrong conclusions about the current operating status of the power grid. Moreover, the impact of the FDIPP protocol on communication network performance is studied using intensive computer simulations. The simulation study shows that the proposed communication architecture is scalable and meets the packet delay requirements of inter-substation communication as mandated by IEC 61850-90-1 with a minimal packet loss while the security overhead of FDIPP is taken into account.<\/jats:p>","DOI":"10.3390\/s20030679","type":"journal-article","created":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T07:41:11Z","timestamp":1580110871000},"page":"679","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5217-9469","authenticated-orcid":false,"given":"Hosam","family":"Hittini","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, UAE University, Al-Ain, Abu Dhabi 15551, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9639-7684","authenticated-orcid":false,"given":"Atef","family":"Abdrabou","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, UAE University, Al-Ain, Abu Dhabi 15551, UAE"}]},{"given":"Liren","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Physics and Electronic Science, Shandong Normal University, Jinan 250014, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,26]]},"reference":[{"key":"ref_1","unstructured":"(2014). The Smart Grid Interoperability Panel\u2014Smart Grid Cybersecurity Committee. Guidelines for Smart Grid Cybersecurity, National Institute of Standards and Technology. Technical Report."},{"key":"ref_2","unstructured":"Jin, D., Nicol, D.M., and Yan, G. (2011, January 11\u201314). An event buffer flooding attack in DNP3 controlled SCADA systems. Proceedings of the WSC \u201911 Winter Simulation Conference, Phoenix, AZ, USA."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kosut, O., Jia, L., Thomas, R.J., and Tong, L. (2010, January 4\u20136). Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures. Proceedings of the First IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MA, USA.","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hittini, H., Abdrabou, A., and Zhang, L. (2016, January 28\u201330). SADSA: Security aware distribution system architecture for smart grid applications. Proceedings of the 12th International Conference on Innovations in Information Technology (IIT), Al Ain, UAE.","DOI":"10.1109\/INNOVATIONS.2016.7880028"},{"key":"ref_5","unstructured":"(2010). Communication Networks and Systems for Power Utility Automation\u2014Part 90-1: Use of IEC 61850 for the Communication between Substation, International Electrotechnical Commission. Technical Report; IEC\/TR 61850-90-1."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Greer, C., Wollman, D.A., Prochaska, D.E., Boynton, P.A., Mazer, J.A., Nguyen, C.T., FitzPatrick, G.J., Nelson, T.L., Koepke, G.H., and Hefner, A.R. (2014). NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, National Institute of Standards and Technology, Engineering Laboratory. Technical Report.","DOI":"10.6028\/NIST.SP.1108r3"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","article-title":"Cyber security in the Smart Grid: Survey and challenges","volume":"57","author":"Wang","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1524","DOI":"10.1016\/j.egypro.2012.02.276","article-title":"Architecture Design For Smart Grid","volume":"17","author":"Cunjiang","year":"2012","journal-title":"Energy Procedia"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","article-title":"A survey on the communication architectures in smart grid","volume":"55","author":"Wang","year":"2011","journal-title":"Comput. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.future.2011.04.014","article-title":"A survey of communication\/networking in Smart Grids","volume":"28","author":"Gao","year":"2012","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Liang, H., Abdrabou, A., and Zhuang, W. (May, January 27). Stochastic information management for voltage regulation in smart distribution systems. Proceedings of the IEEE INFOCOM 2014\u2013IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6848213"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MCE.2018.2880852","article-title":"Security Analysis of Smart Grids: Successes and Challenges","volume":"8","author":"Singh","year":"2019","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Callegari, C., De Pietro, S., Giordano, S., Pagano, M., and Procissi, G. (2013, January 13\u201315). A Distributed Privacy-Aware Architecture for Communication in Smart Grids. Proceedings of the IEEE International Conference on High Performance Computing and Communications (HPCC), Zhangjiajie, China.","DOI":"10.1109\/HPCC.and.EUC.2013.228"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhang, T., Lin, W., Wang, Y., Deng, S., Shi, C., and Chen, L. (2010, January 24\u201328). The design of information security protection framework to support smart grid. Proceedings of the IEEE International Conference on Power System Technology (POWERCON), Hangzhou, China.","DOI":"10.1109\/POWERCON.2010.5666681"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.2010.5621968","article-title":"A secure decentralized data-centric information infrastructure for smart grid","volume":"48","author":"Kim","year":"2010","journal-title":"IEEE Commun. Mag."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","article-title":"Malicious Data Attacks on the Smart Grid","volume":"2","author":"Kosut","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TSG.2013.2245155","article-title":"Smart Grid Data Integrity Attacks","volume":"4","author":"Giani","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Li, F., and Luo, B. (2012, January 5\u20138). Preserving data integrity for smart grid data aggregation. Proceedings of the IEEE Third International Conference on Smart Grid Communications (SmartGridComm), Tainan, Taiwan.","DOI":"10.1109\/SmartGridComm.2012.6486011"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Guo, Y., Ten, C.W., and Jirutitijaroen, P. (2011, January 12\u201314). Data integrity validation framework for distribution system operations. Proceedings of the CSIIRW\u201911: Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA.","DOI":"10.1145\/2179298.2179382"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bhattarai, S., Ge, L., and Yu, W. (2012, January 10\u201315). A novel architecture against false data injection attacks in smart grid. Proceedings of the ICC 2012\u2014IEEE International Conference on Communications, Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6364511"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/JIOT.2017.2709252","article-title":"Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_22","first-page":"70","article-title":"A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability","volume":"4","author":"Farraj","year":"2018","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.1109\/JIOT.2017.2709252","article-title":"Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1225","DOI":"10.1109\/TSG.2017.2761804","article-title":"Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors","volume":"10","author":"Ni","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"110835","DOI":"10.1109\/ACCESS.2019.2933020","article-title":"Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach","volume":"7","author":"An","year":"2019","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1109\/TIFS.2019.2928207","article-title":"Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids","volume":"15","author":"Kurt","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Garg, S., Kaur, K., Kaddoum, G., Rodrigues, J.J.P.C., and Guizani, M. (2019). Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Trans. Ind. Inf.","DOI":"10.1109\/GLOBECOM38437.2019.9013270"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Garg, S., Kaur, K., Kaddoum, G., and Choo, K.R. (2019). Towards Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2019.2942271"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1109\/TIFS.2019.2938875","article-title":"SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities","volume":"15","author":"Li","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","unstructured":"Cleveland, F. (2012). IEC TC57 WG15: IEC 62351 Security Standards for the Power System Information Infrastructure, International Electrotechnical Commission. White Paper."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Hahn, A., and Govindarasu, M. (2013, January 8\u201310). Model-Based Intrustion Detection for the Smart Grid (MINDS). Proceedings of the CSIIRW \u201913: Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, USA.","DOI":"10.1145\/2459976.2460007"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1068","DOI":"10.1109\/TPWRD.2016.2603339","article-title":"Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks","volume":"32","author":"Yang","year":"2017","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TSG.2013.2294473","article-title":"Integrated Anomaly Detection for Cyber Security of the Substations","volume":"5","author":"Hong","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Hayes, G., and El-Khatib, K. (2013, January 19\u201321). Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. Proceedings of the Third International Conference on Communications and Information Technology (ICCIT), Beirut, Lebanon.","DOI":"10.1109\/ICCITechnology.2013.6579545"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.1109\/TII.2016.2587883","article-title":"Securing DNP3 Broadcast Communications in SCADA Systems","volume":"12","author":"Amoah","year":"2016","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TII.2011.2123903","article-title":"Communication Infrastructures for Distributed Control of Power Distribution Networks","volume":"7","author":"Yang","year":"2011","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/JSYST.2014.2304291","article-title":"A Wireless Communication Architecture for Smart Grid Distribution Networks","volume":"10","author":"Abdrabou","year":"2016","journal-title":"IEEE Syst. J."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MWC.2010.5416357","article-title":"IEEE 802.11s: The WLAN Mesh Standard","volume":"17","author":"Hiertz","year":"2010","journal-title":"Wirel. Commun. IEEE"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Dang, Q. (2015). Secure Hash Standard (SHS), Information Technology Laboratory.","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Genkin, D., Shamir, A., and Tromer, E. (2014). RSA key extraction via low-bandwidth acoustic cryptanalysis. Advances in Cryptology\u2013CRYPTO 2014, Springer.","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TPDS.2012.164","article-title":"Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs","volume":"24","author":"Fan","year":"2013","journal-title":"IEEE Transa. Parallel Distrib. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/978-3-642-14992-4_16","article-title":"How to Evaluate the Security of Real-Life Cryptographic Protocols?","volume":"6054","author":"Matsuo","year":"2010","journal-title":"Financ. Cryptog. Data Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_44","unstructured":"Bellare, M., and Rogaway, P. (1993, January 22\u201326). Entity authentication and key distribution. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_45","unstructured":"Kupser, D., Mainka, C., Schwenk, J., and Somorovsky, J. (2015, January 10\u201311). How to Break {XML} Encryption\u2013Automatically. Proceedings of the 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), Washington, DC, USA."},{"key":"ref_46","unstructured":"Cremers, C.J.F. (2006). Scyther: Semantics and Verification of Security Protocols, Eindhoven University of Technology."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCAS.2008.915504","article-title":"Wireless LAN Comes of Age: Understanding the IEEE 802.11n Amendment","volume":"8","author":"Paul","year":"2008","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_48","unstructured":"(2001). Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Further Higher-Speed Physical Layer Extension in the 2.4 GHz Band. IEEE Std 802.11g\/D1.1, IEEE."},{"key":"ref_49","first-page":"45","article-title":"Performance evaluation of wireless networks speed depending on the encryption","volume":"42","author":"Krausz","year":"2013","journal-title":"Ann. Math. Inform."},{"key":"ref_50","unstructured":"He, B., and Nahrstedt, K. (2006, January 3\u20136). An integrated solution to delay and security support in wireless networks. Proceedings of the IEEE Wireless Communications and Networking Conference, Las Vegas, NV, USA."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"2536","DOI":"10.1109\/JSYST.2015.2424702","article-title":"An Enhanced WLAN Security System with FPGA Implementation for Multimedia Applications","volume":"11","author":"Hayajneh","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., and Jetcheva, J. (1998, January 25\u201330). A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking, MobiCom \u201998, Dallas, TX, USA.","DOI":"10.1145\/288235.288256"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/3\/679\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:20:40Z","timestamp":1760361640000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/3\/679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,26]]},"references-count":52,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["s20030679"],"URL":"https:\/\/doi.org\/10.3390\/s20030679","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,1,26]]}}}