Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/342022
Title: Design of intrusion detection system in wireless networked closed loop control system
Researcher: Benisha, R B
Guide(s): Raja Ratna, S
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Cyberspace
Wireless network
University: Anna University
Completed Date: 2021
Abstract: Due to an increase in growth of the wireless networks, protecting newlinethe network from malicious activities has become greater importance. As a wireless network is constructed on an open space, the intruders can easily indulge in corruption activities. The intruder monitors the activities in the network to prevent the users from accessing network resources and also from communication. Different types of attacks are obtained in the network to prevent the users from using specified resources of the network. The Interruption attack, Bias Injection attack, and Power System attack are the three different types of attacks that are mainly occurring in the Supervisory Control and Data Acquisition (SCADA) network at different layers. These attacks interfere with the transmission and reception of the Physical layer, Medium Access Control (MAC) layer and Network layer in the wireless medium. An interruption attack is occurred by creating traffic, time delay, high-level noise and thereby effectively corrupting the packets at the physical layer. Bias Injection attack modifies the user information and transmits the altered information to the receiver at the MAC layer. Power System attacks occur only in the transmission of power values, thereby injecting false data during transmission at the Network layer. Consequently, the attackers block or alter data from successful data reception. Due to the distortions in the packet loss, the detection rate and accuracy are lowered with higher false-positive rates. The main objective of attackers is to block the information during transmission or reception of packets, also to corrupt the packets and inject false data to the receiver side. The presence of these attacks degrades the performance of the SCADA network and its services. If multiple attackers collude together, the attack becomes extremely serious. As intrusion is a serious threat to network security, it should be efficiently handled. Hence, newline newline
Pagination: xxx,219 p.
URI: http://hdl.handle.net/10603/342022
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File23.71 kBAdobe PDFView/Open
02_certificates.pdf95.5 kBAdobe PDFView/Open
03_vivaproceedings.pdf160.56 kBAdobe PDFView/Open
04_bonafidecertificate.pdf131.14 kBAdobe PDFView/Open
05_abstracts.pdf15.09 kBAdobe PDFView/Open
06_acknowledgements.pdf160.26 kBAdobe PDFView/Open
07_contents.pdf11.24 kBAdobe PDFView/Open
08_listoftables.pdf4.66 kBAdobe PDFView/Open
09_listoffigures.pdf10.39 kBAdobe PDFView/Open
10_listofabbreviations.pdf22.1 kBAdobe PDFView/Open
11_chapter1.pdf64.87 kBAdobe PDFView/Open
12_chapter2.pdf81.41 kBAdobe PDFView/Open
13_chapter3.pdf949.23 kBAdobe PDFView/Open
14_chapter4.pdf1.07 MBAdobe PDFView/Open
15_chapter5.pdf720.18 kBAdobe PDFView/Open
16_conclusion.pdf31.03 kBAdobe PDFView/Open
17_references.pdf492.85 kBAdobe PDFView/Open
18_listofpublications.pdf43.07 kBAdobe PDFView/Open
80_recommendation.pdf76.29 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: