Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

New Traceback Approach Deployment in Smart Mesh Microgrids against DoS Attacks

Version 1 : Received: 19 August 2022 / Approved: 22 August 2022 / Online: 22 August 2022 (11:16:04 CEST)

How to cite: Gassara, M.; Gassara, B. New Traceback Approach Deployment in Smart Mesh Microgrids against DoS Attacks. Preprints 2022, 2022080382. https://doi.org/10.20944/preprints202208.0382.v1 Gassara, M.; Gassara, B. New Traceback Approach Deployment in Smart Mesh Microgrids against DoS Attacks. Preprints 2022, 2022080382. https://doi.org/10.20944/preprints202208.0382.v1

Abstract

Today's major challenge for smart Microgrids is to ensure the security of communications in a large number of changing data sets that are vulnerable to attacks by denial of services in constant evolution. The Internet Protocol Traceback defines a set of methods that help identify the source of an attack with minimal requirements for memory and processing. However, the concept of Traceback is not yet being used in smart Microgrids. As a result, the main challenge of this article is to incorporate a new Traceback approach into the cybernetic system of a smart mesh Microgrid, which can be tested using a network simulator (NS-3) based on delay, debit, and packet loss rate parameters. In fact, the simulation results show the efficacy of this approach compared to others existing in the literature. Furthermore, using the proposed Traceback technique and the mesh nodes, we were able to create a smart meshed Microgrid. Moreover, using the Traceback approach given for merging Intel Galileo Gen.1 nodes with the Compex WLE200NX.11a/b/g/n to establish a secure test bench, which is deployed as a prototype at the Sfax Digital Research Center in Tunisia, we were able to create an intelligent Microgrid. In fact, by identifying all attack vectors and revealing their origins, we could boost the efficiency of our operation by 100%.

Keywords

IP traceback; smart mesh Microgrid; NS-3; real secure testbed

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.