Research Article

A Distributed Intrusion Detection Scheme about Communication Optimization in Smart Grid

Table 2

The detected information.

Detected informationCollected attack behavior

Sensor sensed dataFabricate information attack
Information sending rateEnergy exhausting attack
Information mismatch rateMessage alter attack
Information receiving rateSink hole attack
Information dropping rateBlack hole attack, select forward attack
Information sending powerWorm hole attack, hello attack