Research Article
A Distributed Intrusion Detection Scheme about Communication Optimization in Smart Grid
Table 2
The detected information.
| Detected information | Collected attack behavior |
| Sensor sensed data | Fabricate information attack | Information sending rate | Energy exhausting attack | Information mismatch rate | Message alter attack | Information receiving rate | Sink hole attack | Information dropping rate | Black hole attack, select forward attack | Information sending power | Worm hole attack, hello attack |
|
|