Visible to the public Biblio

Found 288 results

Filters: Keyword is simulation  [Clear All Filters]
2022-05-10
Ahakonye, Love Allen Chijioke, Amaizu, Gabriel Chukwunonso, Nwakanma, Cosmas Ifeanyi, Lee, Jae Min, Kim, Dong-Seong.  2021.  Enhanced Vulnerability Detection in SCADA Systems using Hyper-Parameter-Tuned Ensemble Learning. 2021 International Conference on Information and Communication Technology Convergence (ICTC). :458–461.
The growth of inter-dependency intricacies of Supervisory Control and Data Acquisition (SCADA) systems in industrial operations generates a likelihood of increased vulnerability to malicious threats and machine learning approaches have been extensively utilized in the research for vulnerability detection. Nonetheless, to improve security, an enhanced vulnerability detection using hyper-parameter-tune machine learning is proposed for early detection, classification and mitigation of SCADA communication and transmission networks by classifying benign, or malicious DNS attacks. The proposed scheme, an ensemble optimizer (GentleBoost) upon hyper-parameter tuning, gave a comparative achievement. From the simulation results, the proposed scheme had an outstanding performance within the shortest possible time with an accuracy of 99.49%, 99.23% for precision, and a recall rate of 99.75%. Also, the model was compared to other contemporary algorithms and outperformed all the other algorithms proving to be an approach to keep abreast of the SCADA network vulnerabilities and attacks.
Xu, Zheng, Chen, Ming, Chen, Mingzhe, Yang, Zhaohui, Cang, Yihan, Poor, H. Vincent.  2021.  Physical Layer Security Optimization for MIMO Enabled Visible Light Communication Networks. 2021 IEEE Global Communications Conference (GLOBECOM). :1–6.
This paper investigates the optimization of physical layer security in multiple-input multiple-output (MIMO) enabled visible light communication (VLC) networks. In the considered model, one transmitter equipped with light-emitting diodes (LEDs) intends to send confidential messages to legitimate users while one eavesdropper attempts to eavesdrop on the communication between the transmitter and legitimate users. This security problem is formulated as an optimization problem whose goal is to minimize the sum mean-square-error (MSE) of all legitimate users while meeting the MSE requirement of the eavesdropper thus ensuring the security. To solve this problem, the original optimization problem is first transformed to a convex problem using successive convex approximation. An iterative algorithm with low complexity is proposed to solve this optimization problem. Simulation results show that the proposed algorithm can reduce the sum MSE of legitimate users by up to 40% compared to a conventional zero forcing scheme.
Qian, Lei, Chi, Xuefen, Zhao, Linlin, Chaaban, Anas.  2021.  Secure Visible Light Communications via Intelligent Reflecting Surfaces. ICC 2021 - IEEE International Conference on Communications. :1–6.
Intelligent reflecting surfaces (IRS) can improve the physical layer security (PLS) by providing a controllable wireless environment. In this paper, we propose a novel PLS technique with the help of IRS implemented by an intelligent mirror array for the visible light communication (VLC) system. First, for the IRS aided VLC system containing an access point (AP), a legitimate user and an eavesdropper, the IRS channel gain and a lower bound of the achievable secrecy rate are derived. Further, to enhance the IRS channel gain of the legitimate user while restricting the IRS channel gain of the eavesdropper, we formulate an achievable secrecy rate maximization problem for the proposed IRS-aided PLS technique to find the optimal orientations of mirrors. Since the sensitivity of mirrors’ orientations on the IRS channel gain makes the optimization problem hard to solve, we transform the original problem into a reflected spot position optimization problem and solve it by a particle swarm optimization (PSO) algorithm. Our simulation results show that secrecy performance can be significantly improved by adding an IRS in a VLC system.
Ben, Yanglin, Chen, Ming, Cao, Binghao, Yang, Zhaohui, Li, Zhiyang, Cang, Yihan, Xu, Zheng.  2021.  On Secrecy Sum-Rate of Artificial-Noise-Aided Multi-user Visible Light Communication Systems. 2021 IEEE International Conference on Communications Workshops (ICC Workshops). :1–6.
Recently, the physical layer security (PLS) is becoming an important research area for visible light communication (VLC) systems. In this paper, the secrecy rate performance is investigated for an indoor multi-user visible light communication (VLC) system using artificial noise (AN). In the considered model, all users simultaneously communicate with the legitimate receiver under wiretap channels. The legitimate receiver uses the minimum mean squared error (MMSE) equalizer to detect the received signals. Both lower bound and upper bound of the secrecy rate are obtained for the case that users' signals are uniformly distributed. Simulation results verify the theoretical findings and show the system secrecy rate performance for various positions of illegal eavesdropper.
2022-05-06
Kalyani, Muppalla, Park, Soo-Hyun.  2021.  Ontology based routing path selection mechanism for underwater Internet of Things. 2021 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia). :1—5.
Based on the success of terrestrial Internet of Things (IoT), research has started on Underwater IoT (UIoT). The UIoT describes global network of connected underwater things that interact with water environment and communicate with terrestrial network through the underwater communication technologies. For UIoT device, it is important to choose the channel before transmission. This paper deals with UIoT communication technologies and ontology based path selection mechanism for UIoT.
Qi, Xingyue, Lin, Chuan, Wang, Zhaohui, Du, Jiaxin, Han, Guangjie.  2021.  Proactive Alarming-enabled Path Planning for Multi-AUV-based Underwater IoT Systems. 2021 Computing, Communications and IoT Applications (ComComAp). :263—267.
The ongoing expansion of underwater Internet of Things techniques promote diverse categories of maritime intelligent systems, e.g., Underwater Acoustic Sensor Networks (UASNs), Underwater Wireless Networks (UWNs), especially multiple Autonomous Underwater Vehicle (AUV) based UWNs have produced many civil and military applications. To enhance the network management and scalability, in this paper, the technique of Software-Defined Networking (SDN) technique is introduced, leading to the paradigm of Software-Defined multi-AUV-based UWNs (SD-UWNs). With SD-UWNs, the network architecture is divided into three functional layers: data layer, control layer, and application layer, and the network administration is re-defined by a framework of software-defined beacon. To manage the network, a control model based on artificial potential field and network topology theory is constructed. On account of the efficient data sharing ability of SD-UWNs, a proactive alarming-enabled path planning scheme is proposed, wherein all potential categories of obstacle avoidance scenes are taken into account. Evaluation results indicate that the proposed SD-UWN is more efficient in scheduling the cooperative network function than the traditional approaches and can secure exact path planning.
Diamant, Roee, Casari, Paolo, Tomasin, Stefano.  2021.  Topology-based Secret Key Generation for Underwater Acoustic Networks. 2021 Fifth Underwater Communications and Networking Conference (UComms). :1—5.
We propose a method to let a source and a destination agree on a key that remains secret to a potential eavesdropper in an underwater acoustic network (UWAN). We generate the key from the propagation delay measured over a set of multihop routes: this harvests the randomness in the UWAN topology and turns the slow sound propagation in the water into an advantage for the key agreement protocol. Our scheme relies on a route discovery handshake. During this process, all intermediate relays accumulate message processing delays, so that both the source and the destination can compute the actual propagation delays along each route, and map this information to a string of bits. Finally, via a secret key agreement from the information-theoretic security framework, we obtain an equal set of bits at the source and destination, which is provably secret to a potential eavesdropper located away from both nodes. Our simulation results show that, even for small UWANs of 4 nodes, we obtain 11 secret bits per explored topology, and that the protocol is insensitive to an average node speed of up to 0.5 m/s.
Junqing, Zhang, Gangqiang, Zhang, Junkai, Liu.  2021.  Wormhole Attack Detecting in Underwater Acoustic Communication Networks. 2021 OES China Ocean Acoustics (COA). :647—650.

Because the underwater acoustic communication network transmits data through the underwater acoustic wireless link, the Underwater Acoustic Communication Network is easy to suffer from the external artificial interference, in this paper, the detection algorithm of wormhole attack in Underwater Acoustic Communication Network based on Azimuth measurement technology is studied. The existence of wormhole attack is judged by Azimuth or distance outliers, and the security performance of underwater acoustic communication network is evaluated. The influence of different azimuth direction errors on the detection probability of wormhole attack is analyzed by simulation. The simulation results show that this method has a good detection effect for Underwater Acoustic Communication Network.

2022-05-05
Xue, Nan, Wu, Xiaofan, Gumussoy, Suat, Muenz, Ulrich, Mesanovic, Amer, Dong, Zerui, Bharati, Guna, Chakraborty, Sudipta, Electric, Hawaiian.  2021.  Dynamic Security Optimization for N-1 Secure Operation of Power Systems with 100% Non-Synchronous Generation: First experiences from Hawai'i Island. 2021 IEEE Power Energy Society General Meeting (PESGM). :1—5.

This paper presents some of our first experiences and findings in the ARPA-E project ReNew100, which is to develop an operator support system to enable stable operation of power system with 100% non-synchronous (NS) generation. The key to 100% NS system, as found in many recent studies, is to establish the grid frequency reference using grid-forming (GFM) inverters. In this paper, we demonstrate in Electro-Magnetic-Transient (EMT) simulations, based on Hawai'i big island system with 100% NS capacity, that a system can be operated stably with the help of GFM inverters and appropriate controller parameters for the inverters. The dynamic security optimization (DSO) is introduced for optimizing the inverter control parameters to improve stability of the system towards N-1 contingencies. DSO is verified for five critical N-1 contingencies of big island system identified by Hawaiian Electric. The simulation results show significant stability improvement from DSO. The results in this paper share some insight, and provide a promising solution for operating grid in general with high penetration or 100% of NS generation.

2022-05-03
Xu, Jun, Zhu, Pengcheng, Li, Jiamin, You, Xiaohu.  2021.  Secure Computation Offloading for Multi-user Multi-server MEC-enabled IoT. ICC 2021 - IEEE International Conference on Communications. :1—6.

This paper studies the secure computation offloading for multi-user multi-server mobile edge computing (MEC)-enabled internet of things (IoT). A novel jamming signal scheme is designed to interfere with the decoding process at the Eve, but not impair the uplink task offloading from users to APs. Considering offloading latency and secrecy constraints, this paper studies the joint optimization of communication and computation resource allocation, as well as partial offloading ratio to maximize the total secrecy offloading data (TSOD) during the whole offloading process. The considered problem is nonconvex, and we resort to block coordinate descent (BCD) method to decompose it into three subproblems. An efficient iterative algorithm is proposed to achieve a locally optimal solution to power allocation subproblem. Then the optimal computation resource allocation and offloading ratio are derived in closed forms. Simulation results demonstrate that the proposed algorithm converges fast and achieves higher TSOD than some heuristics.

Ma, Weijun, Fang, Junyuan, Wu, Jiajing.  2021.  Sequential Node Attack of Complex Networks Based on Q-Learning Method. 2021 IEEE International Symposium on Circuits and Systems (ISCAS). :1—5.

The security issue of complex network systems, such as communication systems and power grids, has attracted increasing attention due to cascading failure threats. Many existing studies have investigated the robustness of complex networks against cascading failure from an attacker's perspective. However, most of them focus on the synchronous attack in which the network components under attack are removed synchronously rather than in a sequential fashion. Most recent pioneering work on sequential attack designs the attack strategies based on simple heuristics like degree and load information, which may ignore the inside functions of nodes. In the paper, we exploit a reinforcement learning-based sequential attack method to investigate the impact of different nodes on cascading failure. Besides, a candidate pool strategy is proposed to improve the performance of the reinforcement learning method. Simulation results on Barabási-Albert scale-free networks and real-world networks have demonstrated the superiority and effectiveness of the proposed method.

2022-04-20
Qingxue, Meng, Jiajun, Lin.  2014.  The Modeling and Simulation of Vehicle Distance Control Based on Cyber-Physical System. 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference. :341–345.
With the advent of motorization, result in traffic system more congested, how to make the traffic system more effective and also take safety into account, namely build a intelligent transportation system, has become a hot spot of society. The vehicle distance control system studied in this paper is an important function in intelligent transportation system, through introducing cyber-physical systems (CPS) technology into it, set up system model, make the vehicles maintain a preset safety distance, thereby not only help improve the effective utilization of traffic system, but also help avoid the collision due to the speed change. Finally, use Simulink software to simulate and analyze the performance of the system, the result shows that the model can effectively cope with the distance change which is due to speed change, and ensure the vehicles maintain a preset safety distance within a short period of time.
Junjie, Tang, Jianjun, Zhao, Jianwan, Ding, Liping, Chen, Gang, Xie, Bin, Gu, Mengfei, Yang.  2012.  Cyber-Physical Systems Modeling Method Based on Modelica. 2012 IEEE Sixth International Conference on Software Security and Reliability Companion. :188–191.
Cyber-physical systems (CPS) is an integration of computation with physical systems and physical processes. It is widely used in energy, health and other industrial areas. Modeling and simulation is of the greatest challenges in CPS research. Modelica has a great potentiality in the modeling and simulation of CPS. We analyze the characteristics and requirements of CPS modeling, and also the features of Modelica in the paper. In respect of information model, physical model and model interface, this paper introduces a unified modeling method for CPS, based on Modelica. The method provides a reliable foundation for the design, analysis and verification of CPS.
Jun, Shen, Cuibo, Yu.  2013.  The Study on the Self-Similarity and Simulation of CPS Traffic. 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing. :215–219.
CPS traffic characteristics is one of key techniques of Cyber-Physical Systems (CPS). A deep research of CPS network traffic characteristics can help to better plan and design CPS networks. A brief overview of the key concepts of CPS is firstly presented. Then CPS application scenarios are analyzed in details and classified. The characteristics of CPS traffic is analyzed theoretically for different CPS application scenarios. At last, the characteristics of CPS traffic is verified using NS-2 simulation.
Falcone, Alberto, Garro, Alfredo.  2020.  Pitfalls and Remedies in Modeling and Simulation of Cyber Physical Systems. 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT). :1–5.
The ever-growing advances in science and technology have led to a rapid increase in the complexity of most engineered systems. Cyber-physical Systems (CPSs) are the result of this technology advancement that involves new paradigms, architectures and functionalities derived from different engineering domains. Due to the nature of CPSs, which are composed of many heterogeneous components that constantly interact one another and with the environment, it is difficult to study, explain hypothesis and evaluate design alternatives without using Modeling and Simulation (M&S) approaches. M&S is increasingly used in the CPS domain with different objectives; however, its adoption is not easy and straightforward but can lead to pitfalls that need to be recognized and addressed. This paper identifies some important pitfalls deriving from the application of M&S approaches to the CPS study and presents remedies, which are already available in the literature, to prevent and face them.
Wang, Yuying, Zhou, Xingshe, Liang, Dongfang.  2012.  Study on Integrated Modeling Methods toward Co-Simulation of Cyber-Physical System. 2012 IEEE 14th International Conference on High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems. :1736–1740.
Cyber-physical systems are particularly difficult to model and simulate because their components mix many different system modalities. In this paper we address the main technical challenges on system simulation taking into account by new characters of CPS, and provide a comprehensive view of the simulation modeling methods for integration of continuous-discrete model. Regards to UML and Simulink, two most widely accepted modeling methods in industrial designs, we study on three methods to perform the cooperation of these two kinds of heterogeneous models for co-simulation. The solution of an implementation of co-simulation method for CPS was designed under three levels architecture.
Zhang, Kailong, Li, Jiwei, Lu, Zhou, Luo, Mei, Wu, Xiao.  2013.  A Scene-Driven Modeling Reconfigurable Hardware-in-Loop Simulation Environment for the Verification of an Autonomous CPS. 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics. 1:446–451.
Cyber-Physical System(CPS) is now a new evolutional morphology of embedded systems. With features of merging computation and physical processes together, the traditional verification and simulation methods have being challenged recently. After analyzed the state-of-art of related research, a new simulation environment is studied according to the characters of a special autonomous cyber-physical system-Unmanned Aerial Vehicle, and designed to be scene-driven, modeling and reconfigurable. In this environment, a novel CPS-in-loop architecture, which can support simulations under different customized scenes, is studied firstly to ensure its opening and flexibility. And as another foundation, some dynamics models of CPS and atmospheric ones of relative sensors are introduced to simulate the motion of CPS and the change of its posture. On the basis above, the reconfigurable scene-driven mechanisms that are Based on hybrid events are mainly excogitated. Then, different scenes can be configured in terms of special verification requirements, and then each scene will be decomposed into a spatio-temporal event sequence and scheduled by a scene executor. With this environment, not only the posture of CPS, but also the autonomy of its behavior can be verified and observed. It will be meaningful for the design of such autonomous CPS.
Deschamps, Henrick, Cappello, Gerlando, Cardoso, Janette, Siron, Pierre.  2017.  Toward a Formalism to Study the Scheduling of Cyber-Physical Systems Simulations. 2017 IEEE/ACM 21st International Symposium on Distributed Simulation and Real Time Applications (DS-RT). :1–8.
This paper presents ongoing work on the formalism of Cyber-Physical Systems (CPS) simulations. These systems are distributed real-time systems, and their simulations might be distributed or not. In this paper, we propose a model to describe the modular components forming a simulation of a CPS. The main goal is to introduce a model of generic simulation distributed architecture, on which we are able to execute a logical architecture of simulation. This architecture of simulation allows the expression of structural and behavioural constraints on the simulation, abstracting its execution. We will propose two implementations of the execution architecture based on generic architectures of distributed simulation: $\cdot$ The High Level Architecture (HLA), an IEEE standard for distributed simulation, and one of its open-source implementation of RunTime Infrastructure (RTI): CERTI. $\cdot$ The Distributed Simulation Scheduler (DSS), an Airbus framework scheduling predefined models. Finally, we present the initial results obtained applying our formalism to the open-source case study from the ROSACE case study.
Cambeiro, João, Deantoni, Julien, Amaral, Vasco.  2021.  Supporting the Engineering of Multi-Fidelity Simulation Units With Simulation Goals. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C). :317–321.
To conceive a CPS is a complex and multidisciplinary endeavour involving different stakeholders, potentially using a plethora of different languages to describe their views of the system at different levels of abstraction. Model-Driven Engineering comes, precisely, as a methodological approach to tackle the complexity of systems development with models as first-class citizens in the development process. The measure of realism of these models with respect to the real (sub)system is called fidelity. Usually, different models with different fidelity are then developed during the development process. Additionally, it is very common that the development process of CPS includes an incremental (and collaborative) use of simulations to study the behaviour emerging from the heterogeneous models of the system. Currently, the different models, with different fidelity, are managed in an ad hoc manner. Consequently, when a (Co)simulation is used to study a specific property of the system, the choice of the different models and their setup is made manually in a non-tractable way. In this paper we propose a structured new vision to CPS development, where the notion of simulation goal and multi-fidelity simulation unit are first-class citizens. The goal is to make a clear link between the system requirements, the system properties, the simulation goal and the multi-fidelity simulation unit. The outcome of this framework is a way to automatically determine the model at an adequate fidelity level suitable for answering a specific simulation goal.
2022-04-19
Mu, Jing, Jia, Xia.  2021.  Simulation and Analysis of the Influence of Artificial Interference Signal Style on Wireless Security System Performance. 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). 4:2106–2109.
Aimming at the severe security threat faced by information transmission in wireless communication, the artificial interference in physical layer security technology was considered, and the influence of artificial interference signal style on system information transmission security was analyzed by simulation, which provided technical accumulation for the design of wireless security transmission system based on artificial interference.
Gharib, Anastassia, Ibnkahla, Mohamed.  2021.  Security Aware Cluster Head Selection with Coverage and Energy Optimization in WSNs for IoT. ICC 2021 - IEEE International Conference on Communications. :1–6.
Nodes in wireless Internet of Things (IoT) sensor networks are heterogeneous in nature. This heterogeneity can come from energy and security resources available at the node level. Besides, these resources are usually limited. Efficient cluster head (CH) selection in rounds is the key to preserving energy resources of sensor nodes. However, energy and security resources are contradictory to one another. Therefore, it is challenging to ensure CH selection with appropriate security resources without decreasing energy efficiency. Coverage and energy optimization subject to a required security level can form a solution to the aforementioned trade-off. This paper proposes a security level aware CH selection algorithm in wireless sensor networks for IoT. The proposed method considers energy and security level updates for nodes and coverage provided by associated CHs. The proposed method performs CH selection in rounds and in a centralized parallel processing way, making it applicable to the IoT scenario. The proposed algorithm is compared to existing traditional and emerging CH selection algorithms that apply security mechanisms in terms of energy and security efficiencies.
Ammari, Habib M..  2021.  Achieving Physical Security through K-Barrier Coverage in Three-Dimensional Stealthy Lattice Wireless Sensor Networks. 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS). :306–314.
Physical security is essential to safeguarding critical areas. Here, we focus on the physical security problem in three-dimensional (3D) stealthy lattice wireless sensor networks using a 3D sensor belt around a critical space. Specifically, we propose a theoretical framework to investigate the 3D k-barrier coverage problem, where any path crossing this belt intersects with the sensing range of at least k sensors. Precisely, we study this problem from a tiling viewpoint, where the sensing ranges of the sensors are touching (or kissing) each other. We analyze various 3D deterministic sensor deployment methods yielding simple cubic, body centered cubic, face centered cubic, and hexagonal close-packed lattice wireless sensor networks. First, using the concept of the unit cell covered volume ratio, we prove that none of these 3D lattices guarantee k-barrier coverage. Second, to remedy this problem, we consider the great rhombicuboctahedron (GR), a polyhedral space-filler. We introduce the concept of intruder's abstract paths along a 3D k-barrier covered belt, and compute their number. Also, we propose a polynomial representation for all abstract paths. In addition, we compute the number of sensors deployed over a 3D k-barrier covered belt using GR. Third, we corroborate our analysis with numerical and simulation results.
2022-04-13
Sun, He, Liu, Rongke, Tian, Kuangda, Zou, Tong, Feng, Baoping.  2021.  Deletion Error Correction based on Polar Codes in Skyrmion Racetrack Memory. 2021 IEEE Wireless Communications and Networking Conference (WCNC). :1–6.
Skyrmion racetrack memory (Sk-RM) is a new storage technology in which skyrmions are used to represent data bits to provide high storage density. During the reading procedure, the skyrmion is driven by a current and sensed by a fixed read head. However, synchronization errors may happen if the skyrmion does not pass the read head on time. In this paper, a polar coding scheme is proposed to correct the synchronization errors in the Sk-RM. Firstly, we build two error correction models for the reading operation of Sk-RM. By connecting polar codes with the marker codes, the number of deletion errors can be determined. We also redesign the decoding algorithm to recover the information bits from the readout sequence, where a tighter bound of the segmented deletion errors is derived and a novel parity check strategy is designed for better decoding performance. Simulation results show that the proposed coding scheme can efficiently improve the decoding performance.
2022-04-01
Khan, Asad Ullah, Javaid, Nadeem, Othman, Jalel Ben.  2021.  A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on Blockchain. 2021 IEEE Symposium on Computers and Communications (ISCC). :1—5.
In this paper, a blockchain based scheme is proposed to provide registration, mutual authentication and data sharing in wireless sensor network. The proposed model consists of three types of nodes: coordinators, cluster heads and sensor nodes. A consortium blockchain is deployed on coordinator nodes. The smart contracts execute on coordinators to record the identities of legitimate nodes. Moreover, they authenticate nodes and facilitate in data sharing. When a sensor node communicate and accesses data of any other sensor node, both nodes mutually authenticate each other. The smart contract of data sharing is used to provide a secure communication and data exchange between sensor nodes. Moreover, the data of all the nodes is stored on the decentralized storage called interplanetary file system. The simulation results show the response time of IPFS and message size during authentication and registration.
2022-03-23
Roy, Sohini, Sen, Arunabha.  2021.  Identification and Mitigation of False Data Injection using Multi State Implicative Interdependency Model (MSIIM) for Smart Grid. 2021 IEEE International Conference on Communications Workshops (ICC Workshops). :1—6.

Smart grid monitoring, automation and control will completely rely on PMU based sensor data soon. Accordingly, a high throughput, low latency Information and Communication Technology (ICT) infrastructure should be opted in this regard. Due to the low cost, low power profile, dynamic nature, improved accuracy and scalability, wireless sensor networks (WSNs) can be a good choice. Yet, the efficiency of a WSN depends a lot on the network design and the routing technique. In this paper a new design of the ICT network for smart grid using WSN is proposed. In order to understand the interactions between different entities, detect their operational levels, design the routing scheme and identify false data injection by particular ICT entities, a new model of interdependency called the Multi State Implicative Interdependency Model (MSIIM) is proposed in this paper, which is an updated version of the Modified Implicative Interdependency Model (MIIM) [1]. MSIIM considers the data dependency and operational accuracy of entities together with structural and functional dependencies between them. A multi-path secure routing technique is also proposed in this paper which relies on the MSIIM model for its functioning. Simulation results prove that MSIIM based False Data Injection (FDI) detection and mitigation works better and faster than existing methods.