Vulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid

Authors

  • Yi Deng Department of Electrical and Computer Engineering, Virginia Tech,Blacksburg, VA 24060, USA
  • Sandeep Shukla Department of Electrical and Computer Engineering, Virginia Tech,Blacksburg, VA 24060, USA

DOI:

https://doi.org/10.13052/jcsm2245-1439.1236

Keywords:

smart grid cyber security, cyber attacks, synchrophasor technology, phasor measurement unit (PMU), wide area measurement system (WAMS), power system monitoring, power system protection, power system control

Abstract

With the increased investment and deployment of embedded computing and communication technologies in the power system – the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to cyber security threats. Among the three major subsystems of a power grid – generation, transmission and distribution – this survey focuses on the transmission subsystem because most of the cyberization of the grid has been happening in this subsystem. This is due to the need for distributed measurement, monitoring and control to retain the stability, security, and reliability of power transmission system. Given the geographically dispersed generation facilities, substations, control centers, data concentrators etc., efficient data communication is required, and therefore large scale networking – either proprietary or leased – is happening. The goal of this paper is not to be comprehensive to include all efforts of securing the transmission system from cyber borne threats, but to provide a survey of various vulnerabilities, and countermeasures proposed by various research efforts. One of the focus area in this survey is the Phasor Measurement Units (PMUs) and Wide Area Measurement System (WAMS) technology – mostly due to our familiarity with the issues for this specific technology deployment – rather than any attempt to indicate that this is the most vulnerable technology in the transmission subsystem. Our hope is that this survey will familiarize any uninitiated reader with the issues and provide incentive to undertake systematic research programs to thwart cyber attacks on our national power delivery infrastructure.

Downloads

Download data is not yet available.

Author Biographies

Yi Deng, Department of Electrical and Computer Engineering, Virginia Tech,Blacksburg, VA 24060, USA

Yi Deng (M’12) received the B.Eng. and Ph.D. degrees in electrical engineering from Beijing Institute of Technology, Beijing, China, in 2005 and 2010 respectively. He is currently a postdoctoral associate with the Department of Electrical and Computer Engineering at Virginia Polytechnic and State University in Blacksburg (Virginia Tech). His research interests include synchrophasor measurement technology, power system monitoring protection and control, communication in smart gird, and smart gird cybersecurity. Dr. Deng’s research also covers signal processing, high-performance embedded computing (HPEC), hardware software co-design.

Sandeep Shukla, Department of Electrical and Computer Engineering, Virginia Tech,Blacksburg, VA 24060, USA

Sandeep K. Shukla (M’99, SM’02) received the bachelor’s degree in 1991 from Jadavpur University, Calcutta, and the master’s and PhD degrees in computer science in 1995 and 1997, respectively, from the State University of New York at Albany. He is an associate professor of computer engineering at Virginia Polytechnic and State University in Blacksburg (Virginia Tech),where he has been a faculty member since 2002. He is also a founder and director of the Center for Embedded Systems for Critical Applications (CESCA) and director of the FERMAT research lab. He has published more than 150 articles in journals, books, and conference proceedings, and has published eight books. He was awarded the PECASE (Presidential Early Career Awardfor Scientists and Engineers) award for his research in design automation for embedded systems design, which in particular focuses on system level design languages, formal methods, formal specification languages, probabilistic modeling and model checking, dynamic power management, application of stochastic models and model analysis tools for fault-tolerant nano-scale system design, reliability measurement of fault-tolerant nano-systems, and embedded software engineering. Professor Shukla was elected a College of Engineering Faculty fellow at Virginia Tech in 2004. He is a distinguished visitor of the IEEE Computer Society, a distinguished speaker of the ACM,and a senior member of the IEEE and ACM. He worked at GTE labs and Intel Corporation between 1997 and 2001. He was a researcher at the Centerfor Embedded Computer Systems at the University of California at Irvine. In 2007, Professor Shukla received a Distinguished Alumni award from the State University of New York at Albany for Excellence in Science and Technology. In 2008, he received the Friedrich Wilhelm Bessel Research Award from the Humboldt Foundation in Germany.

References

J.D. Glover, M.S. Sarma, and T.J. Overbye. Power System Analysis and Design, fourth edition. Cengage Learning, 2008.

Department of Energy, Office of Electric Transmission and Distribution. “Grid 2030” A national vision of electricity’s second 100 years. Meeting Report, 2003.

Department of Energy. The smart grid: An introduction. Report, 2009.

International Energy Agency. Technology roadmap smart grids. Report for International Energy Agency’s Energy Technology Policy Division, 2011.

G. Locke and P.D. Gallagher. NIST framework and roadmap for smart grid interoperability standards, Release 1.0. NIST Special Publication 1108, 2010.

United States Congress (H.R. 6, 110th). Energy independence and security act of 2007.[Public Law No: 110-140] Title XIII, Sec. 1301.

Department of Energy. Communication requirements of smart grid technologies. Report,2010.

A.G. Phadke. The wide world of wide-area measurement. IEEE Power & Energy Magazine, 2008.

D.G. Hart. Using AMI to realize the smart grid. In Proceedings of IEEE Power and Energy Society General Meeting, pp. 1-2, 2008.

S.M. Amin. Securing the electricity grid. The Bridge. Linking Engineering and Society,The Electricity Grid, 40(1):13–20, Spring 2010.

P.D. Ray, R. Harnoor, and M. Hentea. Smart power gird security: A unified risk management approach. In Proceedings of 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 276–285, 2010.

A.A. Cardenas, T. Roosta, and S. Sastry. Rethinking security properties, threat modelsand the design space in sensor networks: A case study in SCADA systems. Ad Hoc Networks, 7:1434–1447, 2009.

O. Kosut, L. Jia, R.J. Thomas, and L. Tong. Malicious data attacks on the smart grid.IEEE Transactions on Smart Grid, 2(4):645–658, 2011.

Y. Liu, P. Ning, and M.K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of ACM Conference on Computer and Communications Security, pp. 21–32, 2009.

A.G. Phadke and J.S. Thorp. Synchronized Phasor Measurements and Their Applications. Springer, 2008.

A. Monticelli. State Estimation in Electric Power System: A Generalized Approach.Kluwer Academic Publishers, 1999.

A. Wood and B. Wollenberg. Power Generation, Operation, and Control, 2nd ed. JohnWiley and Sons, 1996.

A. Monticelli, F.F. Wu, and M. Yen. Multiple bad data identification for state estimation using combinatorial optimization. IEEE PAS-90, 1971.

H. Sandberg, A. Teixeira, and K.H. Johansson. On security indices for state estimators in power networks. In Proceedings of 1st Workshop Secure Control Systems (CPSWEEK),Stockholm, Sweden, 2010.

R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T.J. Overbye. Detecting false data injection attacks on dc state estimation. In Proceedings of 1st Workshop Secure Control Systems (CPSWEEK), Stockholm, Sweden, 2010.

T.T. Kim and H.V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2(2):326–333, 2011.

A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla. Smartgrid data integrity attacks: Characterizations and countermeasures. In Proceedings of2011 IEEE International Conference on Smart Grid Communication (SmartGridComm),2011.

Y. Deng, H. Lin, A.G. Phadke, S. Shukla, and J.S. Thorp. Communication network modeling and simulation for wide area measurement applications. In Proceedings of 2012IEEE PES Conference on Innovative Smart Grid Technologies (ISGT 2012), 2012.

Z. Lu, X. Lu, W. Wang, and C. Wang. Review and evaluation of security threats on the communication networks in the smart grid. In Proceedings of the2010 Military Communications Conference, 2010.

G. Danezis and R. Clayton. Introducing traffic analysis. In Digital Privacy: Theory,Technologies, and Practices, Chapter 5. Auerbach Publications, 2008.

B. Sikar and J.H. Chow. Defending synchrophasor data networks against traffic analysis attacks. IEEE Transactions on Smart Grid, 2(4):819–826, 2011.

E. Litvinov, T. Zheng, G. Rosenwald, and P. Shamsollahi. Marginal loss modeling inLMP calculation. IEEE Transactions on Power Systems, 19(2):880–888, 2004.

T. Zheng and E. Livino. Ex post pricing in the co-optimized energy and reserve market.IEEE Transaction on Power System, 21(4):1528–1538, 2006.

L. Jia, R.J. Thomas, and L. Tong Malicious data attack on real-time electricity market.In Proceedings of 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5952–5955, 2011.

L. Xie, Y. Mo, and B. Sinopoli. Integrity data attacks in power market operations. IEEETransactions on Smart Grid, 2(4):659–666, 2011.

J. DeLaRee, V. Centeno, J.S. Thorp, and A.G. Phadke. Synchronized phasor measure-ment applications in power systems. IEEE Transactions on Smart Grid, 1(1):20–27,2010.

IEEE Power Engineering Society. IEEE standard for synchrophasors for power systems,IEEE Std C37.118TM-2005. 2006.

Y. Deng, H. Lin, A.G. Phadke, S. Shukla, and J.S. Thorp. Networking technologies for wide-area measurement applications. In Smart Grid Communications and Networking,2012 (to be published).

A.G. Phadke, J.S. Thorp, R.F. Nuqui, and M. Zhou. Recent developments in state estimation with phasor measurements In Proceedings of Power Systems Conference and Exposition, PSCE ’09. IEEE/PES, 2009.

M. Zhou, V.A. Centeno, J.S. Thorp, and A.G. Phadke. An alternative for including phasormeasurements in state estimators. IEEE Transactions on Power Systems, 21, 2006.

J. Chen and A. Abur. Improved bad data processing via strategic placement of PMUs. In Proceedings of IEEE Power Engineering Society General Meeting, 2005.

T.L. Baldwin, L. Mili, M.B. Boisen, and R. Adapa. Power system observability with minimal phasor measurement placement. IEEE Transactions on Power Systems, 8(2),1993.

R.F. Nuqui and A.G. Phadke. Phasor measurement unit placement techniques for com-plete and incomplete observability. IEEE Transactions on Power Delivery,20(4):2381–2388, 2005.

A. Jain and N.R. Shivakumar. Phasor measurements in dynamic state estimation of power systems. Proceedings of TENCON 2008 IEEE Region 10 Conference, pp. 1–6, 2008.

F. Pasqualetti, F. Dorfler, and F. Bullo. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of IEEE Conference on Decision and Control, Orlando, 2011.

B.C. Barker, J.W. Betz, J.E. Clark, J.T. Correia, J.T. Gillis, S. Lazar, K.A. Rehborn, andJ.R. Straton. Overview of the GPS M code signal. In Proceedings of the 2000 National Technical Meeting of The Instituteof Navigation, Anaheim, CA, 2000.

T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B. W. O’Hanlon, and P.M. Kintner, Jr.Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of ION GNSS 2008, 2008.

K. Borre, D.M. Akos, N. Bertelsen, P. Rinder, and S.H. Jensen. A Software-Defined GPSand Galileo Receiver. Birkhauser, Boston, 2007.

S. Gong, Z. Zhang, H. Li, and A.D. Dimitrovski. Time stamp attack in smart grid:Physical mechanism and damage analysis. In CoRR, 2012.

Downloads

Published

2012-04-25

How to Cite

1.
Deng Y, Shukla S. Vulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid. JCSANDM [Internet]. 2012 Apr. 25 [cited 2024 Apr. 16];1(2-3):250-76. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6115

Issue

Section

Articles