Vulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
DOI:
https://doi.org/10.13052/jcsm2245-1439.1236Keywords:
smart grid cyber security, cyber attacks, synchrophasor technology, phasor measurement unit (PMU), wide area measurement system (WAMS), power system monitoring, power system protection, power system controlAbstract
With the increased investment and deployment of embedded computing and communication technologies in the power system – the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to cyber security threats. Among the three major subsystems of a power grid – generation, transmission and distribution – this survey focuses on the transmission subsystem because most of the cyberization of the grid has been happening in this subsystem. This is due to the need for distributed measurement, monitoring and control to retain the stability, security, and reliability of power transmission system. Given the geographically dispersed generation facilities, substations, control centers, data concentrators etc., efficient data communication is required, and therefore large scale networking – either proprietary or leased – is happening. The goal of this paper is not to be comprehensive to include all efforts of securing the transmission system from cyber borne threats, but to provide a survey of various vulnerabilities, and countermeasures proposed by various research efforts. One of the focus area in this survey is the Phasor Measurement Units (PMUs) and Wide Area Measurement System (WAMS) technology – mostly due to our familiarity with the issues for this specific technology deployment – rather than any attempt to indicate that this is the most vulnerable technology in the transmission subsystem. Our hope is that this survey will familiarize any uninitiated reader with the issues and provide incentive to undertake systematic research programs to thwart cyber attacks on our national power delivery infrastructure.
Downloads
References
J.D. Glover, M.S. Sarma, and T.J. Overbye. Power System Analysis and Design, fourth edition. Cengage Learning, 2008.
Department of Energy, Office of Electric Transmission and Distribution. “Grid 2030” A national vision of electricity’s second 100 years. Meeting Report, 2003.
Department of Energy. The smart grid: An introduction. Report, 2009.
International Energy Agency. Technology roadmap smart grids. Report for International Energy Agency’s Energy Technology Policy Division, 2011.
G. Locke and P.D. Gallagher. NIST framework and roadmap for smart grid interoperability standards, Release 1.0. NIST Special Publication 1108, 2010.
United States Congress (H.R. 6, 110th). Energy independence and security act of 2007.[Public Law No: 110-140] Title XIII, Sec. 1301.
Department of Energy. Communication requirements of smart grid technologies. Report,2010.
A.G. Phadke. The wide world of wide-area measurement. IEEE Power & Energy Magazine, 2008.
D.G. Hart. Using AMI to realize the smart grid. In Proceedings of IEEE Power and Energy Society General Meeting, pp. 1-2, 2008.
S.M. Amin. Securing the electricity grid. The Bridge. Linking Engineering and Society,The Electricity Grid, 40(1):13–20, Spring 2010.
P.D. Ray, R. Harnoor, and M. Hentea. Smart power gird security: A unified risk management approach. In Proceedings of 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 276–285, 2010.
A.A. Cardenas, T. Roosta, and S. Sastry. Rethinking security properties, threat modelsand the design space in sensor networks: A case study in SCADA systems. Ad Hoc Networks, 7:1434–1447, 2009.
O. Kosut, L. Jia, R.J. Thomas, and L. Tong. Malicious data attacks on the smart grid.IEEE Transactions on Smart Grid, 2(4):645–658, 2011.
Y. Liu, P. Ning, and M.K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of ACM Conference on Computer and Communications Security, pp. 21–32, 2009.
A.G. Phadke and J.S. Thorp. Synchronized Phasor Measurements and Their Applications. Springer, 2008.
A. Monticelli. State Estimation in Electric Power System: A Generalized Approach.Kluwer Academic Publishers, 1999.
A. Wood and B. Wollenberg. Power Generation, Operation, and Control, 2nd ed. JohnWiley and Sons, 1996.
A. Monticelli, F.F. Wu, and M. Yen. Multiple bad data identification for state estimation using combinatorial optimization. IEEE PAS-90, 1971.
H. Sandberg, A. Teixeira, and K.H. Johansson. On security indices for state estimators in power networks. In Proceedings of 1st Workshop Secure Control Systems (CPSWEEK),Stockholm, Sweden, 2010.
R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T.J. Overbye. Detecting false data injection attacks on dc state estimation. In Proceedings of 1st Workshop Secure Control Systems (CPSWEEK), Stockholm, Sweden, 2010.
T.T. Kim and H.V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2(2):326–333, 2011.
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla. Smartgrid data integrity attacks: Characterizations and countermeasures. In Proceedings of2011 IEEE International Conference on Smart Grid Communication (SmartGridComm),2011.
Y. Deng, H. Lin, A.G. Phadke, S. Shukla, and J.S. Thorp. Communication network modeling and simulation for wide area measurement applications. In Proceedings of 2012IEEE PES Conference on Innovative Smart Grid Technologies (ISGT 2012), 2012.
Z. Lu, X. Lu, W. Wang, and C. Wang. Review and evaluation of security threats on the communication networks in the smart grid. In Proceedings of the2010 Military Communications Conference, 2010.
G. Danezis and R. Clayton. Introducing traffic analysis. In Digital Privacy: Theory,Technologies, and Practices, Chapter 5. Auerbach Publications, 2008.
B. Sikar and J.H. Chow. Defending synchrophasor data networks against traffic analysis attacks. IEEE Transactions on Smart Grid, 2(4):819–826, 2011.
E. Litvinov, T. Zheng, G. Rosenwald, and P. Shamsollahi. Marginal loss modeling inLMP calculation. IEEE Transactions on Power Systems, 19(2):880–888, 2004.
T. Zheng and E. Livino. Ex post pricing in the co-optimized energy and reserve market.IEEE Transaction on Power System, 21(4):1528–1538, 2006.
L. Jia, R.J. Thomas, and L. Tong Malicious data attack on real-time electricity market.In Proceedings of 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5952–5955, 2011.
L. Xie, Y. Mo, and B. Sinopoli. Integrity data attacks in power market operations. IEEETransactions on Smart Grid, 2(4):659–666, 2011.
J. DeLaRee, V. Centeno, J.S. Thorp, and A.G. Phadke. Synchronized phasor measure-ment applications in power systems. IEEE Transactions on Smart Grid, 1(1):20–27,2010.
IEEE Power Engineering Society. IEEE standard for synchrophasors for power systems,IEEE Std C37.118TM-2005. 2006.
Y. Deng, H. Lin, A.G. Phadke, S. Shukla, and J.S. Thorp. Networking technologies for wide-area measurement applications. In Smart Grid Communications and Networking,2012 (to be published).
A.G. Phadke, J.S. Thorp, R.F. Nuqui, and M. Zhou. Recent developments in state estimation with phasor measurements In Proceedings of Power Systems Conference and Exposition, PSCE ’09. IEEE/PES, 2009.
M. Zhou, V.A. Centeno, J.S. Thorp, and A.G. Phadke. An alternative for including phasormeasurements in state estimators. IEEE Transactions on Power Systems, 21, 2006.
J. Chen and A. Abur. Improved bad data processing via strategic placement of PMUs. In Proceedings of IEEE Power Engineering Society General Meeting, 2005.
T.L. Baldwin, L. Mili, M.B. Boisen, and R. Adapa. Power system observability with minimal phasor measurement placement. IEEE Transactions on Power Systems, 8(2),1993.
R.F. Nuqui and A.G. Phadke. Phasor measurement unit placement techniques for com-plete and incomplete observability. IEEE Transactions on Power Delivery,20(4):2381–2388, 2005.
A. Jain and N.R. Shivakumar. Phasor measurements in dynamic state estimation of power systems. Proceedings of TENCON 2008 IEEE Region 10 Conference, pp. 1–6, 2008.
F. Pasqualetti, F. Dorfler, and F. Bullo. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of IEEE Conference on Decision and Control, Orlando, 2011.
B.C. Barker, J.W. Betz, J.E. Clark, J.T. Correia, J.T. Gillis, S. Lazar, K.A. Rehborn, andJ.R. Straton. Overview of the GPS M code signal. In Proceedings of the 2000 National Technical Meeting of The Instituteof Navigation, Anaheim, CA, 2000.
T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B. W. O’Hanlon, and P.M. Kintner, Jr.Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of ION GNSS 2008, 2008.
K. Borre, D.M. Akos, N. Bertelsen, P. Rinder, and S.H. Jensen. A Software-Defined GPSand Galileo Receiver. Birkhauser, Boston, 2007.
S. Gong, Z. Zhang, H. Li, and A.D. Dimitrovski. Time stamp attack in smart grid:Physical mechanism and damage analysis. In CoRR, 2012.