Abstract
Electric grids in the future will be highly integrated with information and communications technology. The increase in use the of information technology is expected to enhance reliability, efficiency, and sustainability of the future electric grid through the implementation of sophisticated monitoring and control strategies. However, it also comes at a price that the grid becomes more vulnerable to cyber-intrusions which may damage the physical system. This chapter provides an overview of cyberattacks on power systems from a system theoretical perspective by focusing on the tight coupling between the physical system and the communication network. It is demonstrated via several attack scenarios how the adversary may cause significant impacts on the power system by intercepting the communication channel and without possibly being detected. The attack strategies and the corresponding countermeasures are formulated and analyzed using tools from optimization, dynamical systems, and control theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Amini, F. Pasqualetti, H. Mohsenian-Rad, Dynamic load altering attacks against power system stability: attack models and protection schemes. IEEE Trans. Smart Grid 9(4), 2862–2872 (2018)
J.M. Arroyo, F.D. Galiana, On the solution of the bilevel programming formulation of the terrorist threat problem. IEEE Trans. Power Syst. 20(2), 789–797 (2005)
C. Balducelli, S. Bologna, L. Lavalle, G. Vicoli, Safeguarding information intensive critical infrastructures against novel types of emerging failures. Reliab. Eng. Syst. Saf. 92(9), 1218–1229 (2007)
N. Baracaldo, J. Joshi, An adaptive risk management and access control framework to mitigate insider threats. Comput. Secur. 39, 237–254 (2013)
S. Baros, D. Shiltz, P. Jaipuria, A. Hussain, A.M. Annaswamy, Resilient control of cyber-physical energy systems for security against cyber-attacks, in DSpace @MIT, http://hdl.handle.net/1721.1/107408
V.M. Bier, E.R. Gratz, N.J. Haphuriwat, W. Magua, K.R. Wierzbicki, Methodology for identifying near-optimal interdiction strategies for a power transmission system. Reliab. Eng. Syst. Saf. 92(9), 1155–1161 (2007)
J. Bigham, D, Gamez, N. Lu, Safeguarding SCADA Systems with Anomaly Detection (Springer, Berlin, Heidelberg, 2003), pp. 171–182
Y. Chakhchoukh, H. Ishii, Coordinated cyber-attacks on the measurement function in hybrid state estimation. IEEE Trans. Power Syst. 30(5), 2487–2497 (2015)
W.L. Chin, C.H. Lee, T. Jiang, Blind false data attacks against ac state estimation based on geometric approach in smart grid communications. IEEE Trans. Smart Grid (99), 1–1 (2017)
S. Cui, Z. Han, S. Kar, T.T. Kim, H.V. Poor, A. Tajer, Coordinated data-injection attack and detection in the smart grid: a detailed look at enriching detection solutions. IEEE Signal Process. Mag. 29(5), 106–115 (2012)
R. Deng, G. Xiao, R. Lu, Defending against false data injection attacks on power system state estimation. IEEE Trans. Ind. Inf. 13(1), 198–207 (2017)
E-ISAC, SANS: Analysis of the cyber attack on the ukrainian power grid: Defense use case, https://ics.sans.org/duc5. Accessed 20 June 2017
M. Esmalifalak, H. Nguyen, R. Zheng, Z. Han, Stealth false data injection using independent component analysis in smart grid, in IEEE International Conference on Smart Grid Communications (SmartGridComm) (2011), pp. 244–248
D. Formby, S.S. Jung, S. Walters, R. Beyah, A physical overlay framework for insider threat mitigation of power system devices, in IEEE International Conference on Smart Grid Communications (2014), pp. 970–975
I. Garitano, R. Uribeetxeberria, U. Zurutuza, A review of scada anomaly detection systems, in 6th International Conference SOCO Soft Computing Models in Industrial and Environmental Applications (2011), pp. 357–366
J. Giraldo, A. Cárdenas, N. Quijano, Integrity attacks on real-time pricing in smart grids: impact and countermeasures. IEEE Trans. Smart Grid 8(5), 2249–2257 (2017)
A. Gusrialdi, Z. Qu, M.A. Simaan, Competitive interaction design of cooperative systems against attacks. IEEE Trans. Autom. Control (2018)
E. Handschin, F.C. Schweppe, J. Kohlas, A. Fiechter, Bad data analysis for power system state estimation. IEEE Trans. Power Appar. Syst. 94(2), 329–337 (1975)
H. He, J. Yan, Cyber-physical attacks and defences in the smart grid: a survey. IET Cyber-Phys. Syst. Theory Appl. 1(1), 13–27 (2016)
G. Hug, J.A. Giampapa, Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)
A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, G. Lachapelle, GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int. J. Navig. Obs. 2012 (2012)
X. Jiang, J. Zhang, B.J. Harding, J.J. Makela, A.D. Dominguez-Garcia, Spoofing GPS receiver clock offset of phasor measurement units. IEEE Trans. Power Syst. 28(3), 3253–3262 (2013)
V. Kekatos, G.B. Giannakis, R. Baldick, Grid topology identification using electricity prices, in IEEE PES General Meeting (2014) pp. 1–5
E. Key, Techniques to Counter GPS Spoofing. Internal memorandum (1995)
J. Kim, L. Tong, On topology attack of a smart grid: undetectable attacks and countermeasures. IEEE J. Sel. Areas Commun. 31(7), 1294–1305 (2013)
K.S. Kim, K.H. Rew, Reduced order disturbance observer for discrete-time linear systems. Automatica 49(4), 968–975 (2013)
T.T. Kim, H.V. Poor, Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)
O. Kosut, L. Jia, R.J. Thomas, L. Tong, Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)
G. Liang, S.R. Weller, F. Luo, J. Zhao, Z.Y. Dong, Generalized fdia-based cyber topology attack with application to the Australian electricity market trading mechanism. IEEE Trans. Smart Grid 9(4), 3820–3829 (2018)
G. Liang, S.R. Weller, J. Zhao, F. Luo, Z.Y. Dong, The 2015 ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317–3318 (2017)
G. Liang, J. Zhao, F. Luo, S. Weller, Z.Y. Dong, A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2017)
D. Liberzon, Switching in systems and control (Springer, Science & Business Media, 2012)
M.G. Lijesen, The real-time price elasticity of electricity. Energy Econ. 29(2), 249–258 (2007)
H. Lin, P.J. Antsaklis, Stability and stabilizability of switched linear systems: a survey of recent results. IEEE Trans. Autom. Control 54(2), 308–322 (2009)
S. Liu, X.P. Liu, A. El Saddik, Denial-of-service (DoS) attacks on load frequency control in smart grids, in 2013 IEEE PES Innovative Smart Grid Technologies (ISGT) (IEEE, 2013)
S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, K. Butler-Purry, A framework for modeling cyber-physical switching attacks in smart grid. IEEE Trans. Emerg. Topics Comput. 1(2), 273–285 (2013)
X. Liu, Z. Bao, D. Lu, Z. Li, Modeling of local false data injection attacks with reduced network information. IEEE Trans. Smart Grid 6(4), 1686–1696 (2015)
Y.Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids, in Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), pp. 21–32
Y. Liu, H. Xin, Z. Qu, D. Gan, An attack-resilient cooperative control strategy of multiple distributed generators in distribution networks. IEEE Trans. Smart Grid 7(6), 2923–2932 (2016)
J.T.K. Ma, T.M. Liu, L.F. Wu, New energy management system architectural design and intranet/internet applications to power systems in 1998 Proceedings of EMPD’98 International Conference on Energy Management and Power Delivery, vol. 1 (1998), pp. 207–212
Y. Mo, T. Hyun-Jin Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, B. Sinopoli, Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)
Y. Mo, B. Sinopoli, Secure control against replay attacks, in 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton, 2009), pp. 911–918
A.H. Mohsenian-Rad, A. Leon-Garcia, Optimal residential load control with price prediction in real-time electricity pricing environments. IEEE Trans. Smart Grid 1(2), 120–133 (2010)
A.H. Mohsenian-Rad, A. Leon-Garcia, Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2(4), 667–674 (2011)
P.M. Nasr, A.Y. Varjani, Alarm based anomaly detection of insider attacks in SCADA system, in Smart Grid Conference (SGC) (2014), pp. 1–6
M. Ozay, I. Esnaola, F.T.Y. Vural, S.R. Kulkarni, H.V. Poor, Sparse attack construction and state estimation in the smart grid: centralized and distributed models. IEEE J. Sel. Areas Commun. 31(7), 1306–1318 (2013)
K. Pelechrinis, M. Iliofotou, S.V. Krishnamurthy, Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)
T. Pultarova, Cyber security—ukraine grid hack is wake-up call for network operators [news briefing]. Eng. Technol. 11(1), 12–13 (2016)
A. Rajabi, R.B. Bobba, A resilient algorithm for power system mode estimation using synchrophasors, in Proceeding of ICSS’16 Proceedings of the 2nd Annual Industrial Control System Security Workshop (2016), pp. 23–29
M. Roozbehanit, M. Rinehart, M. Dahleh, S. Mitter, D. Obradovic, H. Mangesius, Analysis of competitive electricity markets under a new model of real-time retail pricing, in 2011 8th International Conference on the European Energy Market (EEM) (2011), pp. 250–255
J. Salmeron, K. Wood, R. Baldick, Analysis of electric grid security under terrorist threat. IEEE Trans. Power Syst. 19(2), 905–912 (2004)
J. Salmeron, K. Wood, R. Baldick, Worst-case interdiction analysis of large-scale electric power grids. IEEE Trans. Power Syst. 24(1), 96–104 (2009)
H. Sandberg, A. Teixeira, K.H. Johansson, On security indices for state estimators in power networks, in First Workshop on Secure Control Systems (SCS) (2010)
A. Sargolzaei, K. Yen, M. Abdelghani, Delayed inputs attack on load frequency control in smart grid, in 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT) (IEEE, 2014), pp. 1–5
A. Sargolzaei, K.K. Yen, M.N. Abdelghani, Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 7(2), 1176–1185 (2016)
J. Slay, M. Miller, Lessons learned from the maroochy water breach, in International Conference on Critical Infrastructure Protection (Springer, 2007), pp. 73–82
S. Sridhar, M. Govindarasu, Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580–591 (2014)
P. Srikantha, D. Kundur, Denial of service attacks and mitigation for stability in cyber-enabled power grid, in 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (2015), pp. 1–5
M. Talebi, C. Li, Z. Qu, Enhanced protection against false data injection by dynamically changing information structure of microgrids, in 2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM) (2012), pp. 393–396
R. Tan, V. Badrinath Krishna, D.K. Yau, Z. Kalbarczyk, Impact of integrity attacks on real-time pricing in smart grids, in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), pp. 439–450
S. Tan, D. De, W.Z. Song, J. Yang, S.K. Das, Survey of security advances in smart grid: a data driven approach. IEEE Commun. Surv. Tutor. 19(1), 397–422 (2017)
A. Teixeira, I. Shames, H. Sandberg, K.H. Johansson, A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)
(U.S.)., N.R.C.: Making the nation safer : the role of science and technology in countering terrorism / Committee on Science and Technology for Countering Terrorism, National Research Council. National Academy Press Washington, D.C (2002)
W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)
J. Warner, R. Johnston, GPS spoofing countermeasures (Los Alamos Research Paper LAUR-03-6163, 2003)
D. Weers, M. Shamsedin, Testing a new direct load control power line communication system. IEEE Trans. Power Deliv. 2(3), 657–660 (1987)
P. Wood, D. Shiltz, T. Nudell, A. Hussain, A. Annaswamy, A framework for evaluating the resiliency of dynamic real-time market mechanisms. IEEE Trans. Smart Grid 7(6), 2904–2912 (2016)
Y. Wu, Z. Wei, J. Weng, X. Li, R.H. Deng, Resonance attacks on load frequency control of smart grids. IEEE Transactions on Smart Grid PP(99), 1–1 (2017)
L. Xie, Y. Mo, B. Sinopoli, Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2(4), 659–666 (2011)
Q. Yang, J. Yang, W. Yu, D. An, N. Zhang, W. Zhao, On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans. Parallel Distrib. Syst. 25(3), 717–729 (2014)
Y. Yao, T. Edmunds, D. Papageorgiou, R. Alvarez, Trilevel optimization in power network defense. IEEE Trans. Syst. Man Cybern. Part C (Applications and Reviews) 37(4), 712–718 (2007)
J. Zhang, P. Jaipuria, A. Hussain, A. Chakrabortty, Attack-resilient estimation of power system oscillation modes using distributed and parallel optimization: theoretical and experimental methods, in Conference on Decision and Game Theory for Security (GameSec) (2014)
Acknowledgements
This work is supported in part by U.S. Department of Transportation (award DTRT13GUTC51), by U.S. National Science Foundation (grant ECCS-1308928), by U.S. Department of Energy (awards DE-EE0006340 and DE-EE0007327), by L-3 Communication Coleman Aerospace (contract 11013I2034), by Texas Instruments’ awards, and by Leidos (contract P010161530).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Gusrialdi, A., Qu, Z. (2019). Smart Grid Security: Attacks and Defenses. In: Stoustrup, J., Annaswamy, A., Chakrabortty, A., Qu, Z. (eds) Smart Grid Control. Power Electronics and Power Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98310-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-98310-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98309-7
Online ISBN: 978-3-319-98310-3
eBook Packages: EnergyEnergy (R0)