Skip to main content
Log in

Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

As a classic cyber-physical system, smart grids often suffer from various types of attacks, one of which the most threatening attacks is coordinated cyber-physical attack (CCPA). In order to improve the robustness of the smart grids against CCPA, we predict and simulate various possible attack scenarios, and propose three attack strategies, such as optimal attack strategy (OAS), saturation attack strategy (SAS) and decentralized random selective attack strategy (DRSAS). The OAS is used to get the maximum attack effect by attacking a small of number of targets in the case of limited resources. The SAS is designed to destroy the entire network with sufficient resource while avoiding repeated or redundant attacks. The DRSAS is proposed to random select decentralized cyber and physical targets according to attacker acknowledgement, real-time vulnerabilities, network characteristics, which is divided into implicit attack and explicit attack. In this paper, attack goals (AGs) function is firstly constructed to identify important cyber and physical targets. Secondly, based on these AGs, OAS and SAS are designed and applied to CCPA for analyzing the effect of those attack strategies on smart grids. Thirdly, The DRSAS is used to study the influence of decentralized random attack on cascading failure of smart grid, which applied to CCPA is to compare with OAS and SAS. Finally, node loss is used as an evaluation index to compare the attack effect of cyber attack (CA), physical attack (PA), CCPA based on OAS, SAS and DRSAS. The experimental results show that: (I) when the same proportion of nodes are removed, the CCPA based on the OAS or SAS has better attack effect rather than CA and PA; (II) CCPA based on DRSAS has different effects at different times, and explicit attack has better effect than implicit attack regardless of \(\alpha =0.3,0.4,0.5\) and times t1, t2, t3.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Kang, W. J., Zhu, P. D., Hu, G., Hang, Z., & Liu, X. (2018). Cross-layer attack path exploration for smart grid based on knowledge of target network. In International conference on knowledge science, engineering and management, (pp.433–441).

  2. Smith, R. (2014). Assault on California Power Station Raises Alarm on Potential for Terrorism. The WallStreet Journal. http://online.wsj.com/news/articles/SB10001424052702304851104579359141941621778

  3. Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., & Zhao, W. (2014). On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed Systems, 25(3), 717–729.

    Article  Google Scholar 

  4. Xiang, Y., Wang, L., Yu, D., & Liu, N. (2015). Coordinated attacks against power grids: Load redistribution attack coordinating with generator and line attacks. In Power and energy society general meeting. IEEE, 26–30 July 2015. Denver, CO, USA, (pp. 1–5).

  5. Li, Z., Shahidehpour, M., Alabdulwahab, A., & Abusorrah, A. (2016). Bilevel model for analyzing coordinated cyber-physical attacks on power systems. IEEE Transactions on Smart Grid, 7(5), 2260–2272.

    Article  Google Scholar 

  6. Liu, S., Mashayekh, S., & Kundur, D. (2013). A framework for modeling cyber-physical switching attacks in smart grid. IEEE Transactions on Emerging Topics in Computing, 1(2), 273–285.

    Article  Google Scholar 

  7. Deng, R., Zhuang, P., & Liang, H. (2017). CCPA: Coordinated cyber-physical attacks and countermeasures in smart grid. IEEE Transactions on Smart Grid, 8(5), 2420–2430.

    Article  Google Scholar 

  8. Li, Z., Shahidehpour, M., Abdulwhab, A., & Abusorrah, A. (2017). Analyzing locally coordinated cyber-physical attacks for undetectable line outages. IEEE Transactions on Smart Grid, 9(1), 35–47.

    Article  Google Scholar 

  9. Liu, S., Feng, X., & Kundur, D. (2011). Switched system models for coordinated cyber-physical attack construction and simulation. In IEEE first international workshop on smart grid modeling and simulation, 17–17 Oct. 2011, Brussels, Belgium (pp. 49–54).

  10. Wei, L., Sarwat, A., Saad, W., & Biswas, S. (2016). Stochastic games for power grid protection against coordinated cyber-physical attacks. IEEE Transactions on Smart Grid, 9(99), 684–694.

    Google Scholar 

  11. Tian, M., Cui, M., Dong, Z., Wang, X. P., & Yin, S. F. (2019). Multilevel programming-based coordinated cyber physical attacks and countermeasures in smart grid. IEEE Access, 7, 9836–9847.

    Article  Google Scholar 

  12. Lakshminarayana, S., Belmega, E. V., & Poor, H. V. (2019). Moving-target defense for detecting coordinated cyber-physical attacks in power grids. IEEE Access, 7, 9836–9847.

    Article  Google Scholar 

  13. Luo, L. L., Guo, D. K., Li, W. X., Xie, J. J., Qing, Y. D., & Zhou, X. L. (2015). Compound graph based hybrid data center topologies. Frontiers of Computer Science (FCS), 9(6), 860–874.

    Article  Google Scholar 

  14. Chen, T., Yang, Z., Liu, Y. H., Guo, D. K., & Luo, X. S. (2011). Localization in non-localizable sensor and ad-hoc networks: A localizability-aided approach. In 30th IEEE international conference on computer communications (INFOCOM), 10–15 April 2011, Shanghai, China (pp. 276–280).

  15. Zeng, D. J., Dai, J., Wang, J., Li, F., & Arun Kumar, S. (2019). Based sentiment analysis by a linguistically regularized CNN with gated mechanism. Journal of Intelligent Fuzzy, 36(5), 3971–3980.

    Article  Google Scholar 

  16. Wu, R., Tang, G. M., Chen, T., Guo, D. K., Luo, L. L., & Kang, W. J. (2021). A profit-aware coalition game for cooperative content caching at the network edge. IEEE Internet of Things Journal, 1–14.

  17. Xia, Z. Q., Fang, Z. W., Gu, K., Wang, J., Tan, J. J., & Wang, G. H. (2021). Effective charging identity authentication scheme based on fog computing in V2G networks. Journal of Information Security and Applications, 58, 102649.

    Article  Google Scholar 

  18. Wang, Q., Li, M., Tang, Y., & Ni, M. (2019). Source-load coordinated reserve allocation strategy considering cyber-attack risks. IEEE Access, 7, 111332–111340.

    Article  Google Scholar 

  19. Wang, Q., Tai, W., Tang, Y., Zhu, H., Zhang, M., & Zhou, D. X. (2019). Coordinated defense of distributed denial of service attacks against the multi-area load frequency control services. Energies, 12(13), 1–19.

    Google Scholar 

  20. Kamal, M., Farajollahi, M., & Mohsenian-Rad, H. (2020). Analysis of cyber attacks against micro-PMUs: The case of event source location identification. In IEEE power and energy society innovative smart grid technologies conference (ISGT), 17–20 Feb. 2020, Washington, DC, USA (pp. 1–5).

  21. Ahmadi, N., Chakhchoukh, Y., & Ishii, H. (2020). Power systems decomposition for robustifying state estimation under cyber attacks. IEEE Transactions on Power Systems. https://doi.org/10.1109/TPWRS.2020.3026951.

    Article  Google Scholar 

  22. Arnaboldi, L., Czekster, R., Metere, R., & Morisset, C. (2019). Modelling load-changing attacks in cyber-physical systems. Systems and Control, 1–15.

  23. Patel, A., & Purwar, S. (2020). Switching attacks on smart grid using non-linear sliding surface. IET Cyber-Physical Systems: Theory and Applications, 4(4), 382–392.

    Article  Google Scholar 

  24. Zhang, Z., Huang, S., Liu, F., & Mei, S. (2020). Pattern analysis of topological attacks in cyber-physical power systems considering cascading outages. IEEE Access, 99, 1.

    Google Scholar 

  25. Ten, C. W., Yamashita, K., Yang, Z., et al. (2018). Impact assessment of hypothesized cyberattacks on interconnected bulk power systems. IEEE Transactions on Smart Grid, 9(5), 4405–4425.

    Article  Google Scholar 

  26. Ayad, A., Farag, H., Youssef, A., & El-Saadany, E. (2020). Cyber-physical attacks on power distribution systems. IET Cyber-Physical Systems: Theory and Applications, 5(2), 218–225. https://doi.org/10.1049/iet-cps.2019.0032.

    Article  Google Scholar 

  27. Moya, C., & Wang, J. (2018). Developing correlation indices to identify coordinated cyber-attacks on power grids. IET Cyber-Physical Systems: Theory and Applications, 3(4), 178–186.

    Article  Google Scholar 

  28. Lal, J., Mackay, S., & Tran, T. (2019). Cyber-physical secured smart grids with partitioned moving-horizon state estimation. In International conference on control, automation, and information science.

  29. Li, Y. (2020). Method for extracting patterns of coordinated network attacks on electric power cps based on temporal-topological correlation. IEEE Access, 8, 57260–57272.

    Article  Google Scholar 

  30. Wang, Y. (2021). Coordinated cyberattacks of microgeneration systems - sciencedirect. Renewable Energy Microgeneration Systems, 1–16.

  31. Khaw, Y. M., Jahromi, A. A., Mohammadreza F. M., Kundur, D., Sanner, S. & Kassouf, M. (2019). Preventing false tripping cyberattacks against distance relays: A deep learning approach. In 2019 IEEE international conference on communications, control, and computing technologies for smart grids (SmartGridComm), 21–23 Oct. 2019, Beijing, China, (pp. 1–6).

  32. Jahromi, A. A., Kemmeugne, A., Kundur, D., & Haddadi, A. (2020). Cyber-physical attacks targeting communication-assisted protection schemes. IEEE Transactions on Power Systems, 35(1), 440–450.

    Article  Google Scholar 

  33. Chen, T., Kar, S., José, & Moura, M. F. (2018). Cyber-physical attacks with control objectives. IEEE Transactions on Automatic Control, 63(5), 1418–1425.

    Article  MathSciNet  Google Scholar 

  34. Segovia, M., Cavalli, A. R., Cuppens, N., Rubio-Hernan, J., & García-Alfaro, J. (2020). Reflective attenuation of cyber-physical attacks. Computer Security, 2020, 1–16.

    Google Scholar 

  35. Ayad, A., Farag, H., Youssef, A., & El-Saadany, E. (2020). Cyber-physical attacks on power distribution systems. IET Cyber-Physical Systems: Theory and Applications, 5(2), 218–225. https://doi.org/10.1049/iet-cps.2019.0032.

    Article  Google Scholar 

  36. Ahmadi, N., Chakhchoukh, Y., & Ishii, H. (2020). Power systems decomposition for robustifying state estimation under cyber attacks. IEEE Transactions on Power Systems, 36(3), 1922–1933.

  37. Fu, J., Wang, L., Hu, B., Xie, K., & Zhou, P. (2018). A sequential coordinated attack model for cyber-physical system considering cascading failure and load redistribution. In 2nd IEEE conference on energy internet and energy system integration (EI2). IEEE, 20–22 Oct. 2018, Beijing, China (pp. 1–6).

  38. Tian, J. W., Wang, B. H., Li, T. Y., Shang, F., & Cao, K. R. (2019). Coordinated cyber physical attacks considering DoS attacks in power systems. International Journal of Robust and Nonlinear Control. https://doi.org/10.1002/rnc.4801.

    Article  MATH  Google Scholar 

  39. Lai, K., Illindala, M., & Subramaniam, K. (2019). A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Applied Energy, 235(1), 204–218.

    Article  Google Scholar 

  40. Lakshminarayana, S., Belmega, E., Veronica, P., & Vincent, H. (2020). Moving-target defense against cyber-physical attacks in power grids via game theory. Computer Science Cryptography and Security, 2020, 1–8.

    Google Scholar 

  41. Kang, W. J., Zhu, P. D., & Liu, X. C. (2020). Integrated defense mechanism based on attack goals against three attack strategies in smart grid. In IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), 6–9 July 2020, Toronto, ON, Canada (pp. 1027–1032).

  42. Xia, Z., Long, G., & Yin, B. (2021). Confidence-aware collaborative detection mechanism for false data attacks in smart grids. Soft Computing, 25, 5607–5618.

    Article  Google Scholar 

  43. Xia, Z., Tan J., Gu K. , Li X. & Jia W. (2021). IDS intelligent configuration scheme against advanced adaptive attacks. IEEE Transactions on Network Science and Engineering, 8(2), 995–1008.

  44. Xiong, B., Yang, K., Zhao, J. Y., & Li, K. Q. (2017). Robust dynamic network traffic partitioning against malicious attacks. Journal of Network and Computer Applications, 87, 20–31.

    Article  Google Scholar 

  45. Xia, Z. Q., Fang, Z. W., Zou, F. F., Wang, J., Sangaiah, A. K., & Jung, K. H. (2019). Research on defensive strategy of realtime price attack based on multiperson zero-determinant. Security and Communication Networks, 1–13.

  46. He, S. M., Zeng, W. N., Xie, K., Yang, H. M., Lai, M. Y., & Su, X. (2017). PPNC: Privacy preserving scheme for random linear network coding in smart grid. KSII Transactions on Internet and Information Systems, 11(3), 1510–1533.

    Google Scholar 

  47. Tang, Q., Xie, M. Z., Yang, K., Luo, Y. S., Zhou, D. D., & Song, Y. (2019). A decision function based smart charging and discharging strategy for electric vehicle in smart grid. Mobile Networks and Applications, pages, 24, 1722–1731.

    Article  Google Scholar 

  48. Xia, Z. Q., Tan, J. J., Gu, K., & Jia, W. J. (2021). Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. Journal of Parallel and Distributed Computing, 147, 236–247.

    Article  Google Scholar 

Download references

Acknowledgements

Supported by National Natural Science Foundation of China under Grant Nos. 61501482, 61572514, 61903049, 42001297 and 61702539, Scientific Research Fund of Hunan Provincial Education Department (19C0160 and 20B057), Changsha Municipal Natural Science Foundation of China under Grant kq2007088, the Open Research Fund of Hunan Provincial Key Laboratory of Network Investigational Technology, Grant No. 2020WLZC003, High-tech Industry Sci. and Tech. Innovation Leading Plan 2020GK2029, Hunan Key Laboratory Open Research Fund Project 2017TP1026, Hunan Provincial Natural Science Foundation of China under Grant No. 2018JJ3611, Changsha Science and Technology Program (Grant K1705007) and NUDT Research Project under Grant No. ZK-18-03-47.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenjie Kang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kang, W., Liu, Q., Zhu, P. et al. Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids. Wireless Netw (2021). https://doi.org/10.1007/s11276-021-02752-6

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-021-02752-6

Keywords

Navigation