Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication

Wide-area monitoring and control (WAMC) systems based on synchrophasor data streams are becoming more and more significant to the operation of the smart power grid. Reliable and secure communication, and higher quality of service (very low latency, high availability, etc.) of data are crucial to the success of WAMC systems. However, the IEEE standard for synchrophasor data communication (IEEE Standard C37.118.2-2011) does not place any restrictions on the choice of transport layer protocols. In light of this, we examine the communication between synchrophasors [phasor measurement units (PMUs)] and phasor data concentrators to analyze potential security vulnerabilities present at the transport layer, and investigate the advantages and disadvantages of both the TCP and UDP protocols, respectively, with an emphasis on security issues. Demonstrations of attacks related to these security vulnerabilities are shown in lab environment and underlying mechanisms are analyzed to determine the capabilities attackers to succeed with them.

[1]  Laurent Joncheray A Simple Active Attack Against TCP , 1995, USENIX Security Symposium.

[2]  Qi Shi,et al.  DiDDeM: a system for early detection of TCP SYN flood attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[3]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[4]  James S. Tiller A technical guide to IPSec virtual private networks , 2000 .

[5]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[6]  D. Fischer,et al.  Developing a communication infrastructure for the Smart Grid , 2009, 2009 IEEE Electrical Power & Energy Conference (EPEC).

[7]  Daniel Jost,et al.  A Constructive Analysis of IPsec , 2014 .

[8]  Eric Rescorla,et al.  The Design and Implementation of Datagram TLS , 2004, NDSS.

[9]  L. Nordstrom,et al.  A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis , 2014, IEEE Transactions on Power Delivery.

[10]  R. Hunt,et al.  TCP/IP security threats and attack methods , 1999, Comput. Commun..

[11]  Kiran Gajrani Performance Assessment of Communication Network in WAMS , 2012 .

[12]  Yinglian Xie,et al.  Collaborative TCP sequence number inference attack: how to crack sequence number under a second , 2012, CCS '12.

[13]  Kenneth G. Paterson,et al.  On the (in)security of IPsec in MAC-then-encrypt configurations , 2010, CCS '10.

[14]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[15]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[16]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[17]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[18]  Bruce Schneier,et al.  A Cryptographic Evaluation of IPsec , 1999 .

[19]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[20]  Barry E. Mullins,et al.  TCP veto: A novel network attack and its Application to SCADA protocols , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[21]  Moustafa Chenine,et al.  Modeling and Simulation of Wide-Area Communication for Centralized PMU-Based Applications , 2011, IEEE Transactions on Power Delivery.

[22]  Zhuoqing Morley Mao,et al.  Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security , 2012, 2012 IEEE Symposium on Security and Privacy.

[23]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[24]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[25]  Steven M. Bellovin,et al.  Simple-VPN: Simple IPsec Configuration , 2010 .

[26]  Kenneth G. Paterson,et al.  Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.

[27]  Kenneth G. Paterson,et al.  Cryptography in Theory and Practice: The Case of Encryption in IPsec , 2006, EUROCRYPT.

[28]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[29]  A. Bose,et al.  A failure to communicate: next generation communication requirements, technologies, and architecture for the electric power grid , 2005, IEEE Power and Energy Magazine.

[30]  Kwang-Cheng Chen,et al.  Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.

[31]  Robert Morris A Weakness in the 4.2BSD Unix† TCP/IP Software , 1999 .

[32]  Kenneth E. Martin Synchrophasor Standards Development - IEEE C37.118 & IEC 61850 , 2011, 2011 44th Hawaii International Conference on System Sciences.