Data integrity attack and its impacts on voltage control loop in power grid

A modern power system consists of several control and monitoring loops, both automated and manually operated, to ensure that the system remains within safe operating bounds at all times. The focus of this paper is on data integrity attacks on messages exchanged between the control center and actuators in the voltage control loop. Devices such as the ones belonging to the FACTS family (STATCOM, SVC, TCR, etc.), are connected to the system at designated points for voltage control purposes. An attacker could cause a detrimental impact on the system by performing an attack on the control messages sent to these devices which would manipulate its settings. The aim of this paper is to highlight the impact of an attack targeted at such voltage control deices in the system. This paper presents a template that might be used by an attacker with knowledge of system functionality. The paper also explains the sensitivity analysis technique which will help the attacker identify the device to be compromised. A successful attack would result in abnormal voltage conditions in the system, thus violating NERC reliability standards.

[1]  Laurence R. Phillips,et al.  Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices. , 2005 .

[2]  Adriano Valenzano,et al.  Detecting Chains of Vulnerabilities in Industrial Networks , 2009, IEEE Transactions on Industrial Informatics.

[3]  Sujeet Shenoi,et al.  Critical infrastructure protection , 2007 .

[4]  Enrique Acha,et al.  FACTS: Modelling and Simulation in Power Networks , 2004 .

[5]  Kevin Tomsovic,et al.  Designing the Next Generation of Real-Time Control, Communication, and Computations for Large Power Systems , 2005, Proceedings of the IEEE.

[6]  T. M. Chen,et al.  Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..

[7]  Dacfey Dzung,et al.  Network Security for Substation Automation Systems , 2001, SAFECOMP.

[8]  F. Bouffard,et al.  Keeping the lights on and the information flowing , 2009, IEEE Power and Energy Magazine.

[9]  G. Manimaran,et al.  Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.

[10]  J. Giri,et al.  Wanted: A more intelligent grid , 2009, IEEE Power and Energy Magazine.

[11]  S. Shankar Sastry,et al.  Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..

[12]  James D. McCalley,et al.  Coordinated reactive power planning against power system voltage instability , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[13]  P. Kundur,et al.  Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.

[14]  M. Amin,et al.  Security challenges for the electricity infrastructure , 2002 .

[15]  Carson W. Taylor,et al.  Definition and Classification of Power System Stability , 2004 .