Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures

Smart energy systems are becoming an important component of smart cities. The wide adoption of existing computing technologies and communication standards by a smart energy system exposes it to the plethora of threats that exist in cyberspace. In this article, we investigate the vulnerabilities and threats associated with smart energy system components, including Internet of Things enabled devices, as well as relevant communication standards, and we discuss countermeasures against adversarial attacks. We found that the existing literature has reported various attacks, including modification, denial-of-service, malware, and message replay, which can cause malfunctioning of different components of a smart energy system. In addition, we propose a framework for securing the physical layer of the smart energy system. The framework is based on advanced key generation, machine learning, and physical layer security techniques, which enhance the security of smart energy systems across different applications.

[1]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[2]  Ramin Moslemi,et al.  Design of robust profitable false data injection attacks in multi-settlement electricity markets , 2017 .

[3]  Ibrahim Khalil,et al.  Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure , 2017, IET Wirel. Sens. Syst..

[4]  William H. Sanders,et al.  Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud , 2018, IEEE Journal of Selected Topics in Signal Processing.

[5]  Lingfeng Wang,et al.  Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.

[6]  Sherali Zeadally,et al.  Towards Privacy Protection in Smart Grid , 2012, Wireless Personal Communications.

[7]  Zhao Yang Dong,et al.  Distributed meter data aggregation framework based on Blockchain and homomorphic encryption , 2019, IET Cyper-Phys. Syst.: Theory & Appl..

[8]  Rongxing Lu,et al.  Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era , 2019, IEEE Transactions on Smart Grid.

[9]  Lei Zhang,et al.  A Privacy-Preserving Distributed Smart Metering Temporal and Spatial Aggregation Scheme , 2019, IEEE Access.

[10]  Song Tan,et al.  Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.

[11]  Xin Wang,et al.  Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.

[12]  Xiaochen Tang,et al.  Secure wireless monitoring and control systems for smart grid and smart home , 2012, IEEE Wireless Communications.

[13]  Imrich Chlamtac,et al.  Smart Meter Data Privacy: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[14]  Mohammad Shahidehpour,et al.  Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems , 2017, IEEE Transactions on Smart Grid.

[15]  Zhu Han,et al.  Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.

[16]  Visvakumar Aravinthan,et al.  Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network , 2018, IEEE Transactions on Smart Grid.

[17]  Min Chen,et al.  Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.

[18]  Xuemin Sherman Shen,et al.  A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.

[19]  Bryan T. Richardson,et al.  Microgrid Cyber Security Reference Architecture , 2015 .

[20]  Nasser-Eddine Rikli,et al.  Design of a trust security model for smart meters in an urban power grid network , 2014, Q2SWinet '14.

[21]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[22]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[23]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[24]  Jinfu Chen,et al.  Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders , 2019, IEEE Transactions on Smart Grid.

[25]  Zhao Yang Dong,et al.  Composite FDIA and topology attack on the electricity market , 2017, 2017 IEEE Power & Energy Society General Meeting.

[26]  Nicanor Quijano,et al.  Control Systems for the Power Grid and Their Resiliency to Attacks , 2014, IEEE Security & Privacy.

[27]  Jitesh H. Panchal,et al.  Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs , 2015, IEEE Transactions on Smart Grid.

[28]  Sherali Zeadally,et al.  Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..

[29]  Thomas H. Morris,et al.  Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.

[30]  Wei Guo,et al.  A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[31]  Fernando A. Kuipers,et al.  Security Vulnerabilities in LoRaWAN , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[32]  Stefano Tomasin,et al.  Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[33]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[34]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.

[35]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[36]  Mohsen Guizani,et al.  An Optimizing and Differentially Private Clustering Algorithm for Mixed Data in SDN-Based Smart Grid , 2019, IEEE Access.

[37]  Zahir Tari,et al.  Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids , 2017, IEEE Transactions on Industrial Informatics.

[38]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[39]  Mark Zeller,et al.  Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.

[40]  Jianhui Wang,et al.  A Hierarchical Framework for Smart Grid Anomaly Detection Using Large-Scale Smart Meter Data , 2018, IEEE Transactions on Smart Grid.

[41]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[42]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[43]  Mourad Debbabi,et al.  Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems , 2018, IEEE Transactions on Smart Grid.

[44]  Yacine Challal,et al.  Scalable Multi-group Key Management for Advanced Metering Infrastructure , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[45]  Mohammad Hesam Tadayon,et al.  A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.