A Distributed Hierarchy Framework for Enhancing Cyber Security of Control Center Applications

Recent cyber-attacks on power grids highlight the necessity to protect the critical functionalities of a control center vital for the safe operation of a grid. Even in a distributed framework one central control center acts as a coordinator in majority of the control center architectures. Such a control center can become a prime target for cyber as well as physical attacks, and, hence, a single point failure can lead to complete loss of visibility of the power grid. If the control center which runs the critical functions in a distributed computing environment can be randomly chosen between the available control centers in a secure framework, the ability of the attacker in causing a single point failure can be reduced to a great extent. To achieve this, a novel distributed hierarchy based framework to secure critical functions is proposed in this paper. The proposed framework ensures that the data aggregation and the critical functions are carried out at a random location, and incorporates security features such as attestation and trust management to detect compromised agents. A theoretical result is proved on the evolution and convergence of the trust values in the proposed trust management protocol. It is also shown that the system is nominally robust so long as the number of compromised nodes is strictly less than one-half of the nodes minus 1. For demonstration, a Kalman filter-based state estimation using phasor measurements is used as the critical function to be secured. The proposed framework's implementation feasibility is tested on a physical hardware cluster of Parallella boards. The framework is also validated using simulations on the IEEE 118 bus system.

[1]  Farzad Samie,et al.  Edge Computing for Smart Grid: An Overview on Architectures and Solutions , 2018, IoT for Smart Grids.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Brian K. Johnson,et al.  Diagnosis of Outliers and Cyber Attacks in Dynamic PMU-Based Power State Estimation , 2020, IEEE Transactions on Power Systems.

[4]  Sencun Zhu,et al.  Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[5]  Manuel Blum,et al.  Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.

[6]  Gilles Brassard,et al.  Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[7]  Payman Dehghanian,et al.  Electric Power Grid Resilience to Cyber Adversaries: State of the Art , 2020, IEEE Access.

[8]  Ahmad-Reza Sadeghi,et al.  C-FLAT: Control-Flow Attestation for Embedded Systems Software , 2016, CCS.

[9]  Benjamin Jeyasurya,et al.  Dynamic state estimation in power systems using Kalman filters , 2013, 2013 IEEE Electrical Power & Energy Conference.

[10]  Hideaki Ishii,et al.  Cyber Security for Power System State Estimation , 2018, Smart Grid Control.

[11]  Silvio Micali,et al.  An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..

[12]  Xeno Kovah,et al.  New Results for Timing-Based Attestation , 2012, 2012 IEEE Symposium on Security and Privacy.

[13]  V. Borkar Stochastic Approximation: A Dynamical Systems Viewpoint , 2008 .

[14]  Zain-ul-Abdin,et al.  Kickstarting high-performance energy-efficient manycore architectures with Epiphany , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[15]  Danny Dolev,et al.  Distributed Protocols for Leader Election , 2013, DISC.

[16]  Wen Hu,et al.  A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks , 2011, PM2HW2N '11.

[17]  Ying Chen,et al.  Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.

[18]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[19]  An-Yang Lu,et al.  False data injection attacks against state estimation in the presence of sensor failures , 2020, Inf. Sci..

[20]  Mohammad Shahidehpour,et al.  Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .

[21]  Peng Ning,et al.  Remote attestation to dynamic system properties: Towards providing complete system integrity evidence , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[22]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[23]  Nancy A. Lynch,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[24]  Silvio Micali,et al.  Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing , 1996, CRYPTO.

[25]  Dmitry Ishchenko,et al.  Secure Distributed State Estimation for Networked Microgrids , 2019, IEEE Internet of Things Journal.

[26]  Yuancheng Li,et al.  False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid , 2019, IEEE Access.

[27]  Ahmad-Reza Sadeghi,et al.  Invited: Things, trouble, trust: On building trust in IoT systems , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[28]  Claudio Soriente,et al.  On the difficulty of software-based attestation of embedded devices , 2009, CCS.

[29]  Yosuke Todo,et al.  Gimli : A Cross-Platform Permutation , 2017, CHES.

[30]  Dae-Hyun Choi,et al.  False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment , 2018, IEEE Access.

[31]  Jonathan Katz,et al.  On expected constant-round protocols for Byzantine agreement , 2006, J. Comput. Syst. Sci..

[32]  Gary L. Peterson,et al.  An O(nlog n) Unidirectional Algorithm for the Circular Extrema Problem , 1982, TOPL.

[33]  Sagnik Basumallik,et al.  A Taxonomy of Data Attacks in Power Systems , 2020, ArXiv.

[34]  Sebastian Fischmeister,et al.  Kalman Filter Based Secure State Estimation and Individual Attacked Sensor Detection in Cyber-Physical Systems , 2019, 2019 American Control Conference (ACC).

[35]  Navin Kashyap,et al.  Practical Approaches Towards Securing Edge Devices in Smart Grid , 2019, 2019 8th International Conference on Power Systems (ICPS).

[36]  Leszek Gasieniec,et al.  Almost Logarithmic-Time Space Optimal Leader Election in Population Protocols , 2018, SPAA.