Adaptive Cyber-Security Scheme Incorporating QoS Requirements for WAMC Applications

Smart Grid integrates power systems and communication systems to support intelligent control and operation applications. The inputs of those applications are normally measured data collected anywhere in the system and they are transmitted over Wide Area Networks (WAN). Challenges associated with Quality of Service (QoS) and cyber-security in the delivery of these data need to be addressed. In most research work in Smart Grid, QoS and cyber-security are considered separately. However, there is tension between the two: in order to maintain a certain level of QoS security might have to be compromised. The relationship is not, however, deterministic as both QoS and the performance of cyber-security countermeasures may vary over time. To address such challenges, this paper proposes a novel adaptive cyber-security scheme. It quantifies experts opinions of available cyber-security algorithms into a metric called security coverage. Then security coverage is adaptively optimized, by switching cyber-security algorithms, depending on observed data link QoS performance. The scheme is validated with simulation studies on a typical Wide Area Monitoring Control (WAMC) application, power oscillation damping control. The proposed adaptive cyber-security scheme is generally applicable to Smart Grid or power system applications that face varying communication performance during operation.

[1]  P. Kundur,et al.  Power system stability and control , 1994 .

[2]  Thoshitha T. Gamage,et al.  Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid , 2015, IEEE Transactions on Smart Grid.

[3]  G.N. Ericsson Information Security for Electric Power Utilities (EPUs)—CIGRÉ Developments on Frameworks, Risk Assessment, and Technology , 2009, IEEE Transactions on Power Delivery.

[4]  G.T. Heydt,et al.  Latency Viewed as a Stochastic Process and its Impact on Wide Area Power System Control Signals , 2008, IEEE Transactions on Power Systems.

[5]  G. Manimaran,et al.  NASPInet Specification - An Important Step toward Its Implementation , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[6]  Marina Thottan,et al.  Differentiated services QoS in smart grid communication networks , 2011, Bell Labs Technical Journal.

[7]  Salvatore J. Stolfo,et al.  Measuring Security , 2011, IEEE Security & Privacy.

[8]  Wei Liang,et al.  A quantitative study of authentication and QoS in wireless IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[10]  John Wroclawski,et al.  Integrated Service Mappings on IEEE 802 Networks , 2000, RFC.

[11]  G.T. Heydt,et al.  Evaluation of time delay effects to wide-area power system stabilizer design , 2004, IEEE Transactions on Power Systems.

[12]  Jeremy E. Oakley,et al.  Uncertain Judgements: Eliciting Experts' Probabilities , 2006 .

[13]  G. Manimaran,et al.  Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[14]  Kevin Jones,et al.  A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..

[15]  Lawrie Brown,et al.  Computer Security: Principles and Practice , 2007 .

[16]  Fred Baker,et al.  Configuration Guidelines for DiffServ Service Classes , 2006, RFC.

[17]  Lars Nordström,et al.  Design phasor data concentrator as adaptive delay buffer for wide-area damping control , 2015 .

[18]  Kun Zhu,et al.  ICT Architecture Impact on Wide Area Monitoring and Control Systems' Reliability , 2011, IEEE Transactions on Power Delivery.

[19]  Jun Zhang,et al.  Impact of Security on QoS in Communication Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[20]  Farrokh Aminifar,et al.  Wide-area power oscillation damping with a fuzzy controller compensating the continuous communication delays , 2013, IEEE Transactions on Power Systems.

[21]  H. Cramér Mathematical Methods of Statistics (PMS-9), Volume 9 , 1946 .

[22]  B. Chaudhuri,et al.  Wide-area measurement-based stabilizing control of power system considering signal transmission delay , 2004, IEEE Transactions on Power Systems.

[23]  Deepa Kundur,et al.  Impact of cyber attacks on transient stability of smart grids with voltage support devices , 2013, 2013 IEEE Power & Energy Society General Meeting.

[24]  R. Cooke Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .

[25]  A. Bose,et al.  GridStat: A Flexible QoS-Managed Data Dissemination Framework for the Power Grid , 2009, IEEE Transactions on Power Delivery.

[26]  Eric C. Rosen,et al.  Multiprotocol Label Switching Architecture , 2001, RFC.

[27]  Lars Nordström,et al.  Stateful Data Delivery Service for Wide Area Monitoring and Control Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[28]  M. I. Yusof,et al.  Performance analysis of application layer firewall , 2012, 2012 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[29]  Robbert van Renesse,et al.  dcOvercoming Communications Challenges in Software for Monitoring and Controlling Power Systems , 2005, Proceedings of the IEEE.

[30]  John Wroclawski,et al.  The Use of RSVP with IETF Integrated Services , 1997, RFC.

[31]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[32]  Nooritawati Md Tahir,et al.  An analysis and comparison for popular video encryption algorithms , 2015, 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).