Cyber-Physical System Security of a Power Grid: State-of-the-Art

As part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: (1) the structure of CPSs in a smart grid; (2) cyber vulnerability assessment; (3) cyber protection systems; and (4) testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.

[1]  Jie Wu,et al.  Real time anomaly detection in wide area monitoring of smart grids , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[2]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[3]  S. Shankar Sastry,et al.  Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.

[4]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[5]  Dongho Kim,et al.  Experience with DETER: a testbed for security research , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..

[6]  Vittorio Rosato,et al.  Is the topology of the Internet network really fit to sustain its function , 2008 .

[7]  K. McLaughlin,et al.  Intrusion Detection System for IEC 60870-5-104 based SCADA networks , 2013, 2013 IEEE Power & Energy Society General Meeting.

[8]  Gábor Hosszú,et al.  Network-Based Intrusion Detection , 2008 .

[9]  Yang Liu,et al.  Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[10]  John R. Williams,et al.  Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.

[11]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[12]  Ulf Lindqvist,et al.  Using Model-based Intrusion Detection for SCADA Networks , 2006 .

[13]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[14]  Chen-Ching Liu,et al.  An intrusion and defense testbed in a cyber-power system environment , 2011, 2011 IEEE Power and Energy Society General Meeting.

[15]  A. Haslett Electronics , 1948 .

[16]  John Wroclawski,et al.  Current Developments in DETER Cybersecurity Testbed Technology , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[17]  Sukumar Kamalasadan,et al.  A Lyapunov function based optimal hybrid power system controller for improved transient stability , 2016 .

[18]  G. Manimaran,et al.  Integrated Anomaly Detection for Cyber Security of the Substations , 2014, IEEE Transactions on Smart Grid.

[19]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[20]  M.T.O. Amanullah,et al.  Network Security Vulnerabilities in SCADA and EMS , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.

[21]  Kim Fung Tsang,et al.  Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure , 2016, IEEE Transactions on Industrial Informatics.

[22]  Alejandro D. Dominguez-Garcia,et al.  Spoofing GPS Receiver Clock Offset of Phasor Measurement Units , 2013, IEEE Transactions on Power Systems.

[23]  Tanya L. Brewer,et al.  Smart Grid Cyber Security Strategy and Requirements , 2009 .

[24]  Victor C. M. Leung,et al.  Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.

[25]  Rose Qingyang Hu,et al.  A security protocol for advanced metering infrastructure in smart grid , 2014, 2014 IEEE Global Communications Conference.

[26]  Shuai Lu,et al.  PMU-Based Wide-Area Security Assessment: Concept, Method, and Implementation , 2012, IEEE Transactions on Smart Grid.

[27]  Saman A. Zonouz,et al.  A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.

[28]  Carl Eklund,et al.  National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.

[29]  Ward Jewell,et al.  Wireless AMI application and security for controlled home area networks , 2011, 2011 IEEE Power and Energy Society General Meeting.

[30]  David M. Nicol,et al.  The Virtual Power System Testbed and Inter-Testbed Integration , 2009, CSET.

[31]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[32]  G. Manimaran,et al.  Model-based intrustion detection for the smart grid (MINDS) , 2013, CSIIRW '13.

[33]  Toru Ohira,et al.  PHASE TRANSITION IN A COMPUTER NETWORK TRAFFIC MODEL , 1998 .

[34]  Tarek N. Saadawi,et al.  Experimental and theoretical modeling of DNP3 attacks in smart grids , 2015, 2015 36th IEEE Sarnoff Symposium.

[35]  A.G. Phadke,et al.  The Wide World of Wide-area Measurement , 2008, IEEE Power and Energy Magazine.

[36]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[37]  M. Manic,et al.  Improving cyber-security of smart grid systems via anomaly detection and linguistic domain knowledge , 2012, 2012 5th International Symposium on Resilient Control Systems.

[38]  Robert Stone,et al.  CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.

[39]  David M. Nicol,et al.  The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22 , 2012, 2012 IEEE Globecom Workshops.

[40]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[41]  Chen-Ching Liu,et al.  A co-simulation environment for integrated cyber and power systems , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[42]  Chen-Ching Liu,et al.  Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.

[43]  D. Stallknecht FACT SHEET , 2006 .

[44]  Philippe Angays,et al.  Integration of a New Standard: A Network Simulator of IEC 61850 Architectures for Electrical Substations , 2015, IEEE Industry Applications Magazine.

[45]  Guo Zhizhong,et al.  Cyber Security Vulnerability Assessment of Power Industry , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.

[46]  Yawen Fan,et al.  A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids , 2015, IEEE Transactions on Smart Grid.

[47]  Ing-Ray Chen,et al.  Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.

[48]  Giovanni Vigna,et al.  NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[49]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[50]  Yang Liu,et al.  Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes , 2015, IEEE Transactions on Computational Social Systems.

[51]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[52]  Jia-Lun Tsai,et al.  Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.

[53]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[54]  Liu Gao-wang,et al.  Functional Vulnerability Assessment of SCADA Network , 2012, 2012 Asia-Pacific Power and Energy Engineering Conference.

[55]  Deepa Kundur,et al.  A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.

[56]  E.J. Byres,et al.  Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.

[57]  S. Corsi,et al.  A Real-Time Voltage Instability Identification Algorithm Based on Local Phasor Measurements , 2008, IEEE Transactions on Power Systems.