Identifying counterfeit smart grid devices: A lightweight system level framework

The use of counterfeit smart grid devices throughout the smart grid communication infrastructure represents a real problem. Hence, monitoring and early detection of counterfeit smart grid devices is critical for protecting smart grid's components and data. To address these concerns, in this paper, we introduce a novel system level approach to identify counterfeit smart grid devices. Specifically, our approach is a configurable framework that combines system and function call tracing techniques and statistical analysis to detect counterfeit smart grid devices based on their behavioural characteristics. Moreover, we measure the efficacy of our framework with a realistic testbed that includes both resource-limited and resource-rich counterfeit devices. In total, we analyze six different counterfeit devices in our testbed. The devices communicate via an open source version of the IEC61850 protocol suite (i.e., libiec61850). Experimental results reveal an excellent rate on the detection of smart grid counterfeit devices. Finally, the performance analysis demonstrates that the use of the proposed framework has minimal overhead on the smart grid devices' computing resources.

[1]  Weibo Gong,et al.  Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  Zachary A. Collier,et al.  Cybersecurity Standards: Managing Risk and Creating Resilience , 2014, Computer.

[3]  Michael A. Temple,et al.  Physical layer identification of embedded devices using RF-DNA fingerprinting , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[4]  Mark Mohammad Tehranipoor,et al.  Anti-counterfeit Techniques: From Design to Resign , 2013, 2013 14th International Workshop on Microprocessor Test and Verification.

[5]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[6]  R. Sekar,et al.  A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[7]  John O'Brien,et al.  Counterfeit mobile devices - the duck test , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[8]  Salvatore J. Stolfo,et al.  Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[9]  Yiorgos Makris,et al.  Counterfeit electronics: A rising threat in the semiconductor manufacturing industry , 2013, 2013 IEEE International Test Conference (ITC).

[10]  Xinyu Yang,et al.  Towards optimal PMU placement against data integrity attacks in smart grid , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[11]  Miodrag Potkonjak,et al.  Can EDA combat the rise of electronic counterfeiting? , 2012, DAC Design Automation Conference 2012.

[12]  Carl Kriger,et al.  A Detailed Analysis of the GOOSE Message Structure in an IEC 61850 Standard-Based Substation Automation System , 2013, Int. J. Comput. Commun. Control.

[13]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[14]  Anna Magdalena Kosek,et al.  Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model , 2016, 2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG).

[15]  Suman Jana,et al.  Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts , 2015, HotOS.

[16]  Raheem A. Beyah,et al.  A network-based approach to counterfeit detection , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[17]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[18]  Yang Liu,et al.  A cyber-physical monitoring system for attack detection in smart grid , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[19]  Michal Frivaldsky,et al.  Detection of electronic counterfeit components , 2015, 2015 16th International Scientific Conference on Electric Power Engineering (EPE).