New Approaches to Smart Grid Security with SCADA Systems

The use of information technology in electric power grid introduces the vulnerability problem looming the future smart grid. The supervisory control and data acquisition (SCADA) is the first defense, which itself is undermined by potential malicious attacks. This dissertation studies two particular security threats facing the smart grid and SCADA systems: the unobservable attack and the replay attack. The former is well known in fault detection of the power grid and has received renewed interest in the past a few years, while the latter is motivated by the Stuxnet worm allegedly used against the nuclear facilities in Iran. For unobservable attacks, this dissertation adopts the dynamic state estimation approach and treats each bus of the power grid as a dynamic agent. A consensus estimation strategy is proposed to estimate the dynamic states of the power grid, based on which unobservable attacks can be effectively detected. Detection of replay attacks is harder. Two different approaches are proposed in this dissertation. The first is the whitening filter approach that converts the detection of the replay attack into an equivalent white noise detection through whitening a feedback signal. However this approach is less effective, if the replay attack does not change much the whiteness of the filtered feedback signal. Hence a second approach termed as spectrum estimation is proposed. It is shown that the spectrum of the feedback signal in presence of the replay attack can be very different from the case when the replay attack is absent. This approach improves the detection results of the former one. Both are illustrated and examined by the simulation studies.

[1]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[2]  A. Abur,et al.  Improved bad data processing via strategic placement of PMUs , 2005, IEEE Power Engineering Society General Meeting, 2005.

[3]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[4]  Vasant Honavar,et al.  Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[5]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[6]  Mary Grammatikou,et al.  An Architectural Framework for Distributed Intrusion Detection Using Smart Agents , 2004, Security and Management.

[7]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[8]  B. Fardanesh,et al.  Advanced disturbance recording and playback enabled by a distributed dynamic state estimation including bad data detection and topology change identification , 2012, 2012 IEEE Power and Energy Society General Meeting.

[9]  G. Sheblé,et al.  Power generation operation and control — 2nd edition , 1996 .

[10]  Seema Singh,et al.  Applications of phasor measurement units (PMUs) in electric power system networks incorporated with FACTS controllers , 2011 .

[11]  Srikanth H Kamath,et al.  Smart Grid: An Overview , 2015 .

[12]  Xiang Chen,et al.  Output consensus control for heterogeneous multi-agent systems , 2013, 52nd IEEE Conference on Decision and Control.

[13]  Yun Gu,et al.  Bad data detection method for smart grids based on distributed state estimation , 2013, 2013 IEEE International Conference on Communications (ICC).

[14]  Jan F. Kreider,et al.  Distributed Generation : The Power Paradigm for the New Millennium , 2001 .

[15]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[16]  CneKTpaJrbHbIX WIeHOB,et al.  Algebraic Properties of Minimal Degree Spectral Factors * + , 2005 .

[17]  A. Monticelli,et al.  Fast Decoupled State Estimation and Bad Data Processing , 1979, IEEE Transactions on Power Apparatus and Systems.

[18]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[19]  V. Vasudevan,et al.  Agent based Intrusion Detection System: A Computational Biology Approach , 2006, 2006 Annual IEEE India Conference.

[20]  Jeu-Min Lin,et al.  A Static State Estimation Approach Including Bad Data Detection and Identification in Power Systems , 2007, 2007 IEEE Power Engineering Society General Meeting.

[21]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[22]  A. Jain,et al.  A Review of Power System Dynamic State Estimation Techniques , 2008, 2008 Joint International Conference on Power System Technology and IEEE Power India Conference.

[23]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[24]  Lennart Ljung,et al.  System Identification: Theory for the User , 1987 .

[25]  Robert J. Turk Cyber Incidents Involving Control Systems , 2005 .

[26]  Mario Montagna,et al.  Multiple bad data processing by genetic algorithms , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.

[27]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[28]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part III: Implementation , 1970 .

[29]  Juan M. Gers Smart Grid overview , 2013 .

[30]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[31]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[32]  D. Rh International symposium on pain. , 1973 .

[33]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[34]  Patrice Clemente,et al.  A Collaborative Approach for Access Control, Intrusion Detection and Security Testing , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).

[35]  Mi-Ching Tsai,et al.  Robust and Optimal Control , 2014 .

[36]  Yu Er-keng,et al.  A New Approach for Detection and Identification of Multiple Bad Data in Power System State Estimation , 1982, IEEE Transactions on Power Apparatus and Systems.

[37]  J. Capon High-resolution frequency-wavenumber spectrum analysis , 1969 .

[38]  Nei Kato,et al.  An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.

[39]  N.H. Abbasy,et al.  Power system state estimation: ANN application to bad data detection and identification , 1996, Proceedings of IEEE. AFRICON '96.

[40]  R. Romero,et al.  Identifying multiple interacting bad data in power system state estimation , 2005, IEEE Power Engineering Society General Meeting, 2005.

[41]  A. Abur,et al.  Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.

[42]  Hao Zhu,et al.  Sparse Overcomplete Representations for Efficient Identification of Power Line Outages , 2012, IEEE Transactions on Power Systems.

[43]  Randal W. Beard,et al.  Consensus seeking in multiagent systems under dynamically changing interaction topologies , 2005, IEEE Transactions on Automatic Control.

[44]  Sajal K. Das,et al.  Security and Discoverability of Spread Dynamics in Cyber-Physical Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[45]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[46]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.

[47]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part II: Approximate Model , 1970 .

[48]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[49]  Petre Stoica,et al.  Spectral Analysis of Signals , 2009 .

[50]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[51]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[52]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[53]  Guoxiang Gu,et al.  Generalized LQR control and Kalman filtering with relations to computations of inner-outer and spectral factorizations , 2006, IEEE Transactions on Automatic Control.

[54]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[55]  Mohamed G. Gouda,et al.  Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[56]  Jong-Ho Lee,et al.  Detection of replay attacks in smart grid systems , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).

[57]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[58]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[59]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[60]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[61]  Yunzhi Cheng,et al.  Dynamic parameter identification of generators for smart grid development , 2011, 2011 IEEE Power and Energy Society General Meeting.

[62]  Frank L. Lewis,et al.  Optimal Design for Synchronization of Cooperative Systems: State Feedback, Observer and Output Feedback , 2011, IEEE Transactions on Automatic Control.

[63]  Stephanie Forrest,et al.  Computer immunology , 1997, CACM.

[64]  K. Tamine,et al.  Intelligent Agents for Distributed Intrusion Detection System , 2007 .

[65]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[66]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[67]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[68]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[69]  D. Hill,et al.  Generalizations and new proof of the discrete-time positive real lemma and bounded real lemma , 1999 .

[70]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[71]  A. Simoes-Costa,et al.  Bad Data Detection and Identification Techniques Using Estimation Orthogonal Methods , 1982, IEEE Transactions on Power Apparatus and Systems.