A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures

The scope, scale, and intensity of real, as well as potential, attacks on the Smart Grid have been increasing and thus gaining more attention. An important component of the Smart Grid cybersecurity efforts addresses the availability and access to the power and related information and communications infrastructures. In this paper, we provide a holistic and methodical presentation of taxonomies and solutions for DoS attacks in the Smart Grid. The emerging threats of cybertattacks are raising serious concerns for many critical infrastructures. In this regards, The scope, scale, and intensity of real as well as potential attacks on the Smart Grid are on the rise and with devastating consequences. An important component of Smart Grid cyberse-curity efforts addresses the availability and access to the power and related information and communications infrastructures. In this paper, a holistic and methodical presentation of taxonomies and solution for DoS attacks in the Smart Grid is presented.

[1]  David M. Nicol,et al.  The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22 , 2012, 2012 IEEE Globecom Workshops.

[2]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[3]  György Dán,et al.  Detection and localization of targeted attacks on fully distributed power system state estimation , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[4]  Jean-Yves Le Boudec,et al.  Cyber-secure communication architecture for active power distribution networks , 2014, SAC.

[5]  Deepa Kundur,et al.  A flocking-based model for DoS-resilient communication routing in smart grid , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[6]  Mihui Kim,et al.  Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid , 2012 .

[7]  Sakir Sezer,et al.  Intrusion Detection System for network security in synchrophasor systems , 2013 .

[8]  Mark Handley,et al.  Steps towards a DoS-resistant internet architecture , 2004, FDNA '04.

[9]  Vahid Madani,et al.  Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks , 2011, Proceedings of the IEEE.

[10]  Mohsen Guizani,et al.  An enhanced public key infrastructure to secure smart grid wireless communication networks , 2014, IEEE Network.

[11]  Neeraj Suri,et al.  Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective , 2010, MOBILIGHT.

[12]  T. H. Morris,et al.  Cyber security recommendations for wide area monitoring, protection, and control systems , 2012, 2012 IEEE Power and Energy Society General Meeting.

[13]  Xiaodong Wang,et al.  Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.

[14]  Binbin Chen,et al.  Delay makes a difference: Smart grid resilience under remote meter disconnect attack , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[15]  Zhu Han,et al.  Manipulating the electricity power market via jamming the price signaling in smart grid , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[16]  S. Mauw,et al.  Specification-based intrusion detection for advanced metering infrastructures , 2022 .

[17]  Ross Anderson,et al.  Who Controls the off Switch? , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[18]  Andrew P. Martin,et al.  Hardware Security for Device Authentication in the Smart Grid , 2012, SmartGridSec.

[19]  Peter Xiaoping Liu,et al.  Denial-of-Service (dos) attacks on load frequency control in smart grids , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[20]  Márk Félegyházi,et al.  CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot , 2014, SmartGridSec.

[21]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[22]  Kijoon Chae,et al.  Secure Aggregation and Attack Detection for Smart Grid System , 2013, 2013 16th International Conference on Network-Based Information Systems.

[23]  György Dán,et al.  Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.

[24]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[25]  Xudong Wang,et al.  Security Framework for Wireless Communications in Smart Distribution Grid , 2011, IEEE Transactions on Smart Grid.

[26]  Dapeng Wu,et al.  Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.

[27]  Walid Saad,et al.  Resilient PHEV charging policies under price information attacks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[28]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[29]  Li Pan,et al.  Puppet attack: A denial of service attack in advanced metering infrastructure network , 2016, J. Netw. Comput. Appl..

[30]  Bernardi Pranggono,et al.  Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure , 2015, Wireless Personal Communications.

[31]  G. Manimaran,et al.  Detection of cyber intrusions using network-based multicast messages for substation automation , 2014, ISGT 2014.

[32]  Husheng Li,et al.  A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[33]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[34]  Zhu Han,et al.  Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.

[35]  Anna Scaglione,et al.  Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[36]  Klara Nahrstedt,et al.  Time Valid One-Time Signature for Time-Critical Multicast Data Authentication , 2009, IEEE INFOCOM 2009.

[37]  Zhuo Lu,et al.  Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.

[38]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[39]  Wonsuck Lee,et al.  MAC aggregation protocols resilient to DoS attacks , 2012, Int. J. Secur. Networks.

[40]  David M. Nicol,et al.  An event buffer flooding attack in DNP3 controlled SCADA systems , 2011, Proceedings of the 2011 Winter Simulation Conference (WSC).

[41]  William H. Sanders,et al.  AMI threats, intrusion detection requirements and deployment recommendations , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[42]  William H. Sanders,et al.  Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.