Elimination of Undetectable Attacks on Natural Gas Networks

Natural gas pipeline system operations rely heavily on Supervisory Control and Data Acquisition (SCADA) systems. While the SCADA systems introduce many advantages, they also introduce more vulnerabilities by providing opportunities for malicious cyber-attackers. If the cyber-attacks properly modify pressures, flows, and the topology the operator believes is present simultaneously, the cyber-attacks can be undetectable. While this topic has received attention for electrical grids, other cyber-physical systems have seen much less study on this topic. Natural gas networks are employed extensively to power generators in the electrical grid, so attacks on natural gas networks are very important. We have not seen any research on this topic for natural gas networks yet. The particular nonlinear equations which model natural gas networks make the analysis much more difficult. In this paper, we study undetectable attacks on natural gas networks in a signal processing perspective by describing the steady-state mathematical model and sensor measurements. We propose a countermeasure to eliminate undetectable attacks by protecting sensors in specific locations. We present an example that describes how an operator can be misled if the proposed countermeasure is not applied. In such cases, the operator could apply inappropriate control which could damage the system or cause a loss of critical gas supply to customers.

[1]  Shahrokh Valaee,et al.  Digitally Annealed Solution for the Vertex Cover Problem with Application in Cyber Security , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Xian-Da Zhang,et al.  Matrix Analysis and Applications , 2017 .

[3]  Hao Liang,et al.  False Data Injection Attacks With Limited Susceptance Information and New Countermeasures in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[4]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[5]  M. Spivak Calculus On Manifolds: A Modern Approach To Classical Theorems Of Advanced Calculus , 2019 .

[6]  Rick S. Blum,et al.  A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements , 2020, IEEE Transactions on Information Forensics and Security.

[7]  Cheng Wang,et al.  Robust Defense Strategy for Gas–Electric Systems Against Malicious Attacks , 2016, IEEE Transactions on Power Systems.

[8]  Ross Baldick,et al.  Solving the natural gas flow problem using semidefinite program relaxation , 2017, 2017 IEEE Power & Energy Society General Meeting.

[9]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[10]  Rick S. Blum,et al.  Topology Attack Detection in Natural Gas Delivery Networks , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).

[11]  M. Shahidehpour,et al.  Interdependency of Natural Gas Network and Power System Security , 2008, IEEE Transactions on Power Systems.

[12]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[13]  Antonio J. Conejo,et al.  Coordinated Expansion Planning of Natural Gas and Electric Power Systems , 2018, IEEE Transactions on Power Systems.

[14]  Lang Tong,et al.  On topology attack of a smart grid , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).