Resilient PMU Network Design in the Face of GPS Spoofing Attacks

GPS spoofing attack on a PMU network and its impact on synchrophasor availability (SA) are investigated. SA is defined as the fraction of time on average the time–synchronized phasors of a bus are correctly available for close to real–time applications such as control or monitoring. It is explored how different factors and strategies, such as attack holding time, coordinated attacks, or capabilities of detecting correct data, can affect the SA. In addition, a PMU placement problem is formulated and solved for establishing a new attack–tolerant PMU network or upgrading an existing PMU network using the concept of bus–centric synchrophasor availability (SA) assessment. The established PMU network is required to satisfy a specified SA requirement for each bus in the face of GPS spoofing attacks and communication interruptions. If it is feasible, the newly designed PMU network guarantees the required average performance level of the PMU network. The IEEE 68–bus system is used as a case study to show the effectiveness of the attack–tolerant PMU placement.

[1]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[2]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[3]  Matthew Ruschmann,et al.  Data-Availability-Constrained Placement of PMUs and Communication Links in a Power System , 2014, IEEE Systems Journal.

[4]  Christos G. Cassandras,et al.  Introduction to Discrete Event Systems , 1999, The Kluwer International Series on Discrete Event Dynamic Systems.

[5]  Luigi Vanfretti,et al.  Vulnerability of Synchrophasor-based WAMPAC Applications’ to Time Synchronization Spoofing , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[6]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[7]  Lingfeng Wang,et al.  Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.

[8]  Morteza Sarailoo,et al.  Cost-Effective Upgrade of PMU Networks for Fault-Tolerant Sensing , 2018, IEEE Transactions on Power Systems.

[9]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[10]  Mohammad Taghi Ameli,et al.  The Effect of Phasor Measurement Units on the Accuracy of the Network Estimated Variables , 2009, 2009 Second International Conference on Developments in eSystems Engineering.

[11]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[12]  Todd E. Humphreys,et al.  Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..

[13]  Yawen Fan,et al.  A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids , 2015, IEEE Transactions on Smart Grid.

[14]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[15]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.