Cyber Security of Smart Grid Infrastructure

Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component. Ensuring a secured smart grid involves with a less possibility of power grid collapse or equipment malfunction. Due to lack of the proper security measures, a major blackout may occur which can even lead to a cascading failure. Therefore, to protect this critical power system infrastructure and to ensure a reliable and an uninterrupted power supply to the end users, smart grid security issues must be addressed with high priority. In a smart grid environment, electric power infrastructure is modernized by incorporating the current and future requirements and advanced functionalities to its consumers. To make the smart grid happen, cyber system is integrated with the physical power system. Although adoption of cyber system has made the grid more energy efficient and modernized, it has introduced cyber-attack issues which are critical for national infrastructure security and customer satisfaction. Due to the cyber-attack, power grid may face operational failures and loss of synchronization. This operational failure may damage critical power system components which may interrupt the power supply and make the system unstable resulting high financial penalties. In this chapter, some recent cyber attack related incidents into a smart grid environment are discussed. The requirements and the state of the art of cyber security issues of a critical power system infrastructure are illustrated elaborately.

[1]  Jianhui Wang,et al.  Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.

[2]  Laurence R. Phillips,et al.  Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices. , 2005 .

[3]  John Lygeros,et al.  Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.

[4]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[5]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[7]  Kun Yu,et al.  The Control and Analysis of Self-Healing Urban Power Grid , 2012, IEEE Transactions on Smart Grid.

[8]  William H. Sanders,et al.  Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[9]  Junshan Zhang,et al.  Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures, and Robustness , 2012, IEEE Transactions on Parallel and Distributed Systems.

[10]  Hadi Saadat,et al.  Power System Analysis , 1998 .

[11]  Zeng Xiangjun,et al.  Context Information-Based Cyber Security Defense of Protection System , 2007, IEEE Transactions on Power Delivery.

[12]  Mariesa L. Crow,et al.  Mitigating Event Confidentiality Violations in Smart Grids: An Information Flow Security-Based Approach , 2013, IEEE Transactions on Smart Grid.

[13]  G. Manimaran,et al.  Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[14]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[15]  Dong Wei,et al.  On Protecting Industrial Automation and Control Systems against Electronic Attacks , 2007, 2007 IEEE International Conference on Automation Science and Engineering.

[16]  Thomas H. Morris,et al.  Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.

[17]  G. Lambert-Torres,et al.  Anomaly detection in power system control center critical infrastructures using rough classification algorithm , 2009, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies.

[18]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[19]  G. Manimaran,et al.  Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.

[20]  Luiz Eduardo Borges da Silva,et al.  Improving Detection Attacks in Electric Power System Critical Infrastructure Usign Rough Classification Algorith , 2007 .

[21]  Yoshikazu Fukuyama,et al.  A hybrid particle swarm optimization for distribution state estimation , 2003, 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491).

[22]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[23]  Farhad Nabhani,et al.  Power system DNP3 data object security using data sets , 2010, Comput. Secur..

[24]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[25]  R. C. Desai,et al.  Modern power system analysis , 1982, Proceedings of the IEEE.

[26]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[27]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[28]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[29]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[30]  Zahir Tari,et al.  SCADASim—A Framework for Building SCADA Simulations , 2011, IEEE Transactions on Smart Grid.

[31]  Dong Wei,et al.  Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.

[32]  Rakesh Bobba,et al.  Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[33]  Laura Hussey Requirements or Recommendations ? Sorting Out NERC CIP , 2015 .

[34]  S. Shankar Sastry,et al.  Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..

[35]  H. H. Happ,et al.  Power System Operation , 1970 .