Threat landscape for smart grid systems

Smart Grids are energy delivery networks, constituting an evolution of power grids, in which a bidirectional flow between power providers and consumers is established. These flows support the transfer of electricity and information, in order to support automation actions in the context of the energy delivery network. Insofar, many smart grid implementations and implementation proposals have emerged, with varying degrees of feature delivery and sophistication. While smart grids offer many advantages, their distributed nature and information flow streams between energy producers and consumers enable the launching of a number of attacks against the smart grid infrastructure, where the related consequences may range from economic loss to complete failure of the smart grid. In this paper, we survey the threat landscape of smart grids, identifying threats that are specific to this infrastructure, providing an assessment of the severity of the consequences of each attack type, discerning features that can be utilized to detect attacks and listing methods that can be used to mitigate them.

[1]  Mihui Kim,et al.  Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid , 2012 .

[2]  Lingfeng Wang,et al.  A game-theoretic study of load redistribution attack and defense in power systems , 2017 .

[3]  David M. Laverty,et al.  Telecommunications for Smart Grid: Backhaul solutions for the distribution network , 2010, IEEE PES General Meeting.

[4]  Guang Gong,et al.  Security Challenges in Smart-Grid Metering and Control Systems , 2013 .

[5]  David M. Nicol,et al.  An event buffer flooding attack in DNP3 controlled SCADA systems , 2011, Proceedings of the 2011 Winter Simulation Conference (WSC).

[6]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[7]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[8]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[9]  Benahmed Khelifa,et al.  Security concerns in smart grids: Threats, vulnerabilities and countermeasures , 2015, 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC).

[10]  Zhu Han,et al.  Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.

[11]  Sanjay Goel,et al.  Security Challenges in Smart Grid Implementation , 2015 .

[12]  Miguel Correia,et al.  The CRUTIAL Architecture for Critical Information Infrastructures , 2008, WADS.

[13]  Barbara Filkins,et al.  Secure Architecture for Industrial Control Systems , 2020 .

[14]  Martine Chlela,et al.  Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks , 2018, IEEE Transactions on Smart Grid.

[15]  Husheng Li,et al.  Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis , 2012, ArXiv.

[16]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[17]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[18]  Tanya L. Brewer,et al.  Guidelines for Smart Grid Cybersecurity , 2014 .

[19]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[20]  Stephen B. Wicker,et al.  Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.

[21]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[22]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[23]  Guilin Zheng,et al.  Residential Appliances Identification and Monitoring by a Nonintrusive Method , 2012, IEEE Transactions on Smart Grid.

[24]  Oliver Kosut,et al.  Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[25]  Resul Das,et al.  Cyber-security on smart grid: Threats and potential solutions , 2020, Comput. Networks.

[26]  Miguel Correia,et al.  CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture , 2006, CRITIS.

[27]  Yang Liu,et al.  A survey on bad data injection attack in smart grid , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).

[28]  Oliver Kosut,et al.  Detecting Load Redistribution Attacks via Support Vector Models , 2020, ArXiv.

[29]  Titiek Suryani,et al.  Lightweight and DoS Resistant Multiuser Authentication in Wireless Sensor Networks for Smart Grid Environments , 2019, IEEE Access.

[30]  B. K. Panigrahi,et al.  Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[31]  Jagath Samarabandu,et al.  An Intrusion Detection System for IEC61850 Automated Substations , 2010, IEEE Transactions on Power Delivery.

[32]  Husheng Li,et al.  Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.

[33]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[34]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[35]  Ahmad-Reza Sadeghi,et al.  SEDA: Scalable Embedded Device Attestation , 2015, CCS.

[36]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0 , 2014 .

[37]  Steven M. Bellovin,et al.  Defending against Sequence Number Attacks , 2012, RFC.

[38]  Ross Anderson,et al.  Smart meter security : a survey , 2011 .

[39]  H. Vincent Poor,et al.  Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching , 2015, IEEE Transactions on Dependable and Secure Computing.

[40]  Tirza Routtenberg,et al.  Detection of False Data Injection Attacks in Power Systems with Graph Fourier Transform , 2018, 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[41]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[42]  Tobby Simon,et al.  Critical Infrastructure and the Internet of Things , 2017 .

[43]  Y. Ahmet Sekercioglu,et al.  Security and Smart Metering , 2012, EW.

[44]  Zuyi Li,et al.  Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.

[45]  Mauro Conti,et al.  SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN , 2018, IEEE Transactions on Network and Service Management.

[46]  Walid Saad,et al.  Smart Grid Security: Threats, Challenges, and Solutions , 2016, ArXiv.