A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks

Security of the smart grid is at risk when the vulnerabilities of the electric vehicle (EV) infrastructure is not addressed properly. As vehicles are becoming smarter and connected, their risk of being compromised is increasing. On various occasions and venues, hacking into smart or autonomous vehicles have been shown to be possible. For most of the time, a compromised vehicle poses a threat to the driver and other vehicles. On the other hand, when the vehicle is electric, the attack may spread to the power grid infrastructure starting from the EV supply equipment (EVSE) all the way up to the utility systems. Traditional isolation-based protection schemes do not work well in smart grid since electricity services have availability constraints and few of the components have physical backups. In this paper, we propose a mixed integer linear programming model that jointly optimizes security risk and equipment availability in the interdependent power and EV infrastructure. We adopt an epidemic attack model to mimic malware propagation. We assume malware spreads during EV charging when an EV is charged from an infected EVSE and then travels and recharges at another EVSE. In addition, it spreads through the communication network of EVSEs. The proposed response model aims to isolate a subset of compromised and likely compromised EVSEs. The response model minimizes the risk of attack propagation while providing a satisfactory level of equipment availability to supply demand. Our analysis shows the theoretical and practical bounds for the proposed response model in smart grid in the face of attacks to the EV infrastructure.

[1]  Filipe Joel Soares,et al.  Integration of Electric Vehicles in the Electric Power System , 2011, Proceedings of the IEEE.

[2]  Deepa Kundur,et al.  A game-theoretic control approach to mitigate cyber switching attacks in Smart Grid systems , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[3]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[4]  Zhu Han,et al.  Smart grid sensor data collection, communication, and networking: a tutorial , 2014, Wirel. Commun. Mob. Comput..

[5]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[6]  Hamed Mohsenian Rad,et al.  Vehicle-to-Aggregator Interaction Game , 2012, IEEE Transactions on Smart Grid.

[7]  Marco Fiore,et al.  Synthetic Mobility Traces for Vehicular Networking , 2013 .

[8]  Ian A. Hiskens,et al.  Achieving Controllability of Electric Loads This paper discusses actively involving highly distributed loads in power system control actions; an overview of system control objectives is provided. , 2011 .

[9]  Melike Erol-Kantarci,et al.  Cyber Attack Protection for a Resilient Electric Vehicle Infrastructure , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[10]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[11]  Weihua Zhuang,et al.  Stochastic Modeling and Optimization in a Microgrid: A Survey , 2014 .

[12]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[13]  Jianying Zhou,et al.  Cyber–Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem , 2014, IEEE Journal on Selected Areas in Communications.

[14]  F.D. Galiana,et al.  A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.

[15]  Zhao Yang Dong,et al.  Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.

[16]  Euijin Choo,et al.  Identifying Malicious Metering Data in Advanced Metering Infrastructure , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.

[17]  Ufuk Topcu,et al.  Optimal decentralized protocol for electric vehicle charging , 2011, IEEE Transactions on Power Systems.

[18]  Mo-Yuen Chow,et al.  A Survey on the Electrification of Transportation in a Smart Grid Environment , 2012, IEEE Transactions on Industrial Informatics.

[19]  Walid Saad,et al.  Resilient PHEV charging policies under price information attacks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[20]  Mohammad Ilyas,et al.  The PEV security challenges to the smart grid: Analysis of threats and mitigation strategies , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[21]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[22]  Zhen Xie,et al.  Optimal response to attacks on the open science grid , 2011, Comput. Networks.

[23]  Jianhui Wang,et al.  A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks , 2015, IEEE Transactions on Power Systems.

[24]  Chris Develder,et al.  Optimizing smart energy control strategies for plug-in hybrid electric vehicle charging , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.

[25]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[26]  Zhu Han,et al.  Effect of stealthy bad data injection on network congestion in market based power system , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[27]  Johan Driesen,et al.  Coordinated charging of multiple plug-in hybrid electric vehicles in residential distribution grids , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[28]  Meikang Qiu,et al.  Secure wireless communication system for smart grid with rechargeable electric vehicles , 2012, IEEE Communications Magazine.

[29]  Zhao Yang Dong,et al.  Attack structural vulnerability of power grids: A hybrid approach based on complex networks , 2010 .

[30]  R. Alvarez,et al.  Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[31]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[32]  Yang Xiao,et al.  Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[33]  Neng Fan,et al.  Two-stage stochastic optimal islanding operations under severe multiple contingencies in power grids , 2014 .

[34]  Saahil Shenoy,et al.  Stochastic optimization of power market forecast using non-parametric regression models , 2015, 2015 IEEE Power & Energy Society General Meeting.

[35]  Jianying Zhou,et al.  On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628 , 2013, IEEE Communications Magazine.

[36]  Natalia Alguacil,et al.  A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..

[37]  Amit Kumar Tamang Coordinated Charging of Plug-in Hybrid Electric Vehicles to Minimize Distribution System Losses , 2013 .