Towards a Secure and Available Smart Grid Using Intrusion Tolerance

In this paper, we propose an intrusion tolerant architecture to enhance the security of smart grid control centers. The proposed architecture is mainly composed of several modules, including replication and diversity, auditing, compromised/faulty replica detector, reconfiguration and proxy. These modules attempt to enhance the service continuity and availability of critical components in smart grid control centers due to far-reaching, economic and destructive effects of failure, malfunction, power brownout or outage on the normal operation of societies. By adopting a combination of proactive and reactive security measures to tolerate and mitigate the impacts of intrusions, the presented intrusion tolerant system shows improved availability in case of DoS attacks when analytically evaluated and compared with two well-known intrusion tolerant architectures.

[1]  Arun K. Sood,et al.  Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture , 2009 .

[2]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[3]  Miguel Correia,et al.  Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery , 2010, IEEE Transactions on Parallel and Distributed Systems.

[4]  Masera Marcelo,et al.  Chapter 10 - The Way Forward , 2010 .

[5]  Vincent Nicomette,et al.  The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.

[6]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[7]  Arun K. Sood,et al.  Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.

[8]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[9]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[10]  Thomas M. Overman,et al.  High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems , 2011, Proceedings of the IEEE.

[11]  Miguel Correia,et al.  The Crutial Way of Critical Infrastructure Protection , 2008, IEEE Security & Privacy Magazine.

[12]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[13]  Yi Xu,et al.  A survey on the communication architectures in smart grid , 2011, Comput. Networks.

[14]  Henrik Sandberg,et al.  Challenges in Power System Information Security , 2012, IEEE Security & Privacy.

[15]  Raphael Caire,et al.  ICT and Powers Systems: An Integrated Approach , 2010 .

[16]  Arun K. Sood,et al.  A Comparison of Intrusion-Tolerant System Architectures , 2011, IEEE Security & Privacy.

[17]  Feiyi Wang,et al.  Analysis of techniques for building intrusion tolerant server systems , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..