A Trust-Influenced Smart Grid: A Survey and a Proposal

A compromised Smart Grid, or its components, can have cascading effects that can affect lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in research areas such as encryption, intrusion detection and prevention, privacy and trust. Even though trust is an essential component of cybersecurity research; it has not received considerable attention compared to the other areas within the context of Smart Grid. As of the time of this study, we observed that there has neither been a study assessing trust within the Smart Grid nor were there trust models that could detect malicious attacks within the substation. With these two gaps as our objectives, we began by presenting a mathematical formalization of trust within the context of Smart Grid devices. We then categorized the existing trust-based literature within the Smart Grid under the NIST conceptual domains and priority areas, multi-agent systems and the derived trust formalization. We then proposed a novel substation-based trust model and implemented a Modbus variation to detect final-phase attacks. The variation was tested against two publicly available Modbus datasets (EPM and ATENA H2020) under three kinds of tests, namely external, internal, and internal with IP-MAC blocking. The first test assumes that external substation adversaries remain so and the second test assumes all adversaries within the substation. The third test assumes the second test but blacklists any device that sends malicious requests. The tests were performed from a Modbus server’s point of view and a Modbus client’s point of view. Aside from detecting the attacks within the dataset, our model also revealed the behaviour of the attack datasets and their influence on the trust model components. Being able to detect all labelled attacks in one of the datasets also increased our confidence in the model in the detection of attacks in the other dataset. We also believe that variations of the model can be created for other OT-based protocols as well as extended to other critical infrastructures.

[1]  Arash Habibi Lashkari,et al.  RiskISM: A Risk Assessment Tool for Substations , 2021, 2021 IEEE 9th International Conference on Smart City and Informatization (iSCI).

[2]  Panagiotis I. Radoglou-Grammatikis,et al.  A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments , 2021, IEEE Transactions on Network and Service Management.

[3]  A. J. Calderón,et al.  Innovative Multi-Layered Architecture for Heterogeneous Automation and Monitoring Systems: Application Case of a Photovoltaic Smart Microgrid , 2021 .

[4]  Antonios Sarigiannidis,et al.  Trust Management in Smart Grid: A Markov Trust Model , 2020, 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST).

[5]  Durgadevi Velusamy,et al.  Water Cycle Algorithm Tuned Fuzzy Expert System for Trusted Routing in Smart Grid Communication Network , 2020, IEEE Transactions on Fuzzy Systems.

[6]  Reza M. Parizi,et al.  An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic , 2020, IEEE Internet of Things Journal.

[7]  Yong-kuo Liu,et al.  A new perspective towards the development of robust data-driven intrusion detection for industrial control systems , 2020, Nuclear Engineering and Technology.

[8]  Pavol Zavarsky,et al.  Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities , 2020, 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).

[9]  Pete Burnap,et al.  Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems , 2020, J. Inf. Secur. Appl..

[10]  Jing Liu,et al.  Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer , 2020, Sensors.

[11]  Resul Das,et al.  Cyber-security on smart grid: Threats and potential solutions , 2020, Comput. Networks.

[12]  YoHan Park,et al.  Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment , 2020, Applied Sciences.

[13]  Neeraj Kumar Singh,et al.  Detection of cyber cascade failure in smart grid substation using advance grey wolf optimization , 2020, Journal of Interdisciplinary Mathematics.

[14]  Karthikeyan Ramasamy,et al.  A Cross-Layer Trust Evaluation Protocol for Secured Routing in Communication Network of Smart Grid , 2020, IEEE Journal on Selected Areas in Communications.

[15]  Dilshad Ara Hossain,et al.  Assuring Cyber Security in Smart Grid Networks by Fuzzy-logic based Trust Management Model , 2019, 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON).

[16]  Ioan Silea,et al.  Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules , 2019, Sensors.

[17]  Adrian Chavez,et al.  Graph-Based Event Classification in Grid Security Gateways , 2019, 2019 Second International Conference on Artificial Intelligence for Industries (AI4I).

[18]  Haider Abbas,et al.  Trust models of internet of smart things: A survey, open issues, and future directions , 2019, J. Netw. Comput. Appl..

[19]  Hussein T. Mouftah,et al.  Optimization of Trust Node Assignment for Securing Routes in Smart Grid SCADA Networks , 2019, IEEE Systems Journal.

[20]  Panagiotis G. Sarigiannidis,et al.  Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems , 2019, IEEE Access.

[21]  Dmitry Ishchenko,et al.  Secure Distributed State Estimation for Networked Microgrids , 2019, IEEE Internet of Things Journal.

[22]  Galina L. Demidova,et al.  An Approach of the JADE and Simulink Interaction to Control Smart Grid Based on the Multi Agent System , 2019, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[23]  Nasser Mozayani,et al.  Utilizing an Agent Based Negotiation Mechanism to Defend Against Jamming Attack in Smart Grid Power Market , 2018, 2018 9th International Symposium on Telecommunications (IST).

[24]  Yousung Kang,et al.  Abnormal Traffic Detection Mechanism for Protecting IIoT Environments , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[25]  Paulo Simões,et al.  Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process , 2018, CRITIS.

[26]  James Obert,et al.  Behavioral Based Trust Metrics and the Smart Grid , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[27]  Ali Yazdian Varjani,et al.  Toward Operator Access Management in SCADA System: Deontological Threat Mitigation , 2018, IEEE Transactions on Industrial Informatics.

[28]  Dariush Abbasinezhad-Mood,et al.  Design and extensive hardware performance analysis of an efficient pairwise key generation scheme for Smart Grid , 2018, Int. J. Commun. Syst..

[29]  B. B. Gupta,et al.  A survey on smart power grid: frameworks, tools, security issues, and solutions , 2017, Annals of Telecommunications.

[30]  Hongjian Sun,et al.  A Fuzzy Logic Trust Model for Secure Routing in Smart Grid Networks , 2017, IEEE Access.

[31]  Christine Cunningham,et al.  Adapting an agent-based model of socio-technical systems to analyze security failures , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).

[32]  Jianhui Wang,et al.  Cybersecurity for distributed energy resources and smart inverters , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[33]  Tianqi Li,et al.  A credibility measurement method of smart grid data , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).

[34]  Deepa Kundur,et al.  A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis , 2016, IEEE Transactions on Smart Grid.

[35]  Ajit Narayanan,et al.  Exploring the Role of Structural Similarity in Securing Smart Metering Infrastructure , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[36]  Ajit Narayanan,et al.  Revealing the Role of Topological Transitivity in Efficient Trust and Reputation System in Smart Metering Network , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[37]  Sibel Adali,et al.  A Survey on Trust Modeling , 2015, ACM Comput. Surv..

[38]  Gordon G. Parker,et al.  Survey of multi-agent systems for microgrid control , 2015, Eng. Appl. Artif. Intell..

[39]  Juan Lopez,et al.  Con-resistant trust for improved reliability in a smart grid special protection system , 2015, 2015 IEEE Power & Energy Society General Meeting.

[40]  Lei Dong,et al.  Research on smart grid simulation framework based on distributed intelligent system , 2014, 2014 International Conference on Power System Technology.

[41]  Ridha Bouallegue,et al.  Multi-Agent modeling of a meters network used in Smart Grid , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).

[42]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0 , 2014 .

[43]  Todd R. Andel,et al.  A Trust-Management Toolkit for Smart-Grid Protection Systems , 2014, IEEE Transactions on Power Delivery.

[44]  Guangyu Hu,et al.  The Smart grid scheduling based on contract net protocol with trust model , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).

[45]  Mohammed Ouassaid,et al.  Demand side management in smart grid by multi-agent systems technology , 2014, 2014 International Conference on Multimedia Computing and Systems (ICMCS).

[46]  Mohammad Ilyas,et al.  The PEV security challenges to the smart grid: Analysis of threats and mitigation strategies , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[47]  Christophe Feltus,et al.  Metamodel for reputation based agents system: case study for electrical distribution SCADA design , 2013, SIN.

[48]  Wenxia Liu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Industrial Electronics.

[49]  Christophe Feltus,et al.  Organizational Security Architecture for Critical Infrastructure , 2013, 2013 International Conference on Availability, Reliability and Security.

[50]  Lingfeng Wang,et al.  Placement of primary-secondary trust nodes in smart grid communication network , 2013, 2013 IEEE Power & Energy Society General Meeting.

[51]  William Liu,et al.  TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[52]  Nelson Rodrigues,et al.  Trust and risk management towards resilient large-scale Cyber-Physical Systems , 2013, 2013 IEEE International Symposium on Industrial Electronics.

[53]  Byungchul Kim,et al.  Optimal power flow and energy-sharing among multi-agent smart buildings in the smart grid , 2013, 2013 IEEE Energytech.

[54]  Wanqing Li,et al.  Measuring the degree of face familiarity based on extended NMF , 2013, TAP.

[55]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[56]  Lingfeng Wang,et al.  Trust System Design Optimization in Smart Grid Network Infrastructure , 2013, IEEE Transactions on Smart Grid.

[57]  William Liu,et al.  Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[58]  William Liu,et al.  Trust-based geographical routing For smart grid communication networks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[59]  Lingfeng Wang,et al.  Efficient trust node aware routing in ZigBee communication network of smart grid , 2012, 2012 10th International Power & Energy Conference (IPEC).

[60]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[61]  Yichi Zhang,et al.  Fault-tolerant optimal routing of trust nodes in smart grid communications , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).

[62]  Yongge Wang,et al.  Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[63]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[64]  Rune Gustavsson,et al.  Trustworthy Injection/Curtailment of DER in Distribution Network maintaining quality of Service , 2011, 2011 16th International Conference on Intelligent System Applications to Power Systems.

[65]  K. Newman,et al.  Trust and reputation approach to smart grid security , 2011, 2011 4th International Symposium on Resilient Control Systems.

[66]  I. Matei,et al.  Trust-based multi-agent filtering for increased Smart Grid security , 2011, 2012 20th Mediterranean Conference on Control & Automation (MED).

[67]  Mohammad A. S. Masoum,et al.  Real-Time Coordination of Plug-In Electric Vehicle Charging in Smart Grids to Minimize Power Losses and Improve Voltage Profile , 2011, IEEE Transactions on Smart Grid.

[68]  Raouf Boutaba,et al.  Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks , 2011, IEEE Transactions on Network and Service Management.

[69]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[70]  R Tonkoski,et al.  Coordinated Active Power Curtailment of Grid Connected PV Inverters for Overvoltage Prevention , 2011, IEEE Transactions on Sustainable Energy.

[71]  J. Initiative SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View , 2011 .

[72]  M. Dohler,et al.  Secure Lossless Aggregation for Smart Grid M2M Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[73]  Fangxing Li,et al.  Small test systems for power system economic studies , 2010, IEEE PES General Meeting.

[74]  Masood Parvania,et al.  Demand Response Scheduling by Stochastic SCUC , 2010, IEEE Transactions on Smart Grid.

[75]  Kenneth M. Hopkinson,et al.  Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme , 2010, IEEE Transactions on Smart Grid.

[76]  K. Schneider,et al.  GridLAB-D: An open-source power systems modeling and simulation environment , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition.

[77]  Venkata S. Irava,et al.  Security, trust, and QoS in next-generation control and communication for large power systems , 2008, Int. J. Crit. Infrastructures.

[78]  Qi Chen,et al.  Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.

[79]  John D. McDonald,et al.  Electric Power Substations Engineering , 2007 .

[80]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[81]  R. Giovanini,et al.  EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.

[82]  A. Conejo,et al.  Locational marginal price sensitivities , 2005, IEEE Transactions on Power Systems.

[83]  A. Yonelinas The Nature of Recollection and Familiarity: A Review of 30 Years of Research , 2002 .

[84]  E. Acha,et al.  Modeling and Analysis of Custom Power Systems by PSCAD/EMTDC , 2001, IEEE Power Engineering Review.

[85]  Reid G. Smith,et al.  The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver , 1980, IEEE Transactions on Computers.

[86]  F. Jung,et al.  Products , 1968, ADHESION ADHESIVES&SEALANTS.

[87]  Modbus Messaging On Tcp Ip Implementation Guide V1 , 2021 .

[88]  R. Ayyanar,et al.  A High Performance Communication Architecture for a Smart Micro-Grid Testbed Using Customized Edge Intelligent Devices (EIDs) With SPI and Modbus TCP/IP Communication Protocols , 2021, IEEE Open Journal of Power Electronics.

[89]  Nell Nelson,et al.  The Impact of Dragonfly Malware on Industrial Control Systems , 2020 .

[90]  Andreas Unterweger,et al.  Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols , 2020, ICISSP.

[91]  José M. Fernandez,et al.  Providing SCADA Network Data Sets for Intrusion Detection Research , 2016, CSET @ USENIX Security Symposium.

[92]  Salman Yussof,et al.  Trust system architecture for securing GOOSE communication in IEC 61850 substation network , 2016 .

[93]  Lingfeng Wang,et al.  Location and communication routing optimization of trust nodes in smart grid network infrastructure , 2012, 2012 IEEE Power and Energy Society General Meeting.

[94]  Agostino Poggi,et al.  JADE: A software framework for developing multi-agent applications. Lessons learned , 2008, Inf. Softw. Technol..

[95]  Yang Jun,et al.  Multi-agent Development Toolkits: An Evaluation , 2004, IEA/AIE.

[96]  K. Cook Trust in Society , 2001 .

[97]  Diego Gambetta Can We Trust Trust , 2000 .

[98]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .