Cyber-Physical Security Testbed for Substations in a Power Grid

The physical system of the power grids relies on the cyber system for monitoring, control, and operation. As a result, the reliable operation of power grids is highly dependent on the associated cyber infrastructures. The integrated cyber and physical system of power grids creates a large and complex infrastructure. Due to the high penetration of Information and Communications Technology (ICT), Supervisory Control And Data Acquisition (SCADA) systems are highly interconnected with one another, resulting in higher vulnerability with respect to cyber intrusions. Recent reports indicate that cyber-attacks are increasingly likely for the critical infrastructures, e.g., control centers, nuclear power plants, and substations. These attacks may cause significant damages on the power grid. Cyber security research for the power grid is a high priority subject for the emerging smart grid environment.

[1]  Jianhui Wang,et al.  Smart Transmission Grid: Vision and Framework , 2010, IEEE Transactions on Smart Grid.

[2]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[3]  Carol M. Jantzen,et al.  DURABILITY TESTING OF FLUIDIZED BED STEAM REFORMER (FBSR) WASTE FORMS , 2006 .

[4]  Deon Reynders 19 – Wireless technologies , 2004 .

[5]  Chen-Ching Liu,et al.  An intrusion and defense testbed in a cyber-power system environment , 2011, 2011 IEEE Power and Energy Society General Meeting.

[6]  R.E. Mackiewicz,et al.  Overview of IEC 61850 and Benefits , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[7]  Chen-Ching Liu,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees , 2007, 2007 IEEE Power Engineering Society General Meeting.

[8]  Chen-Ching Liu,et al.  Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.

[9]  Chen-Ching Liu,et al.  Cyber-physical security in a substation , 2012, 2012 IEEE Power and Energy Society General Meeting.

[10]  G.N. Ericsson,et al.  Management of information security for an electric power Utility-on security domains and use of ISO/IEC17799 standard , 2005, IEEE Transactions on Power Delivery.

[11]  Federico Milano,et al.  Voltage stability constrained OPF market models considering N−1 contingency criteria , 2005 .

[12]  Geert Deconinck,et al.  ICT resilience of power control systems: experimental results from the CRUTIAL testbeds , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[13]  Mulukutla S. Sarma,et al.  Power System Analysis and Design , 1993 .

[14]  Roberto Setola,et al.  Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers , 2009, Critical Information Infrastructures Security.

[15]  G. Manimaran,et al.  Detection of cyber intrusions using network-based multicast messages for substation automation , 2014, ISGT 2014.

[16]  Richard J. Campbell,et al.  Weather-Related Power Outages and Electric System Resiliency , 2012 .

[17]  Valeriy Vyatkin,et al.  Towards intelligent Smart Grid devices with IEC 61850 Interoperability and IEC 61499 open control architecture , 2010, IEEE PES T&D 2010.

[18]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[19]  Michael G. Bailey,et al.  The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems , 2004, CITC5 '04.

[20]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[21]  Siddhartha Kumar Khaitan,et al.  Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.

[22]  Zahir Tari,et al.  SCADASim—A Framework for Building SCADA Simulations , 2011, IEEE Transactions on Smart Grid.

[23]  Jagath Samarabandu,et al.  An Intrusion Detection System for IEC61850 Automated Substations , 2010, IEEE Transactions on Power Delivery.

[24]  Andrew P. Moore,et al.  Attack Modeling for Information Security and Survivability , 2001 .

[25]  Chen-Ching Liu,et al.  Intruders in the Grid , 2012, IEEE Power and Energy Magazine.

[26]  G. Manimaran,et al.  Integrated Anomaly Detection for Cyber Security of the Substations , 2014, IEEE Transactions on Smart Grid.

[27]  R. E. Mackiewicz Overview of IEC 61850 and Benefits , 2006 .

[28]  Siddhartha Kumar Khaitan,et al.  Cyber physical system approach for design of power grids: A survey , 2013, 2013 IEEE Power & Energy Society General Meeting.

[29]  Salim Hariri,et al.  A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.

[30]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[31]  Kalyan Pavurapu,et al.  A retrofit network transaction data logger and intrusion detection system for transmission and distribution substations , 2010, 2010 IEEE International Conference on Power and Energy.

[32]  Jennifer L. Bayuk,et al.  Cyber Security Policy Guidebook , 2012 .

[33]  Geert Deconinck,et al.  Testbeds for Assessing Critical Scenarios in Power Control Systems , 2008, CRITIS.

[34]  Andreas Junghanns,et al.  Functional Mockup Interface 2.0: The Standard for Tool independent Exchange of Simulation Models , 2012 .

[35]  David M. Nicol,et al.  The Virtual Power System Testbed and Inter-Testbed Integration , 2009, CSET.

[36]  Joseph Weiss,et al.  Cyber Security Policy Guidebook: Bayuk/Cyber Security Policy , 2012 .