The IEC 61850 Sampled Measured Values Protocol: Analysis, Threat Identification, and Feasibility of Using NN Forecasters to Detect Spoofed Packets

The operation of the smart grid is anticipated to rely profoundly on distributed microprocessor-based control. Therefore, interoperability standards are needed to address the heterogeneous nature of the smart grid data. Since the IEC 61850 emerged as a wide-spread interoperability standard widely accepted by the industry, the Sampled Measured Values method has been used to communicate digitized voltage and current measurements. Realizing that current and voltage measurements (i.e., feedback measurements) are necessary for reliable and secure noperation of the power grid, firstly, this manuscript provides a detailed analysis of the Sampled Measured Values protocol emphasizing its advantages, then, it identifies vulnerabilities in this protocol and explains the cyber threats associated to these vulnerabilities. Secondly, current efforts to mitigate these vulnerabilities are outlined and the feasibility of using neural network forecasters to detect spoofed sampled values is investigated. It was shown that although such forecasters have high spoofed data detection accuracy, they are prone to the accumulation of forecasting error. Accordingly, this paper also proposes an algorithm to detect the accumulation of the forecasting error based on lightweight statistical indicators. The effectiveness of the proposed methods is experimentally verified in a laboratory-scale smart grid testbed.

[1]  Ravishankar K. Iyer,et al.  Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.

[2]  Vladimiro Miranda,et al.  Spatial-Temporal Solar Power Forecasting for Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[3]  T S Sidhu,et al.  Performance of IEC 61850-9-2 Process Bus and Corrective Measure for Digital Relaying , 2011, IEEE Transactions on Power Delivery.

[4]  Osama A. Mohammed,et al.  Development and application of a real-time testbed for multiagent system interoperability: A case study on hierarchical microgrid control , 2017, 2017 IEEE Power & Energy Society General Meeting.

[5]  G. Manimaran,et al.  Integrated Anomaly Detection for Cyber Security of the Substations , 2014, IEEE Transactions on Smart Grid.

[6]  Wei Zhao,et al.  Bad Data Detection Using Linear WLS and Sampled Values in Digital Substations , 2018, IEEE Transactions on Power Delivery.

[7]  Mohamad El Hariri,et al.  On the Implementation of the IEC 61850 Standard: Will Different Manufacturer Devices Behave Similarly under Identical Conditions? , 2016 .

[8]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[9]  Duncan A. Campbell,et al.  Performance Analysis of IEC 61850 Sampled Value Process Bus Networks , 2013, IEEE Transactions on Industrial Informatics.

[10]  K. McLaughlin,et al.  Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.

[11]  Nei Kato,et al.  An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.

[12]  Burton S. Kaliski A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .

[13]  Kun-Lin Tsai,et al.  An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques , 2017, IEEE Systems Journal.

[14]  Chen-Ching Liu,et al.  Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.

[15]  John R. Williams,et al.  Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.

[16]  Junbo Zhao,et al.  Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.

[17]  H. Vincent Poor,et al.  Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[18]  Yoseba K. Penya,et al.  Evaluating Combined Load Forecasting in Large Power Systems and Smart Grids , 2013, IEEE Transactions on Industrial Informatics.

[19]  Thomas H. Morris,et al.  Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.

[20]  J. Visumathi,et al.  A Secured Key Distribution for Effective File Transfer Using HMAC-SHA Algorithm with Self-Healing Property , 2015 .