Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems

被引:10
|
作者
Roomi, Muhammad M. [1 ]
Hussain, S. M. Suhail [2 ,3 ]
Mashima, Daisuke [1 ]
Chang, Ee-Chien [4 ]
Ustun, Taha Selim [5 ]
机构
[1] Adv Digital Sci Ctr, Singapore 138602, Singapore
[2] King Fahd Univ Petr & Minerals KFUPM, Elect Engn Dept, Dhahran 31261, Saudi Arabia
[3] King Fahd Univ Petr & Minerals KFUPM, Interdisciplinary Res Ctr Renewable Energy & Power, Dhahran 31261, Saudi Arabia
[4] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
[5] AIST, Fukushima Renewable Energy Inst, Koriyama 9630298, Japan
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 03期
基金
新加坡国家研究基金会;
关键词
IEC Standards; Generators; Synchronization; Standards; Smart grids; Message authentication; Substations; Cyber-attacks; false data injection (FDI) attack; IEC 61850 generic object oriented substation events (GOOSE); message authentication; smart grid; COMMUNICATION; ARCHITECTURE; SIMULATION; GOOSE;
D O I
10.1109/JSYST.2023.3236951
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the introduction of advanced monitoring and communication technologies, the legacy power system is evolving toward fully digitalized smart grid. The IEC 61850 standards have emerged as popular standards for automation of the power grid systems. However, modernization of the power grid has an unintended consequence of increased vulnerability to cyber-attacks. Among the emerging cyber threats, in this article we focus on false data injection attacks against generators in IEC 61850 compliant systems since this subject is not yet intensively studied in literature. We conduct the study on attack vectors against automated control logic for parallel generators and their feasibility, and conduct simulation experiments to demonstrate the attack impact. Based on the identified attack vectors, we further propose an efficient message authentication scheme. We investigate real-world control logic taken from the state-of-the-art smart grid test-bed for enumerating attack vectors. We further create virtual test-bed that is fully compliant to IEC 61850 standards for simulation study. The proposed message authentication schemes are implemented and intensively evaluated to demonstrate advantages over the other schemes. While effectively countering the identified attack vectors, the proposed message authentication scheme improves the latency by 16% compared to the scheme recommended in IEC 62351 standards.
引用
收藏
页码:4603 / 4614
页数:12
相关论文
共 50 条
  • [21] False data injection attacks against smart grid state estimation:Construction, detection and defense
    ZHANG Meng
    SHEN Chao
    HE Ning
    HAN SiCong
    LI Qi
    WANG Qian
    GUAN XiaoHong
    Science China(Technological Sciences), 2019, (12) : 2077 - 2087
  • [22] False data injection attacks against smart grid state estimation:Construction, detection and defense
    ZHANG Meng
    SHEN Chao
    HE Ning
    HAN SiCong
    LI Qi
    WANG Qian
    GUAN XiaoHong
    Science China(Technological Sciences), 2019, 62 (12) : 2077 - 2087
  • [23] Power Grid Resilience Against False Data Injection Attacks
    Yan, Jun
    Tang, Yufei
    Tang, Bo
    He, Haibo
    Sun, Yan
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [24] Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid
    Singh, Sandeep Kumar
    Khanna, Kush
    Bose, Ranjan
    Panigrahi, Bijaya Ketan
    Joshi, Anupam
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (01) : 89 - 97
  • [25] Active resilient defense control against false data injection attacks in smart grids
    Xiaoyuan Luo
    Lingjie Hou
    Xinyu Wang
    Ruiyang Gao
    Shuzheng Wang
    Xinping Guan
    Control Theory and Technology, 2023, 21 : 515 - 529
  • [26] Active resilient defense control against false data injection attacks in smart grids
    Luo, Xiaoyuan
    Hou, Lingjie
    Wang, Xinyu
    Gao, Ruiyang
    Wang, Shuzheng
    Guan, Xinping
    CONTROL THEORY AND TECHNOLOGY, 2023, 21 (04) : 515 - 529
  • [27] Secure and Safe Control of Connected and Automated Vehicles Against False Data Injection Attacks
    Chen, Guoxi
    Wu, Tiejun
    Li, Xinde
    Zhang, Ya
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (09) : 12347 - 12360
  • [28] Security Framework for Cloud Control Systems Against False Data Injection Attacks
    Zhao, Bing
    Zhang, Kexin
    Ogorzalek, Maciej
    Gao, Qing
    Lu, Jinhu
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [29] Asset Analysis of Risk Assessment for IEC 61850-Based Power Control Systems-Part I: Methodology
    Liu, Nian
    Zhang, Jianhua
    Wu, Xu
    IEEE TRANSACTIONS ON POWER DELIVERY, 2011, 26 (02) : 869 - 875
  • [30] Secure Control for Switched Positive Systems Against False Data Injection Attacks
    Xu, Jincan
    Ma, Mu
    Wang, Peng
    Sun, Yaowei
    39TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION, YAC 2024, 2024, : 945 - 949