Cyber Attack-Aware Security Hardening of Time Synchronization Technologies in WAMPAC Systems

被引:0
|
作者
Zadsar, Masoud [1 ]
Ghafouri, Mohsen [1 ]
Ameli, Amir [2 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn CIISE, Montreal, PQ, Canada
[2] Lakehead Univ, Dept Elect Engn, Thunder Bay, ON, Canada
关键词
AC State Estimation; Phasor measurement unit; Security hardening; Time-synchronization attacks; Time-synchronization technologies; PHASOR MEASUREMENT; STATE ESTIMATION;
D O I
10.1109/ONCON60463.2023.10430425
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Synchrophasor-based wide-area monitoring, protection, and control (WAMPAC) applications have been recently prevalent in modern power systems to counteract system-wide operational concerns. However, the functionality of the WAMPAC application is significantly contingent on the precision and integrity of time-synchronization mechanisms which are vulnerable to time-synchronization attacks (TSAs). To counter TSAs targeting WAMPAC applications, this paper proposes a preventive countermeasure by attack-aware security hardening of time synchronization technologies (TSTs) in substations houses critical phasor measurement units (PMUs). The attack-aware security hardening problem is formulated as a bi-level operator-attack model. This model aims to minimize post-TSA error of the PMU-based AC state estimation (ACSE), a critical module for a majority of WAMPAC applications, by optimal allocating a set of security hardening respecting the limited operator budget. The operator layer obtains security hardening strategy and under-TSA system states while the attacker layer optimizes attack vector and manipulated phasor measurements. Using the Karush-Kuhn-Tucker (KKT) approach, the developed model is recast to a single-level quadratic mixed-integer linear problem tackle-able using mathematical solvers. The numerical results on the IEEE 39-Bus test system demonstrate that the proposed preventive countermeasure can significantly reduce the attacker's ability to maliciously impact ACSE module.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Attack-Aware Security Function Chaining
    Ifflaender, Lukas
    Beierlieb, Lukas
    Kounev, Samuel
    [J]. ELECTRONICS, 2024, 13 (17)
  • [2] Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks
    Hayel, Yezekael
    Zhu, Quanyan
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 22 - 34
  • [3] Implementing Attack-aware Security Function Chain Reordering
    Ifflaender, Lukas
    Beierlieb, Lukas
    Fella, Nicolas
    Kounev, Samuel
    Rawtani, Nishant
    Lange, Klaus-Dieter
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2020), 2020, : 194 - 199
  • [4] Attack-aware Synchronization-free Data Timestamping in LoRaWAN
    Gu, Chaojie
    Jiang, Linshan
    Tan, Rui
    Li, Mo
    Huang, Jun
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (01)
  • [5] A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks
    Zhang, Rui
    Zhu, Quanyan
    Hayel, Yezekael
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) : 779 - 794
  • [6] A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
    Skorin-Kapov, Nina
    Chen, Jiajia
    Wosinska, Lena
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (03) : 750 - 760
  • [7] Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN
    Gu, Chaojie
    Jiang, Linshan
    Tan, Rui
    Li, Mo
    Huang, Jun
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 100 - 110
  • [8] Attack-Aware Service Provisioning to Enhance Physical-Layer Security in Multi-Domain EONs
    Zhu, Jing
    Zhao, Bin
    Lu, Wei
    Zhu, Zuqing
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 2016, 34 (11) : 2645 - 2655
  • [9] Attack-Aware Multi-Sensor Integration Algorithm for Autonomous Vehicle Navigation Systems
    Lee, Sangjun
    Cho, Yongbum
    Min, Byung-Cheol
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2017, : 3739 - 3744
  • [10] Context-Aware Security Solutions for Cyber Physical Systems
    Wan, Kaiyu
    Alagar, Vangalur
    [J]. Context-Aware Systems and Applications, (ICCASA 2012), 2013, 109 : 18 - 29