+1 Recommend
1 collections

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Data Integrity Attacks in Smart Grid Wide Area Monitoring

      , ,
      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)
      Cyber Security Research
      23 - 25 August 2016
      Cybersecurity, Data Integrity Attacks, Failure Scenarios, Wide Area Monitoring System


            A smart grid requires the implementation of ICT technologies in order to incorporate new functions into electricity grid monitoring and control. Wide Area Monitoring Systems (WAMSs) are used to measure synchrophasor data at different locations and give operators a near-real-time picture of what is happening in the system. The measurement data is periodically collected via communication channels to monitor, predict and control the power consumption, and detect any problems in the power grid. Attacks on WAMSs can trigger wrong decisions and create dangerous failures in the smart grid system. In this paper, we investigate data integrity attacks at different attack entry points of a WAMS, their impacts on the smart grid system, and existing mitigation strategies. We conclude from our study that the existing techniques, methodologies and mechanisms are not effective enough to detect or mitigate some attacks.


            Author and article information

            August 2016
            August 2016
            : 74-83
            [0001]AIT Austrian Institute of Technology

            Vienna, Austria
            [0002]TU Wien

            Vienna, Austria
            © Paudel et al. Published by BCS Learning & Development Ltd. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            4th International Symposium for ICS & SCADA Cyber Security Research 2016
            Queen’s Belfast University, UK
            23 - 25 August 2016
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2016.9
            Self URI (journal page): https://ewic.bcs.org/
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Cybersecurity,Data Integrity Attacks,Failure Scenarios,Wide Area Monitoring System


            1. et al 2010 IEC 61850 Communication Networks and Systems in Substations

            2. et al 2014 Risks and security of Internet and systems 9th International Conference, CRiSIS

            3. 2014 Cyber security of smart grid infrastructure

            4. et al 2012 Enhancing Grid Measurements: Wide Area Measurement Systems, NASPInet, and Security IEEE Power and Energy Magazine 10 1 67 73

            5. CENELEC 2012 CEN-CENELEC-ETSI Smart Grid Coordination Group - First Set of Standards

            6. et al 2008 NASPI Phasor Gateways and Their Relationship to Phasor Data Concentrators

            7. CISCO 2010 White paper - substation automation for the smart grid

            8. CISCO 2016 Snort-intrusion prevention system capable of real-time traffic analysis and packet logging

            9. et al 2012 Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions IEEE Signal Processing Magazine 29 5 106 115

            10. et al 2015 Integrity attack detection in PMU networks using static state estimation algorithm PowerTech, 2015 IEEE Eindhoven 1 6

            11. IEC-60870-5-101 Transmission protocols - Section 101: Companion standard for basic Telecontrol tasks

            12. IEC-60870-5-103 Transmission protocols - Companion standard for the informative interface of protection equipment

            13. IEC-60870-5-104 Transmission protocols - Network access for IEC 60870-5-101 using standard transport profiles

            14. IEC-61850 Communication Networks and Systems in Substations

            15. IEC-62351-1 2007 Part 1: Communication network and system security - introduction to security issues

            16. IEC-62351-6 2007 Part 6: Security for 61850.

            17. IEC 62351 2007 Part 1: Communication network and system security - Introduction to security issues Geneva, Switzerland

            18. IEC-TR-61850-90-1 2016 UseofIEC61850forthe communication between substations

            19. IEC-TR-61850-90-2 2016 Using IEC 61850 for communication between substations and control centres

            20. IEEE-C37.118.1 2011 IEEE Standard for Synchrophasor Measurements for Power Systems.IEEE-Standard-C37.118.1-2011 (Revision of IEEE Standard C37.118-2005)

            21. IEEE-C37.118.2 2011 IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE-Standard-C37.118.2-2011 (Revision of IEEE Standard C37.118-2005

            22. et al 2010 Cyber Situational Awareness - Issues and Research Advances in Information Security Springer 2010

            23. et al 2012 Nescor wide area monitoring, protection, and control systems (WAMPAC) standards for cyber security requirements

            24. 2011 Strategic Protection Against Data Injection Attacks on Power Grids IEEE Transactions on Smart Grid 2 2 326 333

            25. et al 2015 Scalable security event aggregation for situation analysis Big Data Computing Service and Applications (BigDataService) 2015 IEEE First International Conference 14 23

            26. et al 2015 A behavior-based intrusion detection technique for smart grid infrastructure PowerTech 2015 IEEE Eindhoven 1 6

            27. 2009 False Data Injection Attacks Against State Estimation in Electric Power Grids Proceedings of the 16th ACM Conference on Computer and Communications Security 21 32

            28. NASPInet 2009 Phasor gateways technical specifications for north American synchro-phasor initiative network

            29. National Electric Sector Cybersecurity Organization Resources NESCOR and NESCOR Working Technical Group 1 TWG1 2013 Electric sector failure scenarios and impact analyses

            30. et al 2015 Security-enhanced data aggregation against malicious gateways in smart grid 2015 IEEE Global Communications Conference 1 6

            31. A mechanism for detecting data manipulation attacks on PMU data Communication Systems (ICCS) 2014 IEEE International Conference 253 257

            32. 2014 Real-time detection of packet drop attacks on synchrophasor data Smart Grid Communications, 2014 IEEE International Conference 896 901

            33. 2008 Synchronized Phasor Measurements and Their Applications Power Electronics and Power Systems Springer US 2008

            34. 2013 Mar A noninvasive threat analyzer for advanced metering infrastructure in smart grid IEEE Transactions on Smart Grid 4 1 273 87

            35. et al 2016 Nescor guide to penetration testing for electric utilities

            36. 2013 A cyberphysical monitoring system for attack detection in smart grid Computer Communications Workshops, 2013 IEEE Conference 33 34

            37. 2015 Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs The Computing Research Repository

            38. 2009 Evaluating multiple reliability indices of regional networks in wide area measurement system Electric Power Systems Research 79 10 1353 1359

            39. 2014 Security challenges for wide area monitoring in smart grids Elektrotechnik und Informationstechnik

            40. 2013 Synchrophasor communication Elektrotechnik und Informationstechnik

            41. et al Development of tva superpdc: Phasor applications, tools, and event replay Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century 2008 IEEE 1 8


            Comment on this article