Confronting the Threat: Analysis of the Impact of MaDIoT Attacks in Two Power System Models
Author:
Rodríguez-Pérez Néstor1ORCID, Matanza Domingo Javier1ORCID, Sigrist Lukas1ORCID, Rueda Torres Jose Luis2ORCID, López López Gregorio1ORCID
Affiliation:
1. Institute for Research in Technology, Comillas Pontifical University, 28015 Madrid, Spain 2. Faculty of EEMCS, Delft University of Technology, 2628 CD Delft, The Netherlands
Abstract
The increasing penetration of Internet of Things (IoT) devices at the consumer level of power systems also increases the surface of attack for the so-called Manipulation of Demand through IoT (MaDIoT) attacks. This paper provides a comparison of the impact that MaDIoT attacks could have on power systems with different characteristics, such as the IEEE 39-Bus (New England) and the PST-16 system (simplified European model), by assuming that the attacker does not have advanced knowledge of the grid. The results for the IEEE 39-Bus system expand and complement the results obtained by previous work. The simulation results show that these systems present significant differences between them with respect to the success probability of an attack, being in general much higher for the IEEE 39-Bus system. In the PST-16 system, the required number of bots to obtain a certain success probability varies depending on the area attacked. However, a high probability of success does not necessarily mean a high impact on the system. This paper shows that the response to the high-impact MaDIoT attacks of the two models considered is very different as the initial impact of the attack on the system also differs, mainly affecting rotor angles in the PST-16 system, and the frequency in the IEEE 39-Bus.
Funder
European Union’s Horizon Europe Research and Innovation Programme
Subject
Energy (miscellaneous),Energy Engineering and Power Technology,Renewable Energy, Sustainability and the Environment,Electrical and Electronic Engineering,Control and Optimization,Engineering (miscellaneous),Building and Construction
Reference23 articles.
1. Assessing a Potential Cyberattack on the Italian Electric System;Bruno;IEEE Secur. Priv.,2015 2. Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies;Xenofontos;IEEE Internet Things J.,2022 3. Alrawi, O., Lever, C., Antonakakis, M., and Monrose, F. (2019, January 19–23). SoK: Security Evaluation of Home-Based IoT Deployments. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA. 4. Dabrowski, A., Ullrich, J., and Weippl, E.R. (2017, January 9–13). Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA. 5. Soltan, S., Mittal, P., and Poor, H.V. (2018, January 15–17). BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA.
|
|