A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems
-
Published:2023-08-07
Issue:1
Volume:8
Page:
-
ISSN:2367-2617
-
Container-title:Protection and Control of Modern Power Systems
-
language:en
-
Short-container-title:Prot Control Mod Power Syst
Author:
Hussain Shahbaz, Hussain S. M. SuhailORCID, Hemmati Marziyeh, Iqbal Atif, Alammari Rashid, Zanero Stefano, Ragaini Enrico, Gruosso Giambattista
Abstract
AbstractThe conventional power systems are evolving as smart grids. In recent times cyberattacks on smart grids have been increasing. Among different attacks, False Data Injection (FDI) is considered as an emerging threat that has significant impact. By exploiting the vulnerabilities of IEC 61850 Generic Object-Oriented Substation Events (GOOSE) and Sampled Values (SV) attackers can launch different FDI attacks. In this paper, a real-time set up capable of simulating FDI on GOOSE and SV protocols is developed to evaluate the impact of such attacks on power grid. IEC 62351 stipulates cybersecurity guidelines for GOOSE and SV, but only at communication or Information Technology (IT) level. Hence there is a need to develop a holistic security both at IT and Operation Technology (OT) level. In this regard, a novel sequence content resolver-based hybrid security scheme suitable to tackle FDI attacks on GOOSE and SV is proposed. Furthermore, the computational performance of the proposed hybrid security scheme is presented to demonstrate its applicability to the time critical GOOSE and SV protocols.
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Electrical and Electronic Engineering,Energy Engineering and Power Technology,Safety, Risk, Reliability and Quality
Reference27 articles.
1. Wang, K., Yu, J., Yu, Y., Qian, Y., Zeng, D., Guo, S., et al. (2017). A survey on energy internet: Architecture, approach, and emerging technologies. IEEE Systems Journal, 12, 2403–2416. 2. Aftab, M. A., Hussain, S. S., Ali, I., & Ustun, T. S. (2020). IEC 61850 based substation automation system: A survey. International Journal of Electrical Power & Energy Systems, 120, 106008. 3. Hussain, S., Fernandez, J.H., Al-Ali, A.K., & Shikfa, A. (2021). Vulnerabilities and countermeasures in electrical substations. International Journal of Critical Infrastructure Protection, 100406. 4. Hagman, K., Frisk, L., Menezes, J., & Saha, M.M. (2016). Cyber security measures in protection and control IEDs. 13th International Conference on Development in Power System Protection (DPSP), Edinburgh. 5. Wright, J.G., & Wolthusen, S.G. (2017). Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. Lecture Notes in Computer Science, Springer, Cham, 10242.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|