D. Mashima, Binbin Chen, T. Zhou, R. Rajendran, B. Sikdar
{"title":"Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics","authors":"D. Mashima, Binbin Chen, T. Zhou, R. Rajendran, B. Sikdar","doi":"10.1109/SmartGridComm.2018.8587604","DOIUrl":null,"url":null,"abstract":"There are increasing concerns that cyber attackers may inject malicious remote control commands into smart grid systems, as witnessed in the Ukraine incidents in 2015 and 2016 and the recent CrashOverride malware campaign. To counter such risks, command authentication mechanisms, which evaluate the legitimacy and validity of each remote control command based on the up-to-date power grid status and context, can be deployed near the edge of smart grid infrastructure (e.g., in substations) as an additional line of defense. However, many of the state-of the-art command authentication schemes only utilize steady-state power flow information, which does not capture all details of power grid behaviors in the transient state as well as cascading effects. Therefore, they may overlook indication of significant grid instability triggered by malicious commands. In this paper, we propose the use of on-the-fly power system dynamics simulation for command authentication to overcome such limitations. We also discuss system architecture and design considerations on longer simulation latency towards the practical deployment of the enhanced command authentication system.","PeriodicalId":213523,"journal":{"name":"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm.2018.8587604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
There are increasing concerns that cyber attackers may inject malicious remote control commands into smart grid systems, as witnessed in the Ukraine incidents in 2015 and 2016 and the recent CrashOverride malware campaign. To counter such risks, command authentication mechanisms, which evaluate the legitimacy and validity of each remote control command based on the up-to-date power grid status and context, can be deployed near the edge of smart grid infrastructure (e.g., in substations) as an additional line of defense. However, many of the state-of the-art command authentication schemes only utilize steady-state power flow information, which does not capture all details of power grid behaviors in the transient state as well as cascading effects. Therefore, they may overlook indication of significant grid instability triggered by malicious commands. In this paper, we propose the use of on-the-fly power system dynamics simulation for command authentication to overcome such limitations. We also discuss system architecture and design considerations on longer simulation latency towards the practical deployment of the enhanced command authentication system.