Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations

Mohamed Faisal Elrawy, L. Hadjidemetriou, C. Laoudias, M. Michael
{"title":"Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations","authors":"Mohamed Faisal Elrawy, L. Hadjidemetriou, C. Laoudias, M. Michael","doi":"10.1109/CSR57506.2023.10224964","DOIUrl":null,"url":null,"abstract":"Digitalization of power substations is mandatory to increase the efficiency, stability and reliability of smart grids. In digital substations, protective relays (e.g., overcurrent relays) can communicate using the IEC 61850 GOOSE protocol to provide fast response and discrimination capabilities to clear and isolate grid faults (e.g., short circuit events). However, exploitation of the GOOSE protocol vulnerabilities by cyber- attackers may lead to catastrophic failures in power substation equipment. Recent works consider the security vulnerabilities of the GOOSE protocol. However, a holistic approach to study different attack techniques and strategies that can be used by cyber-attackers to hijack communication channels between relays is currently missing. For example, the timing of injecting attack and the operation mode of the protective relay during the attack could lead to different impact. Moreover, a masquerade attack, mimicking the GOOSE protocol behaviour, is harder to be detected. This paper presents a comprehensive study of attack techniques and strategies and their respective impact, utilizing an integrated simulation model of the protective relays and their physical, communication and cybersecurity operations in a digital substation. Moreover, an assessment method for cyber-attacks is proposed based on the impact and the warnings caused by these attacks. Six simulation scenarios are modelled and analyzed, demonstrating the applicability of the proposed method.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Digitalization of power substations is mandatory to increase the efficiency, stability and reliability of smart grids. In digital substations, protective relays (e.g., overcurrent relays) can communicate using the IEC 61850 GOOSE protocol to provide fast response and discrimination capabilities to clear and isolate grid faults (e.g., short circuit events). However, exploitation of the GOOSE protocol vulnerabilities by cyber- attackers may lead to catastrophic failures in power substation equipment. Recent works consider the security vulnerabilities of the GOOSE protocol. However, a holistic approach to study different attack techniques and strategies that can be used by cyber-attackers to hijack communication channels between relays is currently missing. For example, the timing of injecting attack and the operation mode of the protective relay during the attack could lead to different impact. Moreover, a masquerade attack, mimicking the GOOSE protocol behaviour, is harder to be detected. This paper presents a comprehensive study of attack techniques and strategies and their respective impact, utilizing an integrated simulation model of the protective relays and their physical, communication and cybersecurity operations in a digital substation. Moreover, an assessment method for cyber-attacks is proposed based on the impact and the warnings caused by these attacks. Six simulation scenarios are modelled and analyzed, demonstrating the applicability of the proposed method.
数字化变电站继电保护运行安全威胁建模与分析
变电站数字化是提高智能电网效率、稳定性和可靠性的必然要求。在数字变电站中,保护继电器(如过流继电器)可以使用IEC 61850 GOOSE协议进行通信,以提供快速响应和识别能力,以清除和隔离电网故障(如短路事件)。然而,网络攻击者利用GOOSE协议漏洞可能会导致变电所设备发生灾难性故障。最近的工作考虑了GOOSE协议的安全漏洞。然而,目前缺乏一种全面的方法来研究网络攻击者可以用来劫持中继之间通信通道的不同攻击技术和策略。例如,注射攻击的时机和攻击时保护继电器的操作方式会导致不同的影响。此外,模仿GOOSE协议行为的伪装攻击更难被检测到。本文利用数字变电站中保护继电器及其物理、通信和网络安全操作的集成仿真模型,对攻击技术和策略及其各自的影响进行了全面研究。在此基础上,提出了一种基于网络攻击的影响和预警的网络攻击评估方法。对6个仿真场景进行了建模和分析,验证了所提方法的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信