Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Shuvangkar Chandra Das, Tuyen Vu, Herbert Ginn
{"title":"Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems","authors":"Shuvangkar Chandra Das,&nbsp;Tuyen Vu,&nbsp;Herbert Ginn","doi":"10.1049/cps2.12106","DOIUrl":null,"url":null,"abstract":"<p>This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12106","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.

Abstract Image

电力系统中同步相量网络安全评估的可扩展网络物理测试平台
本文提出了一种基于同步相量的实时网络物理电力系统测试平台,该平台采用了一种新颖的安全评估工具pySynphasor,可以在相量测量单元(PMU)上模拟不同的真实攻击场景。该试验台着重于使用不同组件进行实时网络安全仿真,包括实时数字模拟器、虚拟机(VM)、通信网络模拟器和数据包处理工具。基于脚本的虚拟机部署和软件定义网络仿真,提供了一个高度可扩展的网络物理测试平台,可以模拟真实电力系统在不同攻击场景下的情况,如地址解析协议(ARP)投毒攻击、中间人攻击(MITM)攻击、虚假数据注入攻击(FDIA)攻击和窃听攻击。已经实现了一个开源pySynphasor模块来分析IEEE C37.118.2协议的安全漏洞。本文还提出了一个交互式框架,用于利用pySynphasor模块将虚假数据注入到现实系统中,该框架可以解剖和重构C37.118.2数据包。因此,它扩展了测试和开发基于pmu的系统并分析其安全漏洞的潜力,使电力工业和学术界受益。以FDIA攻击PMU测量和不良数据检测技术为例,展示了该试验台的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Cyber-Physical Systems: Theory and Applications
IET Cyber-Physical Systems: Theory and Applications Computer Science-Computer Networks and Communications
CiteScore
5.40
自引率
6.70%
发文量
17
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信