{"title":"Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems","authors":"Shuvangkar Chandra Das, Tuyen Vu, Herbert Ginn","doi":"10.1049/cps2.12106","DOIUrl":null,"url":null,"abstract":"<p>This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12106","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.