Modelling False Data Injection and Denial of Service Attacks in Cyber-Physical Microgrids

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Abbas Ahmadi, Mahdieh S. Sadabadi, Qobad Shafiee
{"title":"Modelling False Data Injection and Denial of Service Attacks in Cyber-Physical Microgrids","authors":"Abbas Ahmadi,&nbsp;Mahdieh S. Sadabadi,&nbsp;Qobad Shafiee","doi":"10.1049/cps2.70025","DOIUrl":null,"url":null,"abstract":"<p>To ensure normal and efficient operation, microgrids (MGs) must fully integrate information and communication technologies into their control systems. However, this integration introduces vulnerabilities to cyberattacks that can compromise sensitive data and disrupt operations. In MGs, two distinct types of data communication flows pose cybersecurity risks. The first involves local data transfers, which occur directly between devices based on their MAC addresses. The second involves network-wide data transmission using the Internet protocol (IP). When assessing the potential impact of cyberattacks on control systems, it is crucial to consider the specific nature of the protocols in use. This research analyses the impact of cyberattacks on data transmission in MGs and develops appropriate models for well-known attack types. It introduces updated models for false data injection (FDI) and denial of service (DoS) attacks to evaluate their impact on numerical stream data in MGs. Experimental and simulation-based validations are conducted to develop accurate cyberattack models and support the design of resilient control systems. The vulnerability of MGs' secondary control to these cyberattacks is assessed through MATLAB simulations. The results indicate that the impact of each attack depends on factors such as the packet sampling time, the injected data values (for FDI attacks) and the induced delays (for DoS attacks).</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70025","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.70025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

To ensure normal and efficient operation, microgrids (MGs) must fully integrate information and communication technologies into their control systems. However, this integration introduces vulnerabilities to cyberattacks that can compromise sensitive data and disrupt operations. In MGs, two distinct types of data communication flows pose cybersecurity risks. The first involves local data transfers, which occur directly between devices based on their MAC addresses. The second involves network-wide data transmission using the Internet protocol (IP). When assessing the potential impact of cyberattacks on control systems, it is crucial to consider the specific nature of the protocols in use. This research analyses the impact of cyberattacks on data transmission in MGs and develops appropriate models for well-known attack types. It introduces updated models for false data injection (FDI) and denial of service (DoS) attacks to evaluate their impact on numerical stream data in MGs. Experimental and simulation-based validations are conducted to develop accurate cyberattack models and support the design of resilient control systems. The vulnerability of MGs' secondary control to these cyberattacks is assessed through MATLAB simulations. The results indicate that the impact of each attack depends on factors such as the packet sampling time, the injected data values (for FDI attacks) and the induced delays (for DoS attacks).

网络物理微电网中的虚假数据注入和拒绝服务攻击建模
为了确保微电网的正常高效运行,微电网必须将信息和通信技术充分融入其控制系统。然而,这种集成带来了网络攻击的漏洞,可能会损害敏感数据并中断运营。在mgg中,两种不同类型的数据通信流构成网络安全风险。第一种涉及本地数据传输,它直接发生在基于设备MAC地址的设备之间。第二种涉及使用因特网协议(IP)的全网范围的数据传输。在评估网络攻击对控制系统的潜在影响时,考虑所使用协议的具体性质至关重要。本研究分析了网络攻击对mgg中数据传输的影响,并针对已知的攻击类型开发了适当的模型。它引入了虚假数据注入(FDI)和拒绝服务(DoS)攻击的更新模型,以评估它们对mg中数值流数据的影响。实验和基于仿真的验证进行开发准确的网络攻击模型和支持弹性控制系统的设计。通过MATLAB仿真,评估了MGs二次控制对这些网络攻击的脆弱性。结果表明,每次攻击的影响取决于数据包采样时间、注入的数据值(针对FDI攻击)和引起的延迟(针对DoS攻击)等因素。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Cyber-Physical Systems: Theory and Applications
IET Cyber-Physical Systems: Theory and Applications Computer Science-Computer Networks and Communications
CiteScore
5.40
自引率
6.70%
发文量
17
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信