基于电力系统动态仿真的命令认证变电站安全

D. Mashima, Binbin Chen, T. Zhou, R. Rajendran, B. Sikdar
{"title":"基于电力系统动态仿真的命令认证变电站安全","authors":"D. Mashima, Binbin Chen, T. Zhou, R. Rajendran, B. Sikdar","doi":"10.1109/SmartGridComm.2018.8587604","DOIUrl":null,"url":null,"abstract":"There are increasing concerns that cyber attackers may inject malicious remote control commands into smart grid systems, as witnessed in the Ukraine incidents in 2015 and 2016 and the recent CrashOverride malware campaign. To counter such risks, command authentication mechanisms, which evaluate the legitimacy and validity of each remote control command based on the up-to-date power grid status and context, can be deployed near the edge of smart grid infrastructure (e.g., in substations) as an additional line of defense. However, many of the state-of the-art command authentication schemes only utilize steady-state power flow information, which does not capture all details of power grid behaviors in the transient state as well as cascading effects. Therefore, they may overlook indication of significant grid instability triggered by malicious commands. In this paper, we propose the use of on-the-fly power system dynamics simulation for command authentication to overcome such limitations. We also discuss system architecture and design considerations on longer simulation latency towards the practical deployment of the enhanced command authentication system.","PeriodicalId":213523,"journal":{"name":"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics\",\"authors\":\"D. Mashima, Binbin Chen, T. Zhou, R. Rajendran, B. Sikdar\",\"doi\":\"10.1109/SmartGridComm.2018.8587604\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are increasing concerns that cyber attackers may inject malicious remote control commands into smart grid systems, as witnessed in the Ukraine incidents in 2015 and 2016 and the recent CrashOverride malware campaign. To counter such risks, command authentication mechanisms, which evaluate the legitimacy and validity of each remote control command based on the up-to-date power grid status and context, can be deployed near the edge of smart grid infrastructure (e.g., in substations) as an additional line of defense. However, many of the state-of the-art command authentication schemes only utilize steady-state power flow information, which does not capture all details of power grid behaviors in the transient state as well as cascading effects. Therefore, they may overlook indication of significant grid instability triggered by malicious commands. In this paper, we propose the use of on-the-fly power system dynamics simulation for command authentication to overcome such limitations. We also discuss system architecture and design considerations on longer simulation latency towards the practical deployment of the enhanced command authentication system.\",\"PeriodicalId\":213523,\"journal\":{\"name\":\"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartGridComm.2018.8587604\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm.2018.8587604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

摘要

人们越来越担心网络攻击者可能会向智能电网系统注入恶意远程控制命令,正如2015年和2016年的乌克兰事件以及最近的CrashOverride恶意软件活动所见证的那样。为了应对此类风险,命令认证机制可以部署在智能电网基础设施边缘附近(例如,在变电站中),作为额外的防线,该机制可以根据最新的电网状态和环境评估每个远程控制命令的合法性和有效性。然而,许多最先进的命令认证方案仅利用稳态潮流信息,而不能捕获电网暂态行为的所有细节以及级联效应。因此,他们可能会忽略由恶意命令触发的严重电网不稳定的迹象。在本文中,我们建议使用动态电力系统动力学仿真来克服这些限制。我们还讨论了系统架构和设计考虑到更长的模拟延迟,以实现增强型命令认证系统的实际部署。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics
There are increasing concerns that cyber attackers may inject malicious remote control commands into smart grid systems, as witnessed in the Ukraine incidents in 2015 and 2016 and the recent CrashOverride malware campaign. To counter such risks, command authentication mechanisms, which evaluate the legitimacy and validity of each remote control command based on the up-to-date power grid status and context, can be deployed near the edge of smart grid infrastructure (e.g., in substations) as an additional line of defense. However, many of the state-of the-art command authentication schemes only utilize steady-state power flow information, which does not capture all details of power grid behaviors in the transient state as well as cascading effects. Therefore, they may overlook indication of significant grid instability triggered by malicious commands. In this paper, we propose the use of on-the-fly power system dynamics simulation for command authentication to overcome such limitations. We also discuss system architecture and design considerations on longer simulation latency towards the practical deployment of the enhanced command authentication system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信