S. Hussain, A. Iqbal, S. Zanero, S. M. Suhail Hussain, Abdullatif Shikfa, E. Ragaini, R. Alammari, I. Khan
{"title":"一种利用实时数字仿真验证网络攻击并评估其对电力系统影响的新方法","authors":"S. Hussain, A. Iqbal, S. Zanero, S. M. Suhail Hussain, Abdullatif Shikfa, E. Ragaini, R. Alammari, I. Khan","doi":"10.1109/TPEC51183.2021.9384911","DOIUrl":null,"url":null,"abstract":"The traditional power systems are rapidly digitalized and automated for increased monitoring and control. This automation of power system communication has made it possible to monitor and control operations remotely in a plant. However, this also opens up an exploitation vector for attackers, after they gain access to the substation network. This scenario can only be investigated through an in-depth study of communication protocols and control authority concepts associated with power system. IEC 61850 has emerged as the most popular protocol for power system communication. In this paper, we investigate realtime simulation of power systems with IEC 61850 based communication, in order to devise a testbed that can be used to validate false data injection cyberattacks and evaluate their impact. Based on the results, we discuss possible countermeasures to such attacks and outline future research directions.","PeriodicalId":354018,"journal":{"name":"2021 IEEE Texas Power and Energy Conference (TPEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation\",\"authors\":\"S. Hussain, A. Iqbal, S. Zanero, S. M. Suhail Hussain, Abdullatif Shikfa, E. Ragaini, R. Alammari, I. Khan\",\"doi\":\"10.1109/TPEC51183.2021.9384911\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The traditional power systems are rapidly digitalized and automated for increased monitoring and control. This automation of power system communication has made it possible to monitor and control operations remotely in a plant. However, this also opens up an exploitation vector for attackers, after they gain access to the substation network. This scenario can only be investigated through an in-depth study of communication protocols and control authority concepts associated with power system. IEC 61850 has emerged as the most popular protocol for power system communication. In this paper, we investigate realtime simulation of power systems with IEC 61850 based communication, in order to devise a testbed that can be used to validate false data injection cyberattacks and evaluate their impact. Based on the results, we discuss possible countermeasures to such attacks and outline future research directions.\",\"PeriodicalId\":354018,\"journal\":{\"name\":\"2021 IEEE Texas Power and Energy Conference (TPEC)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Texas Power and Energy Conference (TPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TPEC51183.2021.9384911\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Texas Power and Energy Conference (TPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPEC51183.2021.9384911","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation
The traditional power systems are rapidly digitalized and automated for increased monitoring and control. This automation of power system communication has made it possible to monitor and control operations remotely in a plant. However, this also opens up an exploitation vector for attackers, after they gain access to the substation network. This scenario can only be investigated through an in-depth study of communication protocols and control authority concepts associated with power system. IEC 61850 has emerged as the most popular protocol for power system communication. In this paper, we investigate realtime simulation of power systems with IEC 61850 based communication, in order to devise a testbed that can be used to validate false data injection cyberattacks and evaluate their impact. Based on the results, we discuss possible countermeasures to such attacks and outline future research directions.