{"title":"基于模型的电网传感器GPS欺骗攻击评估","authors":"Ilge Akkaya, Edward A. Lee, P. Derler","doi":"10.1109/MSCPES.2013.6623324","DOIUrl":null,"url":null,"abstract":"Emerging cyber-physical system (CPS) applications require reliable time synchronization to enable distributed control and sensing applications. However, time reference signals are vulnerable to attacks that could remain undetected for a long time. Sensor-rich distributed CPS such as the “smart grid” highly rely on GPS and similar time references for sub-station clock synchronization. The vulnerability of time synchronization protocols to spoofing attacks is a potential risk factor that may lead to falsified sensor readings and, at a larger scale, may become hazardous for system safety. This paper describes a simulation-based assessment of the effect of time accuracy on time-centric power system applications. In particular, the vulnerability of power grid sensors to erroneous time references and the potential risks of time-base spoofing on power grid health are studied, using the Ptolemy modeling and simulation tool. Both the false alarm and the missed generation scenarios are considered, where the GPS spoofer may lead the substation to declare an erroneous out-of-phase situation, or the substation may be disabled to detect anomalies that are present in the incoming phase data.","PeriodicalId":150042,"journal":{"name":"2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Model-based evaluation of GPS spoofing attacks on power grid sensors\",\"authors\":\"Ilge Akkaya, Edward A. Lee, P. Derler\",\"doi\":\"10.1109/MSCPES.2013.6623324\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Emerging cyber-physical system (CPS) applications require reliable time synchronization to enable distributed control and sensing applications. However, time reference signals are vulnerable to attacks that could remain undetected for a long time. Sensor-rich distributed CPS such as the “smart grid” highly rely on GPS and similar time references for sub-station clock synchronization. The vulnerability of time synchronization protocols to spoofing attacks is a potential risk factor that may lead to falsified sensor readings and, at a larger scale, may become hazardous for system safety. This paper describes a simulation-based assessment of the effect of time accuracy on time-centric power system applications. In particular, the vulnerability of power grid sensors to erroneous time references and the potential risks of time-base spoofing on power grid health are studied, using the Ptolemy modeling and simulation tool. Both the false alarm and the missed generation scenarios are considered, where the GPS spoofer may lead the substation to declare an erroneous out-of-phase situation, or the substation may be disabled to detect anomalies that are present in the incoming phase data.\",\"PeriodicalId\":150042,\"journal\":{\"name\":\"2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MSCPES.2013.6623324\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSCPES.2013.6623324","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Model-based evaluation of GPS spoofing attacks on power grid sensors
Emerging cyber-physical system (CPS) applications require reliable time synchronization to enable distributed control and sensing applications. However, time reference signals are vulnerable to attacks that could remain undetected for a long time. Sensor-rich distributed CPS such as the “smart grid” highly rely on GPS and similar time references for sub-station clock synchronization. The vulnerability of time synchronization protocols to spoofing attacks is a potential risk factor that may lead to falsified sensor readings and, at a larger scale, may become hazardous for system safety. This paper describes a simulation-based assessment of the effect of time accuracy on time-centric power system applications. In particular, the vulnerability of power grid sensors to erroneous time references and the potential risks of time-base spoofing on power grid health are studied, using the Ptolemy modeling and simulation tool. Both the false alarm and the missed generation scenarios are considered, where the GPS spoofer may lead the substation to declare an erroneous out-of-phase situation, or the substation may be disabled to detect anomalies that are present in the incoming phase data.