针对网络攻击的简单鲁棒线路电流差动保护

Mohamed E. Kotb, A. M. Saber, T. Boghdady
{"title":"针对网络攻击的简单鲁棒线路电流差动保护","authors":"Mohamed E. Kotb, A. M. Saber, T. Boghdady","doi":"10.1109/MEPCON55441.2022.10021802","DOIUrl":null,"url":null,"abstract":"Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.","PeriodicalId":174878,"journal":{"name":"2022 23rd International Middle East Power Systems Conference (MEPCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Simple Robust Line Current Differential Protection Against Cyberattacks\",\"authors\":\"Mohamed E. Kotb, A. M. Saber, T. Boghdady\",\"doi\":\"10.1109/MEPCON55441.2022.10021802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.\",\"PeriodicalId\":174878,\"journal\":{\"name\":\"2022 23rd International Middle East Power Systems Conference (MEPCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 23rd International Middle East Power Systems Conference (MEPCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MEPCON55441.2022.10021802\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 23rd International Middle East Power Systems Conference (MEPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MEPCON55441.2022.10021802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

线路电流差分中继(lcdr)依赖于广域通信网络(wan)和全球定位系统(GPS),这是一个重大挑战,因为广域通信网络和GPS信号都容易受到网络攻击。例如,攻击者可能使用虚假数据注入(FDI)来篡改从一条线路终端发送给LCDR的信号,导致LCDR做出错误的决策。这种错误的决定可能会断开正常线路或无法跳闸故障线路,严重损害系统。本文提出了两种技术:(i)检测FDI攻击,(ii)区分误跳闸攻击和健康线路,以及(iv)确保LCDR仅在存在真正故障时才发送跳闸命令。在第一种技术中,在LCDR被触发后,它通过使用本地瞬时电压和电流测量来评估从另一个终端接收到的数据。第二种技术基于发送加密的预定义值的信号,该信号仅在远程LCDR检测到故障后发送。对该信号的操纵是入侵的标志,它会激活备份保护。这两种技术都可以在lcdr中实现,以检测对lcdr的网络攻击,并确保最佳的可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Simple Robust Line Current Differential Protection Against Cyberattacks
Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信