{"title":"电力系统中同步相量网络安全评估的可扩展网络物理测试平台","authors":"Shuvangkar Chandra Das, Tuyen Vu, Herbert Ginn","doi":"10.1049/cps2.12106","DOIUrl":null,"url":null,"abstract":"<p>This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12106","citationCount":"0","resultStr":"{\"title\":\"Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems\",\"authors\":\"Shuvangkar Chandra Das, Tuyen Vu, Herbert Ginn\",\"doi\":\"10.1049/cps2.12106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.</p>\",\"PeriodicalId\":36881,\"journal\":{\"name\":\"IET Cyber-Physical Systems: Theory and Applications\",\"volume\":\"10 1\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2025-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12106\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Cyber-Physical Systems: Theory and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems
This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.