Skip to main content
Top

2019 | OriginalPaper | Chapter

Challenges and Opportunities: Cyber-Physical Security in the Smart Grid

Authors : Sean Weerakkody, Bruno Sinopoli

Published in: Smart Grid Control

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we develop a vision to address challenges in securing the smart grid. Despite recent innovations, grid security remains a critical issue. The infrastructure is highly vulnerable due to its large scale, connectivity, and heterogeneity. Moreover, attacks on cyber-physical systems and the grid have been realized, most notably the attack on the Ukraine power system in 2015. While techniques in cyber security are useful, their implementation is not sufficient to secure the smart grid. Consequently, we advocate for research in cyber-physical system security, an interdisciplinary field which combines tools from both cyber security and system theory. Within this field, we argue that engineers need to develop a framework of accountability comprised of three main research thrusts: (1) the detection of attacks, (2) the attribution of attacks to particular malicious components and devices on the grid, and (3) the resilient design of systems and algorithms to ensure acceptable performance in the presence of malicious behavior. To close, we discuss the need for a unifying language and set of tools to address these problems, as we consider additional research in compositional security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Analysis of the cyber attack on the Ukrainian power grid (2016) Analysis of the cyber attack on the Ukrainian power grid (2016)
2.
go back to reference R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T.J. Overbye, Detecting false data injection attacks on DC state estimation, in First Workshop on Secure Control Systems, CPSWEEK (2010) R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T.J. Overbye, Detecting false data injection attacks on DC state estimation, in First Workshop on Secure Control Systems, CPSWEEK (2010)
3.
go back to reference T. Chen, Stuxnet, the real start of cyber warfare? [editor’s note]. IEEE Netw. 24(6), 2–3 (2010)CrossRef T. Chen, Stuxnet, the real start of cyber warfare? [editor’s note]. IEEE Netw. 24(6), 2–3 (2010)CrossRef
4.
go back to reference A. Datta, S. Kar, B. Sinopoli, S. Weerakkody, Accountability in cyber-physical systems, in Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) (IEEE, 2016), pp. 1–3 A. Datta, S. Kar, B. Sinopoli, S. Weerakkody, Accountability in cyber-physical systems, in Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) (IEEE, 2016), pp. 1–3
6.
go back to reference H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Auto. Control 59(6), 1454–1467 (2014)MathSciNetCrossRef H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Auto. Control 59(6), 1454–1467 (2014)MathSciNetCrossRef
7.
go back to reference D.P. Fidler, Was stuxnet an act of war? decoding a cyberattack. IEEE Secur. Priv. 9(4), 56–59 (2011)CrossRef D.P. Fidler, Was stuxnet an act of war? decoding a cyberattack. IEEE Secur. Priv. 9(4), 56–59 (2011)CrossRef
8.
go back to reference P.M. Frank, Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: a survey and some new results. Automatica 26(3), 459–474 (1990)MathSciNetCrossRef P.M. Frank, Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: a survey and some new results. Automatica 26(3), 459–474 (1990)MathSciNetCrossRef
9.
go back to reference J.A. Goguen, J. Meseguer, Security policies and security models, in 1982 IEEE Symposium on Security and Privacy (IEEE, 1982), pp. 11–20 J.A. Goguen, J. Meseguer, Security policies and security models, in 1982 IEEE Symposium on Security and Privacy (IEEE, 1982), pp. 11–20
10.
go back to reference G. Hug, J.A. Giampapa, Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)CrossRef G. Hug, J.A. Giampapa, Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)CrossRef
11.
go back to reference H. Khurana, M. Hadley, N. Lu, D.A. Frincke, Smart-grid security issues. IEEE Secur. Priv. 8(1) (2010)CrossRef H. Khurana, M. Hadley, N. Lu, D.A. Frincke, Smart-grid security issues. IEEE Secur. Priv. 8(1) (2010)CrossRef
12.
go back to reference O. Kosut, L. Jia, R.J. Thomas, L. Tong, Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)CrossRef O. Kosut, L. Jia, R.J. Thomas, L. Tong, Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)CrossRef
13.
go back to reference R. Langner, Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)CrossRef R. Langner, Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)CrossRef
14.
go back to reference Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef
15.
go back to reference L. Ljung, System identification (Wiley Online Library, 1999) L. Ljung, System identification (Wiley Online Library, 1999)
16.
go back to reference W. Lucia, B. Sinopoli, G. Franze, Networked constrained cyber-physical systems subject to malicious attacks: a resilient set-theoretic control approach (2016). arXiv:1603.07984 W. Lucia, B. Sinopoli, G. Franze, Networked constrained cyber-physical systems subject to malicious attacks: a resilient set-theoretic control approach (2016). arXiv:​1603.​07984
17.
go back to reference P. McDaniel, S. McLaughlin, Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3) (2009)CrossRef P. McDaniel, S. McLaughlin, Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3) (2009)CrossRef
18.
go back to reference Y. Mo, E. Garone, A. Casavola, B. Sinopoli, False data injection attacks against state estimation in wireless sensor networks, in 49th IEEE Conference on Decision and Control (CDC) (IEEE, 2010), pp. 5967–5972 Y. Mo, E. Garone, A. Casavola, B. Sinopoli, False data injection attacks against state estimation in wireless sensor networks, in 49th IEEE Conference on Decision and Control (CDC) (IEEE, 2010), pp. 5967–5972
19.
go back to reference Y. Mo, T.H.J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, B. Sinopoli, Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)CrossRef Y. Mo, T.H.J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, B. Sinopoli, Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)CrossRef
20.
go back to reference Y. Mo, B. Sinopoli, Secure control against replay attacks, in 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (IEEE, 2009), pp. 911–918 Y. Mo, B. Sinopoli, Secure control against replay attacks, in 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (IEEE, 2009), pp. 911–918
21.
go back to reference Y. Mo, S. Weerakkody, B. Sinopoli, Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag. 35(1), 93–109 (2015)MathSciNetCrossRef Y. Mo, S. Weerakkody, B. Sinopoli, Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag. 35(1), 93–109 (2015)MathSciNetCrossRef
22.
go back to reference A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, G. Pantziou, A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4) (2009)CrossRef A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, G. Pantziou, A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4) (2009)CrossRef
23.
go back to reference F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetCrossRef F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetCrossRef
24.
go back to reference T. Peng, C. Leckie, K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. (CSUR) 39(1), 3 (2007)CrossRef T. Peng, C. Leckie, K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. (CSUR) 39(1), 3 (2007)CrossRef
25.
go back to reference T. Pultarova, Cyber security-Ukraine grid hack is wake-up call for network operators [news briefing]. Eng. Technol. 11(1), 12–13 (2016)CrossRef T. Pultarova, Cyber security-Ukraine grid hack is wake-up call for network operators [news briefing]. Eng. Technol. 11(1), 12–13 (2016)CrossRef
26.
go back to reference S.R. Rajagopalan, L. Sankar, S. Mohajer, H.V. Poor, Smart meter privacy: a utility-privacy framework, in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) (IEEE, 2011), pp. 190–195 S.R. Rajagopalan, L. Sankar, S. Mohajer, H.V. Poor, Smart meter privacy: a utility-privacy framework, in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) (IEEE, 2011), pp. 190–195
27.
go back to reference H. Sandberg, A. Teixeira, K.H. Johansson, On security indices for state estimators in power networks, in First Workshop on Secure Control Systems, CPSWEEK (2010) H. Sandberg, A. Teixeira, K.H. Johansson, On security indices for state estimators in power networks, in First Workshop on Secure Control Systems, CPSWEEK (2010)
28.
go back to reference B. Satchidanandan, P. Kumar, Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219–240 (2017)CrossRef B. Satchidanandan, P. Kumar, Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219–240 (2017)CrossRef
29.
go back to reference E. Shi, A. Perrig, Designing secure sensor networks. IEEE Wirel. Commun. 11(6), 38–43 (2004)CrossRef E. Shi, A. Perrig, Designing secure sensor networks. IEEE Wirel. Commun. 11(6), 38–43 (2004)CrossRef
30.
go back to reference Y. Shoukry, A. Puggelli, P. Nuzzo, A.L. Sangiovanni-Vincentelli, S.A. Seshia, P. Tabuada, Sound and complete state estimation for linear dynamical systems under sensor attacks using satisfiability modulo theory solving, in American Control Conference (ACC), 2015 (IEEE, 2015), pp. 3818–3823 Y. Shoukry, A. Puggelli, P. Nuzzo, A.L. Sangiovanni-Vincentelli, S.A. Seshia, P. Tabuada, Sound and complete state estimation for linear dynamical systems under sensor attacks using satisfiability modulo theory solving, in American Control Conference (ACC), 2015 (IEEE, 2015), pp. 3818–3823
31.
go back to reference J. Slay, M. Miller, Lessons learned from the Maroochy water breach, in International Conference on Critical Infrastructure Protection (Springer, 2007), pp. 73–82 J. Slay, M. Miller, Lessons learned from the Maroochy water breach, in International Conference on Critical Infrastructure Protection (Springer, 2007), pp. 73–82
32.
go back to reference G. Smith, On the foundations of quantitative information flow, in International Conference on Foundations of Software Science and Computational Structures (Springer, 2009), pp. 288–302 G. Smith, On the foundations of quantitative information flow, in International Conference on Foundations of Software Science and Computational Structures (Springer, 2009), pp. 288–302
33.
go back to reference R.S. Smith, Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control. Syst. Mag. 35(1), 82–92 (2015)MathSciNetCrossRef R.S. Smith, Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control. Syst. Mag. 35(1), 82–92 (2015)MathSciNetCrossRef
34.
go back to reference R. Tan, V. Badrinath Krishna, D.K. Yau, Z. Kalbarczyk, Impact of integrity attacks on real-time pricing in smart grids, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (ACM, 2013), pp. 439–450 R. Tan, V. Badrinath Krishna, D.K. Yau, Z. Kalbarczyk, Impact of integrity attacks on real-time pricing in smart grids, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (ACM, 2013), pp. 439–450
35.
go back to reference A. Teixeira, D. Pérez, H. Sandberg, K.H. Johansson, Attack models and scenarios for networked control systems, in Proceedings of the 1st international conference on High Confidence Networked Systems (ACM, 2012), pp. 55–64 A. Teixeira, D. Pérez, H. Sandberg, K.H. Johansson, Attack models and scenarios for networked control systems, in Proceedings of the 1st international conference on High Confidence Networked Systems (ACM, 2012), pp. 55–64
36.
go back to reference A. Teixeira, I. Shames, H. Sandberg, K.H. Johansson, Revealing stealthy attacks in control systems, in 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (IEEE, 2012), pp. 1806–1813 A. Teixeira, I. Shames, H. Sandberg, K.H. Johansson, Revealing stealthy attacks in control systems, in 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (IEEE, 2012), pp. 1806–1813
37.
go back to reference D. Volpano, C. Irvine, G. Smith, A sound type system for secure flow analysis. J. Comput. Sec. 4(2–3), 167–187 (1996)CrossRef D. Volpano, C. Irvine, G. Smith, A sound type system for secure flow analysis. J. Comput. Sec. 4(2–3), 167–187 (1996)CrossRef
38.
go back to reference S. Weerakkody, X. Liu, S.H. Son, B. Sinopoli, A graph-theoretic characterization of perfect attackability for secure design of distributed control systems. IEEE Trans. Control Netw. Syst. 4(1), 60–70 (2017)MathSciNetCrossRef S. Weerakkody, X. Liu, S.H. Son, B. Sinopoli, A graph-theoretic characterization of perfect attackability for secure design of distributed control systems. IEEE Trans. Control Netw. Syst. 4(1), 60–70 (2017)MathSciNetCrossRef
39.
go back to reference S. Weerakkody, Y. Mo, B. Sinopoli, Detecting integrity attacks on control systems using robust physical watermarking, in 53rd Annual Conference on Decision and Control (CDC) (IEEE, 2014), pp. 3757–3764 S. Weerakkody, Y. Mo, B. Sinopoli, Detecting integrity attacks on control systems using robust physical watermarking, in 53rd Annual Conference on Decision and Control (CDC) (IEEE, 2014), pp. 3757–3764
40.
go back to reference S. Weerakkody, B. Sinopoli, Detecting integrity attacks on control systems using a moving target approach, in 54th Annual Conference on Decision and Control (CDC) (IEEE, 2015), pp. 5820–5826 S. Weerakkody, B. Sinopoli, Detecting integrity attacks on control systems using a moving target approach, in 54th Annual Conference on Decision and Control (CDC) (IEEE, 2015), pp. 5820–5826
41.
42.
go back to reference S. Weerakkody, B. Sinopoli, S. Kar, A. Datta, Information flow for security in control systems, in 55th Conference on Decision and Control (CDC) (IEEE, 2016), pp. 5065–5072 S. Weerakkody, B. Sinopoli, S. Kar, A. Datta, Information flow for security in control systems, in 55th Conference on Decision and Control (CDC) (IEEE, 2016), pp. 5065–5072
43.
go back to reference J. Weimer, S. Kar, K.H. Johansson, Distributed detection and isolation of topology attacks in power networks, in Proceedings of the 1st International Conference on High Confidence Networked Systems (ACM, 2012), pp. 65–72 J. Weimer, S. Kar, K.H. Johansson, Distributed detection and isolation of topology attacks in power networks, in Proceedings of the 1st International Conference on High Confidence Networked Systems (ACM, 2012), pp. 65–72
44.
go back to reference A.S. Willsky, A survey of design methods for failure detection in dynamic systems. Automatica 12(6), 601–611 (1976)MathSciNetCrossRef A.S. Willsky, A survey of design methods for failure detection in dynamic systems. Automatica 12(6), 601–611 (1976)MathSciNetCrossRef
45.
go back to reference D. Wu, C. Zhou, Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011)CrossRef D. Wu, C. Zhou, Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011)CrossRef
46.
go back to reference L. Xie, Y. Mo, B. Sinopoli, False data injection attacks in electricity markets, in First IEEE International Conference on Smart Grid Communications (SmartGridComm) (IEEE, 2010), pp. 226–231 L. Xie, Y. Mo, B. Sinopoli, False data injection attacks in electricity markets, in First IEEE International Conference on Smart Grid Communications (SmartGridComm) (IEEE, 2010), pp. 226–231
47.
go back to reference Y. Yuan, Y. Mo, Security in cyber-physical systems: controller design against known-plaintext attack, in 54th IEEE Conference on Decision and Control (IEEE, 2015), pp. 5814–5819 Y. Yuan, Y. Mo, Security in cyber-physical systems: controller design against known-plaintext attack, in 54th IEEE Conference on Decision and Control (IEEE, 2015), pp. 5814–5819
Metadata
Title
Challenges and Opportunities: Cyber-Physical Security in the Smart Grid
Authors
Sean Weerakkody
Bruno Sinopoli
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-98310-3_16