Skip to main content
Top

2023 | OriginalPaper | Chapter

Cyber-Security of Protection System in Power Grids—Part 1: Vulnerabilities and Counter-Measures

Authors : Shahin Riahinia, Amir Ameli, Mohsen Ghafouri, Abdulsalam Yassine

Published in: Power Systems Cybersecurity

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The recent trend to expand the use of Information Technology (IT) in power networks has made the electric grid potentially vulnerable to cyber-attacks. Protection systems are among the most critical cyber-vulnerable components, as they directly affect the integrity and stability of power systems. On this basis, this chapter reviews and investigates the cyber-vulnerabilities of protection systems in power networks. These vulnerabilities can be categorized into three main groups: (i) vulnerabilities of substations, (ii) vulnerabilities of Communication-Assisted Protection (CAP) schemes, and (iii) vulnerabilities of Wide-Area Protection (WAP) schemes. This chapter also discusses the techniques that can be used to detect cyber-attacks against protection schemes and differentiate them from faults.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference J. Meserve, Mouse click could plunge city into darkness, experts say, CNN. com, vol. 27 (2007) J. Meserve, Mouse click could plunge city into darkness, experts say, CNN. com, vol. 27 (2007)
3.
go back to reference D.E. Whitehead, K. Owens, D. Gammel, J. Smith, Ukraine cyber-induced power outage: analysis and practical mitigation strategies, in 2017 70th Annual Conference for Protective Relay Engineers (CPRE) (2017), pp. 1–8 D.E. Whitehead, K. Owens, D. Gammel, J. Smith, Ukraine cyber-induced power outage: analysis and practical mitigation strategies, in 2017 70th Annual Conference for Protective Relay Engineers (CPRE) (2017), pp. 1–8
4.
go back to reference R. Khan, P. Maynard, K. McLaughlin, D. Laverty, S. Sezer, Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid, in 4th International Symposium for ICS and SCADA Cyber Security Research 2016, vol. 4 (2016), pp. 53–63 R. Khan, P. Maynard, K. McLaughlin, D. Laverty, S. Sezer, Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid, in 4th International Symposium for ICS and SCADA Cyber Security Research 2016, vol. 4 (2016), pp. 53–63
5.
go back to reference C. Jiwen, L. Shanmei, Cyber security vulnerability assessment for smart substations. IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) 2016, 1368–1373 (2016)CrossRef C. Jiwen, L. Shanmei, Cyber security vulnerability assessment for smart substations. IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) 2016, 1368–1373 (2016)CrossRef
6.
go back to reference J. Hong, C.-C. Liu, M. Govindarasu, Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 5(4), 1643–1653 (2014)CrossRef J. Hong, C.-C. Liu, M. Govindarasu, Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 5(4), 1643–1653 (2014)CrossRef
7.
go back to reference M. Adamiak, A. Apostolov, M. Begovic, C. Henville, K. Martin, G. Michel, A. Phadke, J. Thorp, Wide area protection-technology and infrastructures. IEEE Trans. Power Delivery 21(2), 601–609 (2006)CrossRef M. Adamiak, A. Apostolov, M. Begovic, C. Henville, K. Martin, G. Michel, A. Phadke, J. Thorp, Wide area protection-technology and infrastructures. IEEE Trans. Power Delivery 21(2), 601–609 (2006)CrossRef
8.
go back to reference G. Allen, R. Cheung, Integration of protection, control and monitoring functions for transmission and distribution substations. IEEE Trans. Power Delivery 13(1), 96–101 (1998)CrossRef G. Allen, R. Cheung, Integration of protection, control and monitoring functions for transmission and distribution substations. IEEE Trans. Power Delivery 13(1), 96–101 (1998)CrossRef
9.
go back to reference Y. Zheng, D. Wang, Z. Zhou, T. Cao, Hierarchical protection control system of smart substations. J. Modern Power Syst. Clean Energy 2(3), 282–288 (2014)CrossRef Y. Zheng, D. Wang, Z. Zhou, T. Cao, Hierarchical protection control system of smart substations. J. Modern Power Syst. Clean Energy 2(3), 282–288 (2014)CrossRef
10.
go back to reference W.G. on Centralized Substation Protection, I. P. S. R. C. Control, Advancements in centralized protection and control within a substation. IEEE Trans. Power Delivery 31(4), 1945–1952 (2016) W.G. on Centralized Substation Protection, I. P. S. R. C. Control, Advancements in centralized protection and control within a substation. IEEE Trans. Power Delivery 31(4), 1945–1952 (2016)
11.
go back to reference S. Adepu, N.K. Kandasamy, J. Zhou, A. Mathur, Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Secur. 19(2), 189–211 (2020)CrossRef S. Adepu, N.K. Kandasamy, J. Zhou, A. Mathur, Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Secur. 19(2), 189–211 (2020)CrossRef
12.
go back to reference T. Nguyen, S. Wang, M. Alhazmi, M. Nazemi, A. Estebsari, P. Dehghanian, Electric power grid resilience to cyber adversaries: state of the art. IEEE Access 8, 87 592–87 608 (2020) T. Nguyen, S. Wang, M. Alhazmi, M. Nazemi, A. Estebsari, P. Dehghanian, Electric power grid resilience to cyber adversaries: state of the art. IEEE Access 8, 87 592–87 608 (2020)
13.
go back to reference V.S. Kumar, J. Prasad, R. Samikannu, A critical review of cyber security and cyber terrorism-threats to critical infrastructure in the energy sector. Int. J. Crit. Infrastruct. 14(2), 101–119 (2018)CrossRef V.S. Kumar, J. Prasad, R. Samikannu, A critical review of cyber security and cyber terrorism-threats to critical infrastructure in the energy sector. Int. J. Crit. Infrastruct. 14(2), 101–119 (2018)CrossRef
14.
go back to reference T. Bartman, K. Carson, Securing communications for scada and critical industrial systems, in 2016 69th Annual Conference for Protective Relay Engineers (CPRE) (2016), pp. 1–10 T. Bartman, K. Carson, Securing communications for scada and critical industrial systems, in 2016 69th Annual Conference for Protective Relay Engineers (CPRE) (2016), pp. 1–10
15.
go back to reference Y. Zhang, L. Wang, Y. Xiang, C.-W. Ten, Power system reliability evaluation with scada cybersecurity considerations. IEEE Trans. Smart Grid 6(4), 1707–1721 (2015)CrossRef Y. Zhang, L. Wang, Y. Xiang, C.-W. Ten, Power system reliability evaluation with scada cybersecurity considerations. IEEE Trans. Smart Grid 6(4), 1707–1721 (2015)CrossRef
16.
go back to reference K. Kimani, V. Oduol, K. Langat, Cyber security challenges for iot-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36–49 (2019)CrossRef K. Kimani, V. Oduol, K. Langat, Cyber security challenges for iot-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36–49 (2019)CrossRef
17.
go back to reference D. Mashima, Securing smart-grid infrastructure against emerging threats, in Solving Urban Infrastructure Problems Using Smart City Technologies (Elsevier, 2021), pp. 359–382 D. Mashima, Securing smart-grid infrastructure against emerging threats, in Solving Urban Infrastructure Problems Using Smart City Technologies (Elsevier, 2021), pp. 359–382
18.
go back to reference A. Ameli, A. Hooshyar, E.F. El-Saadany, A.M. Youssef, An intrusion detection method for line current differential relays. IEEE Trans. Inf. Forensics Secur. 15, 329–344 (2020)CrossRef A. Ameli, A. Hooshyar, E.F. El-Saadany, A.M. Youssef, An intrusion detection method for line current differential relays. IEEE Trans. Inf. Forensics Secur. 15, 329–344 (2020)CrossRef
19.
go back to reference A. Ameli, A. Hooshyar, E.F. El-Saadany, Development of a cyber-resilient line current differential relay. IEEE Trans. Industr. Inf. 15(1), 305–318 (2019)CrossRef A. Ameli, A. Hooshyar, E.F. El-Saadany, Development of a cyber-resilient line current differential relay. IEEE Trans. Industr. Inf. 15(1), 305–318 (2019)CrossRef
20.
go back to reference Y. Yang, H.T. Jiang, K. McLaughlin, L. Gao, Y. Yuan, W. Huang, S. Sezer, Cybersecurity test-bed for iec 61850 based smart substations. IEEE Power Energy Soc. Gener. Meeting 2015, 1–5 (2015) Y. Yang, H.T. Jiang, K. McLaughlin, L. Gao, Y. Yuan, W. Huang, S. Sezer, Cybersecurity test-bed for iec 61850 based smart substations. IEEE Power Energy Soc. Gener. Meeting 2015, 1–5 (2015)
21.
go back to reference Y. Chen, J. Hong, C.-C. Liu, Modeling of intrusion and defense for assessment of cyber security at power substations. IEEE Trans. Smart Grid 9(4), 2541–2552 (2018)CrossRef Y. Chen, J. Hong, C.-C. Liu, Modeling of intrusion and defense for assessment of cyber security at power substations. IEEE Trans. Smart Grid 9(4), 2541–2552 (2018)CrossRef
22.
go back to reference M. Bahrami, M. Fotuhi-Firuzabad, H. Farzin, Reliability evaluation of power grids considering integrity attacks against substation protective IEDs. IEEE Trans. Industr. Inf. 16(2), 1035–1044 (2020)CrossRef M. Bahrami, M. Fotuhi-Firuzabad, H. Farzin, Reliability evaluation of power grids considering integrity attacks against substation protective IEDs. IEEE Trans. Industr. Inf. 16(2), 1035–1044 (2020)CrossRef
23.
go back to reference M. Touhiduzzaman, A. Hahn, A.K. Srivastava, A diversity-based substation cyber defense strategy utilizing coloring games. IEEE Trans. Smart Grid 10(5), 5405–5415 (2019)CrossRef M. Touhiduzzaman, A. Hahn, A.K. Srivastava, A diversity-based substation cyber defense strategy utilizing coloring games. IEEE Trans. Smart Grid 10(5), 5405–5415 (2019)CrossRef
24.
go back to reference C.-W. Ten, J. Hong, C.-C. Liu, Anomaly detection for cybersecurity of the substations. IEEE Trans. Smart Grid 2(4), 865–873 (2011)CrossRef C.-W. Ten, J. Hong, C.-C. Liu, Anomaly detection for cybersecurity of the substations. IEEE Trans. Smart Grid 2(4), 865–873 (2011)CrossRef
25.
go back to reference C. Wang, C.-W. Ten, Y. Hou, A. Ginter, Cyber inference system for substation anomalies against alter-and-hide attacks. IEEE Trans. Power Syst. 32(2), 896–909 (2017) C. Wang, C.-W. Ten, Y. Hou, A. Ginter, Cyber inference system for substation anomalies against alter-and-hide attacks. IEEE Trans. Power Syst. 32(2), 896–909 (2017)
26.
go back to reference N. Moreira, E. Molina, J. Lázaro, E. Jacob, A. Astarloa, Cyber-security in substation automation systems. Renew. Sustain. Energy Rev. 54, 1552–1562 (2016)CrossRef N. Moreira, E. Molina, J. Lázaro, E. Jacob, A. Astarloa, Cyber-security in substation automation systems. Renew. Sustain. Energy Rev. 54, 1552–1562 (2016)CrossRef
27.
go back to reference M. Rodríguez, J. Lázaro, U. Bidarte, J. Jiménez, A. Astarloa, A fixed-latency architecture to secure goose and sampled value messages in substation systems. IEEE Access 9, 51 646–51 658 (2021) M. Rodríguez, J. Lázaro, U. Bidarte, J. Jiménez, A. Astarloa, A fixed-latency architecture to secure goose and sampled value messages in substation systems. IEEE Access 9, 51 646–51 658 (2021)
28.
go back to reference IEEE Guide for Protective Relay Applications to Transmission Lines, IEEE Std C37.113-2015 (Revision of IEEE Std C37.113-1999) (2016), pp. 1–141 IEEE Guide for Protective Relay Applications to Transmission Lines, IEEE Std C37.113-2015 (Revision of IEEE Std C37.113-1999) (2016), pp. 1–141
29.
go back to reference R. Leelaruji, L. Vanfretti, Power system protective relaying: basic concepts, industrial-grade devices, and communication mechanisms (2011) R. Leelaruji, L. Vanfretti, Power system protective relaying: basic concepts, industrial-grade devices, and communication mechanisms (2011)
30.
go back to reference H.H. Alhelou, A.Y. Abdelaziz, P. Siano, Wide Area Power Systems Stability, Protection, and Security (Springer, 2020) H.H. Alhelou, A.Y. Abdelaziz, P. Siano, Wide Area Power Systems Stability, Protection, and Security (Springer, 2020)
31.
go back to reference S.H. Horowitz, A.G. Phadke, Power System Relaying (Wiley, 2014) S.H. Horowitz, A.G. Phadke, Power System Relaying (Wiley, 2014)
32.
go back to reference W. Liu, H. Widmer, P. Raffin, Broadband plc access systems and field deployment in european power line networks. IEEE Commun. Mag. 41(5), 114–118 (2003)CrossRef W. Liu, H. Widmer, P. Raffin, Broadband plc access systems and field deployment in european power line networks. IEEE Commun. Mag. 41(5), 114–118 (2003)CrossRef
33.
go back to reference W.M. Karwisch Jr, Confidentiality of information on dedicated leased lines (2003) W.M. Karwisch Jr, Confidentiality of information on dedicated leased lines (2003)
34.
go back to reference B. Appasani, D.K. Mohanta, A review on synchrophasor communication system: communication technologies, standards and applications. Protect. Control Modern Power Syst. 3(1), 1–17 (2018) B. Appasani, D.K. Mohanta, A review on synchrophasor communication system: communication technologies, standards and applications. Protect. Control Modern Power Syst. 3(1), 1–17 (2018)
35.
go back to reference J. Rooker, Satellite vulnerabilities (Technical Report, Marine Corps Command and Staff Coll Quantico VA, 2008) J. Rooker, Satellite vulnerabilities (Technical Report, Marine Corps Command and Staff Coll Quantico VA, 2008)
36.
go back to reference S. Leader, Telecommunications handbook for transportation professionals: the basics of telecommunications (United States. Federal Highway Administration, Technical Report, 2004) S. Leader, Telecommunications handbook for transportation professionals: the basics of telecommunications (United States. Federal Highway Administration, Technical Report, 2004)
37.
go back to reference K. Feher, Wireless Digital Communications: Modulation and Spread Spectrum Applications (Prentice-Hall, Inc., 1995) K. Feher, Wireless Digital Communications: Modulation and Spread Spectrum Applications (Prentice-Hall, Inc., 1995)
38.
go back to reference B. Kasztenny, M.V. Mynam, N. Fischer, A. Guzmán, Permissive or blocking pilot protection schemes? how to have it both ways, in proceedings of the 47th Annual Western Protective Relay Conference, Spokane, WA (2020) B. Kasztenny, M.V. Mynam, N. Fischer, A. Guzmán, Permissive or blocking pilot protection schemes? how to have it both ways, in proceedings of the 47th Annual Western Protective Relay Conference, Spokane, WA (2020)
39.
go back to reference S.H. Horowitz, A.G. Phadke, Power System Relaying (Wiley, 2014) S.H. Horowitz, A.G. Phadke, Power System Relaying (Wiley, 2014)
40.
go back to reference W.A. Elmore, Protective Relaying: Theory and Applications, vol. 1 (CRC Press, 2003) W.A. Elmore, Protective Relaying: Theory and Applications, vol. 1 (CRC Press, 2003)
41.
go back to reference H. Miller, J. Burger, N. Fischer, B. Kasztenny, Modern line current differential protection solutions, in 2010 63rd Annual Conference for Protective Relay Engineers (2010), pp. 1–25 H. Miller, J. Burger, N. Fischer, B. Kasztenny, Modern line current differential protection solutions, in 2010 63rd Annual Conference for Protective Relay Engineers (2010), pp. 1–25
42.
go back to reference D. Costello, Event Analysis Tutorial (Schweitzer Engineering Laboratories, 2013) D. Costello, Event Analysis Tutorial (Schweitzer Engineering Laboratories, 2013)
43.
go back to reference B. Kasztenny, N. Fischer, K. Fodero, A. Zvarych, Communications and data synchronization for line current differential schemes, in Proceedings of the 38th Annual Western Protective Relay Conference, Spokane, WA (2011), pp. 1–4 B. Kasztenny, N. Fischer, K. Fodero, A. Zvarych, Communications and data synchronization for line current differential schemes, in Proceedings of the 38th Annual Western Protective Relay Conference, Spokane, WA (2011), pp. 1–4
44.
go back to reference Z. Zhang, S. Gong, A.D. Dimitrovski, H. Li, Time synchronization attack in smart grid: impact and analysis. IEEE Trans. Smart Grid 4(1), 87–98 (2013)CrossRef Z. Zhang, S. Gong, A.D. Dimitrovski, H. Li, Time synchronization attack in smart grid: impact and analysis. IEEE Trans. Smart Grid 4(1), 87–98 (2013)CrossRef
45.
go back to reference A. Guzman, D.A. Tziouvaras, E.O. Schweitzer, K. Martin, Local- and wide-area network protection systems improve power system reliability, in Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed. Resources 2006, 174–181 (2006) A. Guzman, D.A. Tziouvaras, E.O. Schweitzer, K. Martin, Local- and wide-area network protection systems improve power system reliability, in Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed. Resources 2006, 174–181 (2006)
46.
go back to reference Z. Bo, J. Jayasinge, R. Hewett, R. Aggarwal, A. Johns, New scheme for monitoring and protection of power transmission system based on global positioning system, in The 1996 31 st Universities Power Engineering Conference. Part 1(of 3) (1996), pp. 25–28 Z. Bo, J. Jayasinge, R. Hewett, R. Aggarwal, A. Johns, New scheme for monitoring and protection of power transmission system based on global positioning system, in The 1996 31 st Universities Power Engineering Conference. Part 1(of 3) (1996), pp. 25–28
47.
go back to reference Z. Bo, G. Weller, T. Lomas, M. Redfern, Positional protection of transmission systems using global positioning system. IEEE Trans. Power Delivery 15(4), 1163–1168 (2000)CrossRef Z. Bo, G. Weller, T. Lomas, M. Redfern, Positional protection of transmission systems using global positioning system. IEEE Trans. Power Delivery 15(4), 1163–1168 (2000)CrossRef
48.
go back to reference V. Ashok, A. Yadav, A.Y. Abdelaziz, A comprehensive review on wide-area protection, control and monitoring systems, in Wide Area Power Systems Stability, Protection, and Security (2021), pp. 1–43 V. Ashok, A. Yadav, A.Y. Abdelaziz, A comprehensive review on wide-area protection, control and monitoring systems, in Wide Area Power Systems Stability, Protection, and Security (2021), pp. 1–43
49.
go back to reference V.K. Singh, M. Govindarasu, Decision tree based anomaly detection for remedial action scheme in smart grid using pmu data. IEEE Power Energy Society General Meeting (PESGM) 2018, 1–5 (2018) V.K. Singh, M. Govindarasu, Decision tree based anomaly detection for remedial action scheme in smart grid using pmu data. IEEE Power Energy Society General Meeting (PESGM) 2018, 1–5 (2018)
50.
go back to reference J.-A. Jiang, J.-Z. Yang, Y.-H. Lin, C.-W. Liu, J.-C. Ma, An adaptive pmu based fault detection/location technique for transmission lines. i. theory and algorithms. IEEE Trans. Power Delivery 15(2), 486–493 (2000) J.-A. Jiang, J.-Z. Yang, Y.-H. Lin, C.-W. Liu, J.-C. Ma, An adaptive pmu based fault detection/location technique for transmission lines. i. theory and algorithms. IEEE Trans. Power Delivery 15(2), 486–493 (2000)
51.
go back to reference J. Zare, F. Aminifar, M. Sanaye-Pasand, Synchrophasor-based wide-area backup protection scheme with data requirement analysis. IEEE Trans. Power Delivery 30(3), 1410–1419 (2015)CrossRef J. Zare, F. Aminifar, M. Sanaye-Pasand, Synchrophasor-based wide-area backup protection scheme with data requirement analysis. IEEE Trans. Power Delivery 30(3), 1410–1419 (2015)CrossRef
52.
go back to reference M. Begovic, D. Novosel, D. Karlsson, C. Henville, G. Michel, Wide-area protection and emergency control. Proc. IEEE 93(5), 876–891 (2005)CrossRef M. Begovic, D. Novosel, D. Karlsson, C. Henville, G. Michel, Wide-area protection and emergency control. Proc. IEEE 93(5), 876–891 (2005)CrossRef
53.
go back to reference G. Rockefeller, C. Wagner, J. Linders, K. Hicks, D. Rizy, Adaptive transmission relaying concepts for improved performance. IEEE Trans. Power Delivery 3(4), 1446–1458 (1988)CrossRef G. Rockefeller, C. Wagner, J. Linders, K. Hicks, D. Rizy, Adaptive transmission relaying concepts for improved performance. IEEE Trans. Power Delivery 3(4), 1446–1458 (1988)CrossRef
54.
go back to reference J. De La Ree, V. Centeno, J.S. Thorp, A.G. Phadke, Synchronized phasor measurement applications in power systems. IEEE Trans. Smart Grid 1(1), 20–27 (2010)CrossRef J. De La Ree, V. Centeno, J.S. Thorp, A.G. Phadke, Synchronized phasor measurement applications in power systems. IEEE Trans. Smart Grid 1(1), 20–27 (2010)CrossRef
55.
go back to reference X. Yin, Z. Zhang, Z. Li, X. Qi, W. Cao, Q. Guo, The research and the development of the wide area relaying protection based on fault element identification. Protect. Control Modern Power Syst. 1(1), 1–13 (2016) X. Yin, Z. Zhang, Z. Li, X. Qi, W. Cao, Q. Guo, The research and the development of the wide area relaying protection based on fault element identification. Protect. Control Modern Power Syst. 1(1), 1–13 (2016)
56.
go back to reference B. Moussa, M. Debbabi, C. Assi, Security assessment of time synchronization mechanisms for the smart grid. IEEE Commun. Surv. Tutor. 18(3), 1952–1973 (2016)CrossRef B. Moussa, M. Debbabi, C. Assi, Security assessment of time synchronization mechanisms for the smart grid. IEEE Commun. Surv. Tutor. 18(3), 1952–1973 (2016)CrossRef
57.
go back to reference M.S. Almas, L. Vanfretti, R.S. Singh, G.M. Jonsdottir, Vulnerability of synchrophasor-based wampac applications’ to time synchronization spoofing. IEEE Trans. Smart Grid 9(5), 4601–4612 (2018)CrossRef M.S. Almas, L. Vanfretti, R.S. Singh, G.M. Jonsdottir, Vulnerability of synchrophasor-based wampac applications’ to time synchronization spoofing. IEEE Trans. Smart Grid 9(5), 4601–4612 (2018)CrossRef
58.
go back to reference R. Kateb, P. Akaber, M.H.K. Tushar, A. Albarakati, M. Debbabi, C. Assi, Enhancing wams communication network against delay attacks. IEEE Trans. Smart Grid 10(3), 2738–2751 (2019)CrossRef R. Kateb, P. Akaber, M.H.K. Tushar, A. Albarakati, M. Debbabi, C. Assi, Enhancing wams communication network against delay attacks. IEEE Trans. Smart Grid 10(3), 2738–2751 (2019)CrossRef
59.
go back to reference C. Blask, A. Lee et al., Nescor electric sector failure scenarios and impact analyses - version 3, Technical report (2015) C. Blask, A. Lee et al., Nescor electric sector failure scenarios and impact analyses - version 3, Technical report (2015)
60.
go back to reference B. Moussa, A. Al-Barakati, M. Kassouf, M. Debbabi, C. Assi, Exploiting the vulnerability of relative data alignment in phasor data concentrators to time synchronization attacks. IEEE Trans. Smart Grid 11(3), 2541–2551 (2020)CrossRef B. Moussa, A. Al-Barakati, M. Kassouf, M. Debbabi, C. Assi, Exploiting the vulnerability of relative data alignment in phasor data concentrators to time synchronization attacks. IEEE Trans. Smart Grid 11(3), 2541–2551 (2020)CrossRef
61.
go back to reference J.P. Anderson, Computer security technology planning study (Technical Report, Anderson (James P) and CO Fort Washington PA Fort Washington, 1972)CrossRef J.P. Anderson, Computer security technology planning study (Technical Report, Anderson (James P) and CO Fort Washington PA Fort Washington, 1972)CrossRef
62.
go back to reference X. Liu, C. Qian, W.G. Hatcher, H. Xu, W. Liao, W. Yu, Secure internet of things (iot)-based smart-world critical infrastructures: survey, case study and research opportunities. IEEE Access 7, 79 523–79 544 (2019) X. Liu, C. Qian, W.G. Hatcher, H. Xu, W. Liao, W. Yu, Secure internet of things (iot)-based smart-world critical infrastructures: survey, case study and research opportunities. IEEE Access 7, 79 523–79 544 (2019)
63.
go back to reference G. Loukas, G. Öke, Protection against denial of service attacks: a survey. Comput. J. 53(7), 1020–1037 (2010)CrossRef G. Loukas, G. Öke, Protection against denial of service attacks: a survey. Comput. J. 53(7), 1020–1037 (2010)CrossRef
64.
go back to reference X. Yang, X. Zhang, J. Lin, W. Yu, X. Fu, W. Zhao, Data integrity attacks against the distributed real-time pricing in the smart grid, in IEEE 35th International Performance Computing and Communications Conference (IPCCC), vol. 2016 (IEEE, 2016), pp. 1–8 X. Yang, X. Zhang, J. Lin, W. Yu, X. Fu, W. Zhao, Data integrity attacks against the distributed real-time pricing in the smart grid, in IEEE 35th International Performance Computing and Communications Conference (IPCCC), vol. 2016 (IEEE, 2016), pp. 1–8
65.
go back to reference S. Li, Y. Yilmaz, X. Wang, Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 6(6), 2725–2735 (2015)CrossRef S. Li, Y. Yilmaz, X. Wang, Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 6(6), 2725–2735 (2015)CrossRef
66.
go back to reference K. Hamlen, M. Kantarcioglu, L. Khan, B. Thuraisingham, Security issues for cloud computing. Int. J. Inf. Secur. Privacy (IJISP) 4(2), 36–48 (2010)CrossRef K. Hamlen, M. Kantarcioglu, L. Khan, B. Thuraisingham, Security issues for cloud computing. Int. J. Inf. Secur. Privacy (IJISP) 4(2), 36–48 (2010)CrossRef
67.
go back to reference F. Aliyu, T. Sheltami, E.M. Shakshuki, A detection and prevention technique for man in the middle attack in fog computing. Proc. Comput. Sci. 141, 24–31 (2018)CrossRef F. Aliyu, T. Sheltami, E.M. Shakshuki, A detection and prevention technique for man in the middle attack in fog computing. Proc. Comput. Sci. 141, 24–31 (2018)CrossRef
68.
go back to reference S. Bhamidipati, K. J. Kim, H. Sun, P.V. Orlik, Wide-area gps time monitoring against spoofing using belief propagation, in 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (IEEE, 2019), pp. 1–8 S. Bhamidipati, K. J. Kim, H. Sun, P.V. Orlik, Wide-area gps time monitoring against spoofing using belief propagation, in 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (IEEE, 2019), pp. 1–8
69.
go back to reference M. Alsaleh, M. Mannan, P.C. van Oorschot, Revisiting defenses against large-scale online password guessing attacks. IEEE Trans. Dependable Secure Comput. 9(1), 128–141 (2012)CrossRef M. Alsaleh, M. Mannan, P.C. van Oorschot, Revisiting defenses against large-scale online password guessing attacks. IEEE Trans. Dependable Secure Comput. 9(1), 128–141 (2012)CrossRef
70.
go back to reference N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani, Demystifying iot security: an exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations. IEEE Commun. Surv. Tutor. 21(3), 2702–2733 (2019)CrossRef N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani, Demystifying iot security: an exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations. IEEE Commun. Surv. Tutor. 21(3), 2702–2733 (2019)CrossRef
71.
go back to reference W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, Y.A. Bangash, An in-depth analysis of iot security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10 250–10 276 (2020) W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, Y.A. Bangash, An in-depth analysis of iot security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10 250–10 276 (2020)
72.
go back to reference J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, Wireless sensor network security: a survey: security in distributed, grid, and pervasive computing ed. by Y. Xiao. Auerbach Publications J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, Wireless sensor network security: a survey: security in distributed, grid, and pervasive computing ed. by Y. Xiao. Auerbach Publications
73.
go back to reference S. Berger, O. Bürger, M. Röglinger, Attacks on the industrial internet of things-development of a multi-layer taxonomy. Comput. Secur. 93, 101790 (2020)CrossRef S. Berger, O. Bürger, M. Röglinger, Attacks on the industrial internet of things-development of a multi-layer taxonomy. Comput. Secur. 93, 101790 (2020)CrossRef
74.
go back to reference Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, W. Lv, Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)CrossRef Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, W. Lv, Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)CrossRef
75.
go back to reference A.N. Nowroz, K. Hu, F. Koushanfar, S. Reda, Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12), 1792–1805 (2014) A.N. Nowroz, K. Hu, F. Koushanfar, S. Reda, Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12), 1792–1805 (2014)
76.
go back to reference M. Tehranipoor, F. Koushanfar, A survey of hardware trojan taxonomy and detection. IEEE Design Test Comput. 27(1), 10–25 (2010)CrossRef M. Tehranipoor, F. Koushanfar, A survey of hardware trojan taxonomy and detection. IEEE Design Test Comput. 27(1), 10–25 (2010)CrossRef
77.
go back to reference M. Zhang, N.K. Jha, Finfet-based power management for improved dpa resistance with low overhead. ACM J. Emerg. Technol. Comput. Syst. (JETC) 7(3), 1–16 (2011)CrossRef M. Zhang, N.K. Jha, Finfet-based power management for improved dpa resistance with low overhead. ACM J. Emerg. Technol. Comput. Syst. (JETC) 7(3), 1–16 (2011)CrossRef
78.
go back to reference Y. Zhou, D. Feng, Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. Cryptology ePrint Archive (2005) Y. Zhou, D. Feng, Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. Cryptology ePrint Archive (2005)
79.
go back to reference N.S. Mtetwa, P. Tarwireyi, A.M. Abu-Mahfouz, M.O. Adigun, Secure firmware updates in the internet of things: a survey, in International Multidisciplinary Information Technology and Engineering Conference (IMITEC), vol. 2019 (IEEE, 2019), pp. 1–7 N.S. Mtetwa, P. Tarwireyi, A.M. Abu-Mahfouz, M.O. Adigun, Secure firmware updates in the internet of things: a survey, in International Multidisciplinary Information Technology and Engineering Conference (IMITEC), vol. 2019 (IEEE, 2019), pp. 1–7
80.
go back to reference J. Daemen, V. Rijmen, The advanced encryption standard process, in The Design of Rijndael (Springer, 2002), pp. 1–8 J. Daemen, V. Rijmen, The advanced encryption standard process, in The Design of Rijndael (Springer, 2002), pp. 1–8
81.
go back to reference C. Peng, H. Sun, M. Yang, Y.-L. Wang, A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 49(8), 1554–1569 (2019)CrossRef C. Peng, H. Sun, M. Yang, Y.-L. Wang, A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 49(8), 1554–1569 (2019)CrossRef
82.
go back to reference B. Alohali, K. Kifayat, Q. Shi, W. Hurst, A survey on cryptography key management schemes for smart grid. J. Comput. Sci. Appl. Sci. Educat. 3(3A), 27–39 (2015) B. Alohali, K. Kifayat, Q. Shi, W. Hurst, A survey on cryptography key management schemes for smart grid. J. Comput. Sci. Appl. Sci. Educat. 3(3A), 27–39 (2015)
83.
go back to reference S. Misra, A. Vaish, Reputation-based role assignment for role-based access control in wireless sensor networks. Comput. Commun. 34(3), 281–294 (2011)CrossRef S. Misra, A. Vaish, Reputation-based role assignment for role-based access control in wireless sensor networks. Comput. Commun. 34(3), 281–294 (2011)CrossRef
84.
go back to reference V.K. Singh, M. Govindarasu, Cyber kill chain-based hybrid intrusion detection system for smart grid, in Wide Area Power Systems Stability, Protection, and Security (Springer, 2021), pp. 571–599 V.K. Singh, M. Govindarasu, Cyber kill chain-based hybrid intrusion detection system for smart grid, in Wide Area Power Systems Stability, Protection, and Security (Springer, 2021), pp. 571–599
85.
go back to reference R.G. Bace, P. Mell et al., Intrusion detection systems (2001) R.G. Bace, P. Mell et al., Intrusion detection systems (2001)
86.
go back to reference S.H. Haji, S.Y. Ameen, Attack and anomaly detection in iot networks using machine learning techniques: a review. Asian J. Res. Comput. Sci. 9(2), 30–46 (2021)CrossRef S.H. Haji, S.Y. Ameen, Attack and anomaly detection in iot networks using machine learning techniques: a review. Asian J. Res. Comput. Sci. 9(2), 30–46 (2021)CrossRef
87.
go back to reference T. Mikolov, M. Karafiát, L. Burget, J. Cernockỳ, S. Khudanpur, Recurrent neural network based language model. Interspeech 2(3), 1045–1048 (2010). Makuhari T. Mikolov, M. Karafiát, L. Burget, J. Cernockỳ, S. Khudanpur, Recurrent neural network based language model. Interspeech 2(3), 1045–1048 (2010). Makuhari
88.
go back to reference S. Hochreiter, J. Schmidhuber, Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef S. Hochreiter, J. Schmidhuber, Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef
89.
go back to reference J. Chung, C. Gulcehre, K. Cho, Y. Bengio, Empirical evaluation of gated recurrent neural networks on sequence modeling (2014), arXiv preprint arXiv:1412.3555 J. Chung, C. Gulcehre, K. Cho, Y. Bengio, Empirical evaluation of gated recurrent neural networks on sequence modeling (2014), arXiv preprint arXiv:​1412.​3555
90.
go back to reference S. Lawrence, C. Giles, A.C. Tsoi, A. Back, Face recognition: a convolutional neural-network approach. IEEE Trans. Neural Netw. 8(1), 98–113 (1997)CrossRef S. Lawrence, C. Giles, A.C. Tsoi, A. Back, Face recognition: a convolutional neural-network approach. IEEE Trans. Neural Netw. 8(1), 98–113 (1997)CrossRef
91.
go back to reference H.H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, K.-K.R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2019)CrossRef H.H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, K.-K.R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2019)CrossRef
92.
go back to reference J. Zhang, Machine learning with feature selection using principal component analysis for malware detection: a case study (2019), arXiv preprint arXiv:1902.03639 J. Zhang, Machine learning with feature selection using principal component analysis for malware detection: a case study (2019), arXiv preprint arXiv:​1902.​03639
93.
go back to reference S.M. Tahsien, H. Karimipour, P. Spachos, Machine learning based solutions for security of internet of things (iot): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)CrossRef S.M. Tahsien, H. Karimipour, P. Spachos, Machine learning based solutions for security of internet of things (iot): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)CrossRef
94.
go back to reference C. Wu, J. Shi, Y. Yang, W. Li, Enhancing machine learning based malware detection model by reinforcement learning, in Proceedings of the 8th International Conference on Communication and Network Security (2018), pp. 74–78 C. Wu, J. Shi, Y. Yang, W. Li, Enhancing machine learning based malware detection model by reinforcement learning, in Proceedings of the 8th International Conference on Communication and Network Security (2018), pp. 74–78
95.
go back to reference G. Kalnoor et al., Markov decision process based model for performance analysis an intrusion detection system in iot networks. J. Telecommun. Inf. Technol. (2021) G. Kalnoor et al., Markov decision process based model for performance analysis an intrusion detection system in iot networks. J. Telecommun. Inf. Technol. (2021)
Metadata
Title
Cyber-Security of Protection System in Power Grids—Part 1: Vulnerabilities and Counter-Measures
Authors
Shahin Riahinia
Amir Ameli
Mohsen Ghafouri
Abdulsalam Yassine
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20360-2_9