Skip to main content
Top

2023 | OriginalPaper | Chapter

Improving Cybersecurity Situational Awareness in Smart Grid Environments

Authors : Thusitha Thilina Dayaratne, Fariha Tasmin Jaigirdar, Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph

Published in: Power Systems Cybersecurity

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Demand response (DR) and peer-to-peer (P2P) energy trading in smart grids use distributed architectures and multiple data sources to enable more consumer involvement. Given the reliance on and behind-the-meter data and the distributed and heterogeneous setups, these data and processes are prone to various cybersecurity attacks. Hence, identification of security risks and continuous situational awareness is essential to establish system trust and resilience. In such a multi-layered, distributed system, data origin and the steps for processing, modifying and aggregating data are highly significant. Data provenance denotes metadata describing data derivation throughout the different layers of the system. Tracking data provenance can provide valuable information on data history and lineage. However, while provenance generates metadata for data history, security-relevant information to estimate relevant risks are not addressed. This chapter emphasises the need for security-aware data provenance in residential DR and P2P energy trading. Based on the existing Prov-IoT model for security-aware provenance in the Internet of Things applications, we present a refined model with entities and metadata specific to smart grids and microgrids. This instantiation named Prov-IoT-MG, demonstrates the importance and necessity of security-aware provenance graphs for continuously estimating risks against man-in-the-middle, false data injection and load altering attacks. We illustrate how Prov-IoT-MG graphs can be generated and evaluated at run-time and are useful in providing up-to-date information on active security controls and other security-relevant information. Finally, we discuss how these graphs help to improve the resilience of grid processes with higher situational awareness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference OpenADR 2.0 Profile Specification. Technical report, OpenADR Alliance (2013) OpenADR 2.0 Profile Specification. Technical report, OpenADR Alliance (2013)
4.
go back to reference Electricity Rule Change Proposal. Technical report, Australian Energy Market Operator (2020) Electricity Rule Change Proposal. Technical report, Australian Energy Market Operator (2020)
5.
go back to reference U. Acar, P. Buneman, J. Cheney, J. Van Den Bussche, N. Kwasnikowska, S. Vansummeren, A graph model of data and workflow provenance, in Procs. TAPP’10 workshop (Theory and Practice of Provenance) (2010), p. 8 U. Acar, P. Buneman, J. Cheney, J. Van Den Bussche, N. Kwasnikowska, S. Vansummeren, A graph model of data and workflow provenance, in Procs. TAPP’10 workshop (Theory and Practice of Provenance) (2010), p. 8
6.
go back to reference M.N. Aman, K.C. Chua, B. Sikdar, Mutual authentication in iot systems using physical unclonable functions. IEEE Internet Things J. 4(5), 1327–1340 (2017)CrossRef M.N. Aman, K.C. Chua, B. Sikdar, Mutual authentication in iot systems using physical unclonable functions. IEEE Internet Things J. 4(5), 1327–1340 (2017)CrossRef
7.
go back to reference M.N. Aman, K.C. Chua, B. Sikdar, Secure data provenance for the internet of things, in Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS ’17 (Association for Computing Machinery, New York, 2017), pp. 11–14. https://doi.org/10.1145/3055245.3055255 M.N. Aman, K.C. Chua, B. Sikdar, Secure data provenance for the internet of things, in Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS ’17 (Association for Computing Machinery, New York, 2017), pp. 11–14. https://​doi.​org/​10.​1145/​3055245.​3055255
8.
go back to reference S. Amini, F. Pasqualetti, H. Mohsenian-Rad, Dynamic load altering attacks against power system stability: attack models and protection schemes. IEEE Trans. Smart Grid 9(4), 2862–2872 (2016)CrossRef S. Amini, F. Pasqualetti, H. Mohsenian-Rad, Dynamic load altering attacks against power system stability: attack models and protection schemes. IEEE Trans. Smart Grid 9(4), 2862–2872 (2016)CrossRef
10.
go back to reference C. Barreto, A.A. Cárdenas, Impact of the market infrastructure on the security of smart grids. IEEE Trans. Industr. Inf. 15(7), 4342–4351 (2019)CrossRef C. Barreto, A.A. Cárdenas, Impact of the market infrastructure on the security of smart grids. IEEE Trans. Industr. Inf. 15(7), 4342–4351 (2019)CrossRef
11.
go back to reference C. Barreto, H. Neema, X. Koutsoukos, Attacking electricity markets through iot devices. Computer 53(5), 55–62 (2020)CrossRef C. Barreto, H. Neema, X. Koutsoukos, Attacking electricity markets through iot devices. Computer 53(5), 55–62 (2020)CrossRef
12.
go back to reference C. Chen, J. Wang, S. Kishore, A distributed direct load control approach for large-scale residential demand response. IEEE Trans. Power Syst. 29(5), 2219–2228 (2014)CrossRef C. Chen, J. Wang, S. Kishore, A distributed direct load control approach for large-scale residential demand response. IEEE Trans. Power Syst. 29(5), 2219–2228 (2014)CrossRef
13.
go back to reference M.H. Chia, S.L. Keoh, Z. Tang, Secure data provenance in home energy monitoring networks, in Proceedings of the 3rd Annual Industrial Control System Security Workshop, ICSS 2017 (Association for Computing Machinery, New York, 2017), pp. 7–14. https://doi.org/10.1145/3174776.3174778 M.H. Chia, S.L. Keoh, Z. Tang, Secure data provenance in home energy monitoring networks, in Proceedings of the 3rd Annual Industrial Control System Security Workshop, ICSS 2017 (Association for Computing Machinery, New York, 2017), pp. 7–14. https://​doi.​org/​10.​1145/​3174776.​3174778
14.
go back to reference R. Dasgupta, A. Sakzad, C. Rudolph, Cyber attacks in transactive energy market-based microgrid systems. Energies 14(4), 1137 (2021)CrossRef R. Dasgupta, A. Sakzad, C. Rudolph, Cyber attacks in transactive energy market-based microgrid systems. Energies 14(4), 1137 (2021)CrossRef
15.
go back to reference T. Dayaratne, C. Rudolph, A. Liebman, M. Salehi, Robust demand response for device scheduling under false data injection attacks in smart grids, in 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) (IEEE, 2020), pp. 294–298 T. Dayaratne, C. Rudolph, A. Liebman, M. Salehi, Robust demand response for device scheduling under false data injection attacks in smart grids, in 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) (IEEE, 2020), pp. 294–298
16.
go back to reference T. Dayaratne, C. Rudolph, A. Liebman, M. Salehi, We can pay less: coordinated false data injection attack against residential demand response in smart grids, in Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (2021), pp. 41–52 T. Dayaratne, C. Rudolph, A. Liebman, M. Salehi, We can pay less: coordinated false data injection attack against residential demand response in smart grids, in Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (2021), pp. 41–52
17.
go back to reference T. Dayaratne, C. Rudolph, A. Liebman, M. Salehi, S. He, High impact false data injection attack against real-time pricing in smart grids, in 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) (IEEE, 2019), pp. 1–5 T. Dayaratne, C. Rudolph, A. Liebman, M. Salehi, S. He, High impact false data injection attack against real-time pricing in smart grids, in 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) (IEEE, 2019), pp. 1–5
18.
go back to reference E. Esiner, D. Mashima, B. Chen, Z. Kalbarczyk, D. Nicol, F-pro: a fast and flexible provenance-aware message authentication scheme for smart grid, in 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (IEEE, 2019), pp. 1–7 E. Esiner, D. Mashima, B. Chen, Z. Kalbarczyk, D. Nicol, F-pro: a fast and flexible provenance-aware message authentication scheme for smart grid, in 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (IEEE, 2019), pp. 1–7
20.
go back to reference X. Han, T. Pasquier, M. Seltzer, Provenance-based intrusion detection: opportunities and challenges, in 10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018) (2018) X. Han, T. Pasquier, M. Seltzer, Provenance-based intrusion detection: opportunities and challenges, in 10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018) (2018)
22.
go back to reference F.T. Jaigirdar, C. Rudolph, C. Bain, Prov-IoT: a security-aware IoT provenance model, in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (IEEE, 2020), pp. 1360–1367 F.T. Jaigirdar, C. Rudolph, C. Bain, Prov-IoT: a security-aware IoT provenance model, in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (IEEE, 2020), pp. 1360–1367
24.
go back to reference G. Liang, J. Zhao, F. Luo, S. Weller, Z. Dong, A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8, 1630–1638 (2017)CrossRef G. Liang, J. Zhao, F. Luo, S. Weller, Z. Dong, A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8, 1630–1638 (2017)CrossRef
25.
go back to reference A.H. Mohsenian-Rad, A. Leon-Garcia, Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2(4), 667–674 (2011)CrossRef A.H. Mohsenian-Rad, A. Leon-Garcia, Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2(4), 667–674 (2011)CrossRef
26.
go back to reference Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., Den Bussche, J.V.: The open provenance model core specification (v1.1). Future Gener. Comput. Syst. 27(6), 743–756 (2011). https://doi.org/10.1016/j.future.2010.07.005 Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., Den Bussche, J.V.: The open provenance model core specification (v1.1). Future Gener. Comput. Syst. 27(6), 743–756 (2011). https://​doi.​org/​10.​1016/​j.​future.​2010.​07.​005
27.
go back to reference L. Moreau, P. Missier, Prov-dm: The prov data model, in w3c Recommendation. World Wide Web Consortium (2013) L. Moreau, P. Missier, Prov-dm: The prov data model, in w3c Recommendation. World Wide Web Consortium (2013)
28.
go back to reference H. Mortaji, S.H. Ow, M. Moghavvemi, H.A.F. Almurib, Load shedding and smart-direct load control using internet of things in smart grid demand response management. IEEE Trans. Ind. Appl. 53(6), 5155–5163 (2017)CrossRef H. Mortaji, S.H. Ow, M. Moghavvemi, H.A.F. Almurib, Load shedding and smart-direct load control using internet of things in smart grid demand response management. IEEE Trans. Ind. Appl. 53(6), 5155–5163 (2017)CrossRef
30.
go back to reference H. Olufowobi, R. Engel, N. Baracaldo, L.A.D. Bathen, S. Tata, H. Ludwig, Data provenance model for internet of things (iot) systems, in Service-Oriented Computing - ICSOC 2016 Workshops. ed. by K. Drira, H. Wang, Q. Yu, Y. Wang, Y. Yan, F. Charoy, J. Mendling, M. Mohamed, Z. Wang, S. Bhiri (Springer International Publishing, Cham, 2017), pp.85–91CrossRef H. Olufowobi, R. Engel, N. Baracaldo, L.A.D. Bathen, S. Tata, H. Ludwig, Data provenance model for internet of things (iot) systems, in Service-Oriented Computing - ICSOC 2016 Workshops. ed. by K. Drira, H. Wang, Q. Yu, Y. Wang, Y. Yan, F. Charoy, J. Mendling, M. Mohamed, Z. Wang, S. Bhiri (Springer International Publishing, Cham, 2017), pp.85–91CrossRef
31.
go back to reference M. Pilz, F.B. Naeini, K. Grammont, C. Smagghe, M. Davis, J.C. Nebel, L. Al-Fagih, E. Pfluegel, Security attacks on smart grid scheduling and their defences: a game-theoretic approach. Int. J. Inf. Sec. (2019) M. Pilz, F.B. Naeini, K. Grammont, C. Smagghe, M. Davis, J.C. Nebel, L. Al-Fagih, E. Pfluegel, Security attacks on smart grid scheduling and their defences: a game-theoretic approach. Int. J. Inf. Sec. (2019)
34.
go back to reference C. Zhang, J. Wu, Y. Zhou, M. Cheng, C. Long, Peer-to-peer energy trading in a microgrid. Appl. Energy 220, 1–12 (2018)CrossRef C. Zhang, J. Wu, Y. Zhou, M. Cheng, C. Long, Peer-to-peer energy trading in a microgrid. Appl. Energy 220, 1–12 (2018)CrossRef
Metadata
Title
Improving Cybersecurity Situational Awareness in Smart Grid Environments
Authors
Thusitha Thilina Dayaratne
Fariha Tasmin Jaigirdar
Rumpa Dasgupta
Amin Sakzad
Carsten Rudolph
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20360-2_5