Network-Level Vulnerability Assessment of Synchrophasor Measurement Devices

被引:0
作者
Swain, Kamakshi P. [1 ]
Sharma, Ankush [2 ]
Karkare, Amey [3 ]
Chakrabarti, Saikat [2 ]
Gryazina, Elena [4 ]
Terzija, Vladimir [5 ]
机构
[1] Synergy Syst & Solut, Faridabad 121003, India
[2] Indian Inst Technol Kanpur IIT Kanpur, Dept Elect Engn, Kanpur 208016, India
[3] Indian Inst Technol Kanpur IIT Kanpur, Dept Comp Sci & Engn, Kanpur 208016, India
[4] Skoltech, Ctr Energy Sci & Technol, Moscow 121205, Russia
[5] Newcastle Univ, Sch Engn, Merz Court E4 41, Newcastle Upon Tyne NE1 7RU, England
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Cyber attack; device firmware; phasor measurement units; situational awareness; synchrophasor; vulnerability assessment; CYBER-ATTACKS; SECURITY;
D O I
10.1109/ACCESS.2024.3403456
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability assessment forms the foundation for remediation activities that an organization develops as a part of risk assessment and mitigation. This paper presents a synchrophasor measurement device-specific cyber security vulnerability assessment at the network level. A synchrophasor network is essential for a wide-area measurement system (WAMS) that assembles time-synchronized data from multiple power network components and facilitates the processing and transferring of these data. Attackers can leverage their knowledge of firmware and protocols to disrupt or critically damage the functioning of the power system stealthily. Nevertheless, the exploitation can be curbed or controlled if the operator is aware of the vulnerabilities associated with the field devices. The authors detail their analysis on the following aspects: 1) classification of attacks in synchrophasor network; 2) type of resources and reconnaissance sufficient to launch an attack on field devices; and 3) identification, demonstration, and exploitation of synchrophasor device vulnerabilities. The work showcases exploitable vulnerabilities to understand the breadth and scope of a synchrophasor measurement device's exposure to a possible cyber attack. The reverse-engineered attack focuses on capturing essential features of packets and consuming the bandwidth during the three-way handshake among legitimate entities. The latency in packet transmission is gradually increased, which results in retransmission; thus, the legitimate connection gets terminated. Thus, the paper provides situational awareness at the device level and credible information regarding loopholes and weak links in field devices.
引用
收藏
页码:72491 / 72503
页数:13
相关论文
共 58 条
  • [1] Complementarity reformulations for false data injection attacks on PMU-only state estimation
    Alexopoulos, Theodoros A.
    Korres, George N.
    Manousakis, Nikolaos M.
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2020, 189
  • [2] Almas MS, 2018, IEEE T SMART GRID, V9, P4601, DOI [10.1109/PESGM.2018.8586667, 10.1109/TSG.2017.2665461]
  • [3] [Anonymous], 2011, Standard IEEE C37.2-2011
  • [4] [Anonymous], 2017, IEEE Internet Things J., V4, P6
  • [5] [Anonymous], 2017, IEEESyst. J., V11, P1644
  • [6] [Anonymous], 2017, 51Time Synchronization in the Electric Power System
  • [7] [Anonymous], 2018, Standard TEC IEEE 60255-118-1
  • [8] [Anonymous], 2010, Standard NIST IR7628
  • [9] [Anonymous], 2019, IEEE Syst. J., V13, P710
  • [10] GPS Multireceiver Joint Direct Time Estimation and Spoofer Localization
    Bhamidipati, Sriramya
    Gao, Grace Xingxin
    [J]. IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2019, 55 (04) : 1907 - 1919