Cyber-Attacks Related to Intelligent Electronic Devices and Their Countermeasures: A Review

被引:0
作者
Wang, Jingyu [1 ]
Shi, Dongyuan [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Elect & Elect Engn, State Key Lab Adv Electromagnet Engn & Technol, Hubei Elect Power Secur & High Efficiency Key Lab, Wuhan 430074, Peoples R China
来源
2018 53RD INTERNATIONAL UNIVERSITIES POWER ENGINEERING CONFERENCE (UPEC) | 2018年
基金
中国国家自然科学基金;
关键词
intelligent electronic device; cybersecurity; threat vector; cyber-attack; defense countermeasure; DATA INJECTION ATTACKS; SECURITY; SYSTEM; PROTECTION;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Intelligent electronic devices (IEDs) are deployed in power systems to facilitate advanced automation for controlling critical equipment. Once an IED is compromised, attackers can seize the control of the physical entities in substations. They may interrupt the normal functioning of switch devices, sabotage primary equipment and manipulate measurements to impact the stability of power supply. If multiple correlative attacks are launched simultaneously, attackers may even cause cascading failures, whose consequences are often catastrophic. In this paper, a systematic review of cyber-attacks related to IEDs and their countermeasures is provided. By retrieving relevant research, the information including potential threat vectors, attack types, and defense countermeasures are analyzed. The primary purpose of this paper is to remind the researchers and engineers of up-to-date attacks and to inspire studies on countermeasures to protect IEDs and ensure power system cybersecurity.
引用
收藏
页数:6
相关论文
共 82 条
[1]  
Abbasi A., 2016, BLACK HAT EU
[2]   Uninterrupted Wireless Data Transfer for Smart Grids in the Presence of High Power Transients [J].
Abdrabou, Atef ;
Gaouda, A. M. .
IEEE SYSTEMS JOURNAL, 2015, 9 (02) :567-577
[3]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[4]  
[Anonymous], 2017, COMPUT SECURITY
[5]  
[Anonymous], 2013, 16862013 IEEE
[6]  
Anwar Adnan, 2014, P INT C SEC PRIV COM, P252
[7]   Privacy and Security in Internet of Things and Wearable Devices [J].
Arias, Orlando ;
Wurm, Jacob ;
Khoa Hoang ;
Jin, Yier .
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02) :99-109
[8]   Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid [J].
Ashok, Aditya ;
Govindarasu, Manimaran ;
Wang, Jianhui .
PROCEEDINGS OF THE IEEE, 2017, 105 (07) :1389-1407
[9]  
Basnight Z. H., 2013, THESIS
[10]  
Bulbul R., 2014, 2014 PSCC