An Investigation on Feasibility and Security for Cyberattacks on Generator Synchronization Process

被引:16
作者
Kandasamy, Nandha Kumar [1 ]
机构
[1] Singapore Univ Technol & Design, iTrust, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Generators; Synchronization; Power system stability; Power supplies; Malware; Security; Magnetosphere; Generator cyberattacks; malware-based attacks; physical layer security (PLS); power distribution systems (PDSs); synchronization process; PROTECTION;
D O I
10.1109/TII.2019.2957828
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electric power supply is crucial for the effective operation of many sectors such as manufacturing, health care, etc. Further, electrification of the transportation network including metro-rail systems and personal electric vehicles necessitates capacity expansion of power distribution system (PDS). Capacity expansion in PDSs is seeing a clear paradigm shift from component upgrades to the incorporation of distributed energy resources. Though renewable energy sources are attractive from the sustainability aspect, conventional generators are also essential for many applications such as maintaining the grid stability. In this article, for the first time, we report a new type of attack on the generators; attacks on the synchronization process, targeting the availability of generators. The threat model considered in this article is similar to the popular real-world attacks, such as "Stuxnet worm" or programmable logic controller root-kit attacks such as "Harvey," however, the reported attack goal is novel. We propose a defense mechanism that can be decoupled from the network data and is named as physical layer security (PLS). We present theoretical analysis, simulation results, and experimental validation for the reported attack. We also propose an alternative implementation named as Level 0-1 security for cases where PLS may not be practical. The proposed defense is generic and can be extended to many other applications/attack vectors.
引用
收藏
页码:5825 / 5834
页数:10
相关论文
共 38 条
  • [1] Adepu S., 2019, INT J INF SECUR, V19, P1
  • [2] Alberts C., 2003, INTRO OCTAVE APPROAC
  • [3] Amadi HachimenumNyebuchi., 2015, J ENERGY TECHNOLOGIE, V5, P27
  • [4] [Anonymous], 2017, P NETW DISTR SYST SE
  • [5] [Anonymous], 2015, 2015 IEEE COMP SEM I
  • [6] [Anonymous], CVE20170144
  • [7] [Anonymous], 2018, LECT NOTES ARTIFICIA
  • [8] SEDA: Scalable Embedded Device Attestation
    Asokan, N.
    Brasser, Ferdinand
    Ibrahim, Ahmad
    Sadeghi, Ahmad-Reza
    Schunter, Matthias
    Tsudik, Gene
    Wachsmann, Christian
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 964 - 975
  • [9] Adjoint BFKL at finite coupling: a short-cut from the collinear limit
    Basso, Benjamin
    Caron-Huot, Simon
    Sever, Amit
    [J]. JOURNAL OF HIGH ENERGY PHYSICS, 2015, (01): : 1 - 46
  • [10] To Centralize or to Distribute: That Is the Question A Comparison of Advanced Microgrid Management Systems
    Cheng, Zheyuan
    Duan, Jie
    Chow, Mo-Yuen
    [J]. IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2018, 12 (01) : 6 - 24