Cybersecurity in Power Grids: Challenges and Opportunities

被引:63
作者
Krause, Tim [1 ]
Ernst, Raphael [1 ]
Klaer, Benedikt [2 ,3 ]
Hacker, Immanuel [2 ,3 ]
Henze, Martin [1 ]
机构
[1] Fraunhofer FKIE, Cyber Anal & Def, D-53343 Wachtberg, Germany
[2] Fraunhofer FIT, Digital Energy, D-52056 Aachen, Germany
[3] Rhein Westfal TH Aachen, High Voltage Equipment & Grids Digitalisat & Powe, D-52056 Aachen, Germany
关键词
critical infrastructure; cyber-physical security; cybersecurity; power grid; power system communication; RENEWABLE ENERGY; ATTACK DETECTION; SMART; SECURITY; SYSTEM; INTEGRATION; PROTECTION; MODEL;
D O I
10.3390/s21186225
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid. The resulting increase in communication creates a larger attack surface for malicious actors. Indeed, cyber attacks on power grids have already succeeded in causing temporary, large-scale blackouts in the recent past. In this paper, we analyze the communication infrastructure of power grids to derive resulting fundamental challenges of power grids with respect to cybersecurity. Based on these challenges, we identify a broad set of resulting attack vectors and attack scenarios that threaten the security of power grids. To address these challenges, we propose to rely on a defense-in-depth strategy, which encompasses measures for (i) device and application security, (ii) network security, and (iii) physical security, as well as (iv) policies, procedures, and awareness. For each of these categories, we distill and discuss a comprehensive set of state-of-the art approaches, as well as identify further opportunities to strengthen cybersecurity in interconnected power grids.
引用
收藏
页数:19
相关论文
共 134 条
  • [1] Ackermann P., 2017, IND CYBERSECURITY EF
  • [2] Grid Integration Challenges of Wind Energy: A Review
    Ahmed, Shakir D.
    Al-Ismail, Fahad S. M.
    Shafiullah, Md
    Al-Sulaiman, Fahad A.
    El-Amin, Ibrahim M.
    [J]. IEEE ACCESS, 2020, 8 : 10857 - 10878
  • [3] Blockchain in Smart Grids: A Review on Different Use Cases
    Alladi, Tejasvi
    Chamola, Vinay
    Rodrigues, Joel J. P. C.
    Kozlov, Sergei A.
    [J]. SENSORS, 2019, 19 (22)
  • [4] Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes
    Amini, Sajjad
    Pasqualetti, Fabio
    Mohsenian-Rad, Hamed
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2862 - 2872
  • [5] Andress J., 2014, BASICS INFORM SECURI, P240, DOI [10.1016/C2013-0-18642-4, DOI 10.1016/C2013-0-18642-4]
  • [6] [Anonymous], ISO/IEC 27001 Standard-Information Security Management Systems
  • [7] [Anonymous], 2010, Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • [8] [Anonymous], 2017, DIDS DISTRIBUTED INT
  • [9] [Anonymous], 62351 IEC
  • [10] [Anonymous], 2008, P INT WORKSH CYB PHY