Flooding Attacks against Secure Time-Critical Communications in the Power Grid

被引:0
|
作者
Zhang, Fengli [1 ]
Mahler, Michael [1 ]
Li, Qinghua [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
来源
2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM) | 2017年
关键词
power grid; electric substation; time-critical communication; flooding attack; authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many communication messages in electric substations of the power grid need to be delivered in a very short time (e.g., 3ms according to IEC 61850). However, the delivery delay of such messages is sensitive to flooding attacks that will increase the delay. IEC 62351 specifies that these messages should be signed with digital signatures to provide authentication. The processing of signature generation and verification further increases the delay of message delivery and makes time-critical messages more sensitive to flooding attacks. In this paper, we first experimentally study how flooding attacks affect the delivery delay of time-critical messages protected with popular authentication schemes both in wireless and wired networks. The experimental results show that flooding attacks can easily increase the delay of time-critical communications in wireless networks but not in wired networks. Then we identify a practical intelligent flooding attack where even a small number of flooding packets can significantly increase the delivery delay in a wired network. Finally, we propose a defense scheme to address the intelligent attack and evaluate its effectiveness.
引用
收藏
页码:449 / 454
页数:6
相关论文
共 10 条
  • [1] Critical Location of Communications Network with Power Grid Power Supply
    Saito, Hiroshi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (02) : 166 - 173
  • [2] Protecting Delay-Sensitive Traffic Transmission against Flooding Attacks in Smart Grid Networks
    Kim, Mihui
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 1121 - 1124
  • [3] Robustness of Power Grid Topologies Against Centrality-Based Attacks
    Bhave, Anuja S.
    Crow, Mariesa L.
    Cetinkaya, Egemen K.
    2016 RESILIENCE WEEK (RWS), 2016, : 115 - 118
  • [4] Wireless Mesh Network in Smart Grid: Modeling and Analysis for Time Critical Communications
    Xu, Yi
    Wang, Wenye
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (07) : 3360 - 3371
  • [5] Semantic analysis framework for protecting the power grid against monitoring-control attacks
    Wang, Jiankang
    Constante, Gonzalo
    Moya, Christian
    Hong, Junho
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (01) : 119 - 126
  • [6] Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks
    Kroeger, Trevor
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    Karimi, Nazhmeh
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1000 - 1005
  • [7] A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks
    Abhinaya, E. V.
    Sudhakar, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [8] Blockchain-Based One-Time Authentication for Secure V2X Communication Against Insiders and Authority Compromise Attacks
    Noh, Jaewon
    Kwon, Yongseok
    Son, Junggab
    Cho, Sunghyun
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 6235 - 6248
  • [9] A tri-level optimization model for power grid defense with the consideration of post-allocated DGs against coordinated cyber-physical attacks
    He, Huihui
    Huang, Shengjun
    Liu, Yajie
    Zhang, Tao
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 130
  • [10] Dynamic power-aware scheduling of real-time tasks for FPGA-based cyber physical systems against power draining hardware trojan attacks
    Guha, Krishnendu
    Majumder, Atanu
    Saha, Debasri
    Chakrabarti, Amlan
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) : 8972 - 9009