Decoy-based Moving Target defense Against Cyber-physical Attacks On Smart Grid

被引:1
作者
Abdelwahab, Ahmed [1 ]
Lucia, Walter [1 ]
Youssef, Amr [1 ]
机构
[1] Concordia Univ, CIISE, Montreal, PQ, Canada
来源
2020 IEEE ELECTRIC POWER AND ENERGY CONFERENCE (EPEC) | 2020年
关键词
D O I
10.1109/EPEC48502.2020.9320029
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The design of successful covert cyber-physical attacks against smart grids requires a good level of knowledge about the dynamics of the target power system. Consequently, in the reconnaissance phase of a cyber-physical attack on a power system, the attacker usually needs to perform an accurate identification of the dynamics of the underlying control system. To degrade the accuracy of the system identification process, artificial noise can be added to the system measurements sent from the plant to the controller. While this approach might be effective in degrading the accuracy of recovering the parameters of the underlying target system, it comes at the expense of degrading the control system performance. In this paper, and inspired by the concept of decoy flare in air defense, a moving target defense mechanism is developed by leveraging an auxiliary set of virtual state-based decoy systems. More precisely, in this approach, the plant maintains and simulates a set of several decoy system models, designed to be indistinguishable from actual system models. At each time step, the plant sends a randomly permuted version of the corresponding measurements, of both the decoys and real system, to the controller which then evaluates and sends the corresponding optimal control of each system. The plant applies the received control inputs to the corresponding decoy models and the real system, respectively. The indistinguishability of the deployed decoy models, combined with the time-varying nature of the utilized permutation and system parameters, hinders the attacker's ability to perform an accurate system identification process. The effectiveness of the proposed approach is confirmed by considering an application example of an Automatic Generation Control (AGC) system. Based on our simulation results, the proposed decoy-based approach degrades the attacker's ability to correctly identify the underlying state-space model of the considered system from the intercepted control inputs and sensor measurements. It also does not impose any penalty on the control performance of the underlying system.
引用
收藏
页数:5
相关论文
共 26 条
[21]   COVERT MISAPPROPRIATION OF NETWORKED CONTROL SYSTEMS PRESENTING A FEEDBACK STRUCTURE [J].
Smith, Roy S. .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :82-92
[22]  
TUGNAIT JK, 1990, PROCEEDINGS OF THE 29TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, P1080, DOI 10.1109/CDC.1990.203768
[23]   Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks [J].
Vollmer, Todd ;
Manic, Milos .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) :1337-1347
[24]  
Weerakkody S, 2015, IEEE DECIS CONTR P, P5820, DOI 10.1109/CDC.2015.7403134
[25]  
Whitehead DE, 2017, ANN CONF PROTECT REL
[26]  
Youssef A., 2020, POLYM BULL, DOI DOI 10.1007/S00289-020-03301-5