You are on page 1of 15

INVITED

PAPER

Cyber–Physical System Security


for the Electric Power Grid
Control in power systems that may be vulnerable to security attacks is discussed in this
paper as are control loop vulnerabilities, potential impact of disturbances,
and several mitigations.
By Siddharth Sridhar, Student Member IEEE , Adam Hahn, Student Member IEEE , and
Manimaran Govindarasu, Senior Member IEEE

ABSTRACT | The development of a trustworthy smart grid ment of a smart electric grid. The smart grid will expand
requires a deeper understanding of potential impacts resulting the current capabilities of the grid’s generation, transmis-
from successful cyber attacks. Estimating feasible attack sion, and distribution systems to provide an infrastructure
impact requires an evaluation of the grid’s dependency on its capable of handling future requirements for distributed
cyber infrastructure and its ability to tolerate potential failures. generation, renewable energy sources, electric vehicles,
A further exploration of the cyber–physical relationships within and the demand-side management of electricity. The U.S.
the smart grid and a specific review of possible attack vectors is Department of Energy (DOE) has identified seven pro-
necessary to determine the adequacy of cybersecurity efforts. perties required for the smart grid to meet future demands
This paper highlights the significance of cyber infrastructure [1]. These requirements include attack resistance, self-
security in conjunction with power application security to pre- healing, consumer motivation, power quality, generation
vent, mitigate, and tolerate cyber attacks. A layered approach is and storage accommodation, enabling markets, and asset
introduced to evaluating risk based on the security of both the optimization.
physical power applications and the supporting cyber infra- While technologies such as phasor measurement units
structure. A classification is presented to highlight dependen- (PMU), wide area measurement systems, substation
cies between the cyber–physical controls required to support automation, and advanced metering infrastructures
the smart grid and the communication and computations that (AMI) will be deployed to help achieve these objectives,
must be protected from cyber attack. The paper then presents they also present an increased dependency on cyber
current research efforts aimed at enhancing the smart grid’s resources which may be vulnerable to attack [2]. Recent
application and infrastructure security. Finally, current chal- U.S. Government Accountability Office (GAO) investiga-
lenges are identified to facilitate future research efforts. tions into the grid’s cyber infrastructure have questioned
the adequacy of the current security posture [3]. The
KEYWORDS | Cyber–physical systems (CPS); cyber security; North American Electric Reliability Corporation (NERC)
electric grid; smart grid; supervisory control and data acquisi- has recognized these concerns and introduced compli-
tion (SCADA) ance requirements to enforce baseline cybersecurity
efforts throughout the bulk power system [4]. Addition-
ally, current events have shown attackers using increas-
I. INTRODUCTION ing sophisticated attacks against industrial control
An increasing demand for reliable energy and numerous systems while numerous countries have acknowledged
technological advancements have motivated the develop- that cyber attacks have targeted their critical infrastruc-
tures [5], [6].
A comprehensive approach to understanding security
Manuscript received June 29, 2011; revised August 11, 2011; accepted August 12, 2011.
Date of publication October 3, 2011; date of current version December 21, 2011. concerns within the grid must utilize cyber–physical sys-
This work was supported by the National Science Foundation under tem (CPS) interactions to appropriately quantify attack
Grant CNS 0915945.
The authors are with the Department of Electrical and Computer Engineering, impacts [7] and evaluate effectiveness of countermeasures.
Iowa State University, Ames, IA 50011 USA (e-mail: sridhar@iastate.edu). This paper highlights CPS security for the power grid as
Digital Object Identifier: 10.1109/JPROC.2011.2165269 the functional composition of the following: 1) the physical

210 Authorized licensed use


Proceedings oflimited
the to:
IEEE | Vol.
Bahria 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions
0018-9219/$26.00  2011apply.
IEEE
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

Fig. 1. Power grid cyber–physical infrastructure.

components and control applications; 2) the cyber infra- The paper is organized as follows. Section II introduces
structures required to support necessary planning, oper- a risk assessment methodology which incorporates both
ational, and market functions; 3) the correlation between cyber and physical characteristics to identify physical im-
cyber attacks and the resulting physical system impacts; pacts from cyber attacks. Section III presents a classifica-
and 4) the countermeasures to mitigate risks from cyber tion detailing the power applications necessary to facilitate
threats. Fig. 1 shows a CPS view of the power grid. The grid control. Each power application contains a review of
cyber systems, consisting of electronic field devices, com- the information, communication, and algorithms required
munication networks, substation automation systems, and to support its operation. Additionally, specific cybersecur-
control centers, are embedded throughout the physical ity concerns are addressed for each application and poten-
grid for efficient and reliable generation, transmission, and tial physical impacts are explored. Section IV provides a
distribution of power. The control center is responsible for review of current research efforts focusing on security
real-time monitoring, control, and operational decision enhancements for the supporting infrastructure. Finally,
making. Independent system operators (ISOs) perform emerging research challenges are introduced in Section V
coordination between power utilities, and dispatch com- to highlight areas requiring attention.
mands to their control centers. Utilities that participate in
power markets also interact with the ISOs to support mar-
ket functions based on real-time power generation, trans- II. RISK ASSESS MENT METHODOLOGY
mission, and demand. The complexity of the cyber–physical relationship can
This paper addresses smart grid cybersecurity concerns present unintuitive system dependencies. Performing ac-
by analyzing the coupling between the power control curate risk assessments requires the development of
applications and cyber systems. The following terms are models that provide a basis for dependency analysis and
introduced to provide a common language to address these quantifying resulting impacts. This association between
concepts throughout the paper: the salient features within both the cyber and physical
• power application: the collection of operational infrastructure will assist in the risk review and mitigation
control functions necessary to maintain stability processes. This paper presents a coarse assessment meth-
within the physical power system; odology to illustrate the dependency between the power
• supporting infrastructure: the cyber infrastructure applications and supporting infrastructure. An overview of
including software, hardware, and communication the methodology is presented in Fig. 2.
networks. Risk is traditionally defined as the impact times the
This division of the grid’s command and control functions likelihood of an event [8]. Likelihood should be ad-
will be utilized to show how cybersecurity concerns can be dressed through the infrastructure vulnerability analysis
evaluated and mitigated through future research. Attempts step which addresses the supporting infrastructure’s
to enhance the current cybersecurity posture should ex- ability to limit attacker’s access to the critical control
plore the development of secure power applications with functions. Once potential vulnerabilities are discovered,
more robust control algorithms that can operate reliably in the application impact analysis should be performed to
the presence of malicious inputs while deploying a secure determine effected grid control functions. This informa-
supporting infrastructure that limits an adversary’s ability to tion should then be used to evaluate the physical system
manipulate critical cyber resources. impact.

Vol. 100,
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, at
06,2023 January 2012
17:29:54 | Proceedings
UTC from IEEE Xplore. of
Restrictions
the IEEE apply. 211
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

within the network infrastructure. This list provides


greater insight into likely attack vectors and also helps
identify areas requiring additional mitigation research.
After cyber vulnerabilities have been identified, the
application impact analysis step should be performed to
determine possible impacts to the applications supported
by the infrastructure. This analysis should leverage the
classification introduced in Section III to identify the im-
pacted set of communication and control mechanisms.
Once attack impacts on the power applications have been
determined, physical impact analysis should be performed
to quantify impact on the power system. This analysis can
be carried out using power system simulation methods to
quantify steady state and transient performances including
power flows and variations in grid stability parameters in
terms of voltage, frequency, and rotor angle.

B. Risk Mitigation
Mitigation activities should attempt to minimize unac-
Fig. 2. Risk assessment methodology. ceptable risk levels. This may be performed through the
deployment of a more robust supporting infrastructure or
power applications as discussed in Sections III and IV.
Understanding opportunities to focus on specific or com-
A. Risk Analysis bine approaches may present novel mitigation strategies.
The initial step in the risk analysis process is the infra- Numerous research efforts have addressed the cyber–
structure vulnerability analysis. Numerous difficulties are physical relationship within the risk assessment process.
encountered when determining cyber vulnerabilities Interdependency research by Laprie et al. focuses on ana-
within control system environments due to the high avail- lyzing escalating, cascading, and common-cause failures
ability requirements and dependencies on legacy systems within the cyber–physical relationship [11]. State ma-
and protocols [9]. A comprehensive vulnerability analysis chines are developed to evaluate the transitions influenced
should begin with the identification of cyber assets includ- by the interdomain dependencies. This research then
ing software, hardware, and communications protocols. shows how attack-based transitions can lead to failure
Then, activities such as penetration testing and vulne- states. A graph-based cyber–physical model has been pro-
rability scanning can be utilized to determine potential posed by Kundur et al. [12]. Here graphs are analyzed to
security concerns within the environment. Additionally, evaluate a control’s influence on a physical entity. This
continued analysis of security advisories from vendors, model is used to evaluate how power generation can be
system logs, and deployed intrusion detection systems impacted by the failures or attacks on cyber assets. Addi-
should be utilized to determine additional system vulner- tional research into computing likely load loss due a
abilities. Common control system cyber vulnerabilities successful cyber attack has been performed by Ten et al.
have been evaluated by the Department of Homeland [13], [14]. This research uses probabilistic methods based
Security (DHS) based on numerous technical and non- on Petri-nets and attack trees to identify weaknesses in
technical assessments [10]. Table 1 identifies these vul- substations and control centers which can then be used to
nerabilities and categorizes whether they were found in identify load loss as a percentage of the total load within
industry software products, general misconfigurations, or the power system.

Table 1 Common Control System Vulnerabilities/Weaknesses

212 Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

tional algorithms, collectively known as the energy man-


agement system (EMS), running at the control center. The
decision variables ui ðtÞ are then transmitted to actuators
associated with field devices.
An adversary could exploit vulnerabilities along the
communication links and create attack templates designed
to either corrupt the content of (e.g., integrity attacks), or
introduce a time delay or denial in the communication of
[e.g., denial of service (DoS), desynchronization, timing
attacks] these control/measurement signals [15]. It is im-
portant to study and analyze impacts of such attacks on the
power system as they could severely affect its security and
Fig. 3. A typical power system control loop. reliability. These impacts can be measured in terms of loss
of load or violations in system operating frequency and
voltage and their secondary impacts. Attack studies will
also help develop countermeasures that can prevent at-
II I. POWER S YSTEM CONTROL tacks or mitigate the impact from attacks. Countermea-
APPLICAT IONS AND S ECURITY sures include bad data detection techniques and attack
A power system is functionally divided into generation, resilient control algorithms.
transmission, and distribution. In this section, we present This section presents a classification of prominent
a classification of control loops in the power system that control loops under generation, transmission, and distri-
identifies communication signals and protocols, machines/ bution. Traditional supervisory control and data acquisi-
devices, computations, and control actions associated with tion (SCADA), local, and emerging smart grid controls
select control loops in each functional classification. The have been identified. For each control loop known vulne-
section also sheds light on the potential impact of cyber rabilities, attack templates, and potential research direc-
attacks directed at these control loops on system-wide tions have also been highlighted.
power system stability.
Control centers receive measurements from sensors A. Generation Control and Security
that interact with field devices (transmission lines, trans- The control loops under generation primarily involve
formers, etc.). The algorithms running in the control cen- controlling the generator power output and terminal volt-
ter process these measurements to make operational age. Generation is controlled by both, local (automatic
decisions. The decisions are then transmitted to actuators voltage regulator and governor control) and wide-area
to implement these changes on field devices. Fig. 3 shows a (automatic generation control) control schemes as ex-
generic control loop that represents this interaction be- plained in this section. Fig. 4 identifies the various param-
tween the control center and the physical system. The eters associated with the control loops in the generation
measurements from sensors and control messages from the system.
control center are represented by yi ðtÞ and ui ðtÞ, respec-
tively. In the power system, the measured physical param- 1) Automatic Voltage Regulator (AVR): Generator exciter
eters yi ðtÞ may refer to quantities such as voltage and control is used to improve power system stability by con-
power. These measurements from substations, transmis- trolling the amount of reactive power being absorbed or
sion lines, and other machines are sent to the control injected into the system [16]. Digital control equipment for
center using dedicated communication protocols. The the exciter enables testing of different algorithms for
measurements are then processed by a set of computa- system stability improvement. Hence, this cost-effective

Fig. 4. Generation control classification.

Vol. 100,
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, January
06,2023 2012
at 17:29:54 | Proceedings
UTC from IEEE Xplore.of
Restrictions
the IEEE apply. 213
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

approach is widely preferred and used by generation quency to its nominal value. The function of the AGC loop
utilities. is to make corrections to interarea tie-line flow and fre-
The digital exciter control module is connected to the quency deviation. The AGC ensures that each balancing
plant control center via Ethernet and communicates using authority area compensates for its own load change and the
protocols such as Modbus [17]. This Ethernet link is used power exchange between two control areas is limited to
to program the controller with voltage setpoint values. The the scheduled value. The algorithm correlates frequency
AVR control loop receives generator voltage feedback from deviation and the net tie-line flow measurements to deter-
the terminal and compares it with the voltage setpoint mine the area control error; the correction that is sent to
stored in memory. Based on the difference between the each generating station to adjust operating points once
observed measurement and the setpoint, the current every five seconds. Through this signal, the AGC ensures
through the exciter is modified to maintain voltage at that each balancing authority area meets its own load
the desired level. changes and the actual power exchanged remains as close
as possible to the scheduled exchange.
2) Governor Control: Governor control is the primary a) Cyber vulnerabilities and solutions: The automatic
frequency control mechanism. This mechanism employs a generation control relies on tie-line and frequency meas-
sensor that detects changes in speed that accompany urements provided by the SCADA telemetry system. An
disturbances and accordingly alters settings on the steam attack on AGC could have direct impacts on system fre-
valve to change the power output from the generator. The quency, stability, and economic operation. DoS type of
controllers used in modern digital governor control mod- attacks might not have a significant impact on AGC opera-
ules make use of Modbus protocol to communicate with tion unless supplemented with another attack that requires
computers in the control center via Ethernet [18]. As in the AGC operation. The following research efforts have
case of AVR, this communication link is used to define identified the impact of data corruption and intrusion on
operating setpoint for control over the governor. the AGC loop.
a) Cyber vulnerabilities and solutions: The AVR and the Esfahani et al. [19] propose a technique using reach-
governor control are local control loops. They do not de- ability analysis to gauge the impact of an intrusion attack
pend on the SCADA telemetry infrastructure for their ope- on the AGC loop. In [20], Sridhar and Manimaran develop
rations as both the terminal voltage and rotor speed are an attack template that appropriately modifies the
sensed locally. Hence, the attack surface for these control frequency and tie-line flow measurements to drive the
loops is limited. Having said that, these applications are still system frequency to abnormal operating values.
vulnerable to malware that could enter the substation LAN Areas of future research include: 1) evaluating impacts
through other entry points such as USB keys. Also, the of DoS attacks on the AGC loop in combination with other
digital control modules in both control schemes do possess attacks that trigger AGC operation; and 2) development of
communication links to the plant control center. To target domain-specific bad data detection techniques for AGC to
these control loops, an adversary could compromise plant identify data integrity attacks.
cybersecurity mechanisms and gain an entry point into the
local area network. Once this intrusion is achieved, an ad- B. Transmission Control and Security
versary can disrupt normal operation by corrupting the The transmission system normally operates at voltages
logic or settings in the digital control boards. Hence, secu- in excess of 13 KV and the components controlled include
rity measures that validate control commands that originate switching and reactive power support devices. It is the
even within the control center have to be implemented. responsibility of the operator to ensure that the power
flowing through the lines is within safe operating margins
3) Automatic Generation Control: The automatic gener- and the correct voltage is maintained. The following con-
ation control (AGC) loop is a secondary frequency control trol loops assist the operator in this functionality. Fig. 5
loop that is concerned with fine tuning the system fre- summarizes the communication protocols and other

Fig. 5. Transmission control classification.

214 Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

parameters associated with the control loops in the injection or absorption in a power system to improve the
transmission system. performance of the transmission system. The primary aim
of such devices is to provide voltage support, that is, to
1) State Estimation: Power system state estimation is a minimize voltage fluctuation at a given end of a trans-
technique by which estimates of system variables such as mission line. These devices can also increase the power
voltage magnitude and phase angle (state variables) are transferable through a given transmission line and also
made based on presumed faulty measurements from field have the potential to help avoid blackout situations.
devices. The process provides an estimate of state variables Synchronous condensers and mechanically switchable
not just when field devices provide imperfect measure- capacitors and inductors were the conventional VAR com-
ments, but also when the control center fails to receive pensation devices. However, with recent advancement in
measurements either due to device or communication thyristor-based controllers, devices such as the ones
channel malfunction. This gives the operator details on belonging to the flexible AC transmission systems
power flows and voltage magnitudes along different sec- (FACTS) family, are gaining popularity.
tions of the transmission network and hence assists in FACTS devices interact with one another to exchange
making operational decisions. The control center performs operational information [31]. Though these devices func-
computations using thousands of measurements it receives tion autonomously, they depend on communication with
through the wide-area network. A good amount of work has other FACTS devices for information to determine ope-
been done in developing techniques to detect bad data in rating point.
state estimation [21]–[26]. These techniques provide good a) Cyber vulnerabilities and solutions: In [32], the
estimates of state variables despite errors introduced by authors provide a list of attack vectors that could be used
device and channel imperfections. However, they were not against cooperating FACTS devices (CFDs). Though at-
designed to be fault tolerant when malicious data are tacks such as denial of service and data injection are well
injected with intent. studied and understood in the traditional IT environment,
a) Cyber vulnerabilities and solutions: Bad data detec- the authors provide an insight into what these attacks
tion in state estimation is well researched. However, these mean in a CFD environment.
techniques were developed for errors in data that appear 1) Denial of cooperative operation: This is a DoS
due to communication channel or device malfunctioning. attack. In this type of attack, the communication
When an adversary launches an attack directed at disrupt- to some or all the FACTS devices could be jammed
ing the smooth functioning of state estimation, these tech- by flooding the network with spurious packets.
niques might not be able to detect the presence of This will result in the loss of critical information
malicious data. exchange and thus affect long-term and dynamic
Liu et al. created a class of attacks, called false data control capabilities.
injection attacks, that escape detection by existing bad 2) Desynchronization (timing-based attacks): The
measurement identification algorithms, provided they had control algorithms employed by CFDs are time
knowledge of the system configuration [27]. It was deter- dependent and require strict synchronization. An
mined that to inject false data into a single state variable in attack of this kind could disrupt steady operation
the IEEE 300-bus system, it was sufficient to compromise of CFDs.
ten meters. In [28], Kosut et al. verify that the impact from 3) Data injection attacks: This type of attacks re-
false data injection attack discussed in [27] is the same as quires an understanding of the communication
removing the attacked meters form the network. The protocol. The attack could be used to send in-
authors also propose a graph-theoretic approach to deter- correct operational data such as status and control
mine the smallest set of meters that have to be compro- information. This may result in unnecessary VAR
mised to make the power network unobservable. compensation and in unstable operating condi-
Bobba et al. [29] developed a technique to detect false tions. Attack templates of this type were imple-
data injection attacks. The idea was to observe a subset of mented on the IEEE 9-bus system and the results
measurements and perform calculations based on them to are presented in [33].
detect malicious data. Xie et al. show that a successful
attack on state estimation could be used in the electricity 3) Wide-Area Monitoring Systems: PMU-based wide-area
markets to make financial gains [30]. As settlements be- measurement systems are currently being installed in the
tween utilities are calculated based on values from state United States and other parts of the world. The phase
estimation, the authors show that a profit of $8/MWh can angles of voltage phasors measured by PMUs directly help
be made by tampering with meters that provide line flow in the computation of real power flows in the network, and
information. could thus assist in decision making at the control center.
PMU-based control applications are yet to be used for real-
2) VAR Compensation: Volt-ampere reactive (VAR) time control. However, Phadke and Thorp [34] identify
compensation is the process of controlling reactive power control applications that could be enhanced by using data

Vol. 100,06,2023
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, January 2012
at 17:29:54 | Proceedings
UTC from IEEE Xplore.of
Restrictions
the IEEE apply. 215
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

provided by PMUs. It is suggested that HVDC systems, communication infrastructure or a malicious change to the
centralized excitation systems, FACTS controllers, and control logic could result in unscheduled tripping of dis-
power system stabilizers could benefit from wide-area tribution feeders, leaving load segments unserved. The
PMU measurements. outage that occurred in Tempe, AZ, in 2007, is an example
PMUs use global positioning system (GPS) technology of how an improperly configured load-shedding program can
to accurately timestamp phasor measurements. Thus, the result in large-scale load shedding [36]. The distribution load-
phase difference between voltages on either end of a shedding program of the Salt River Project was unexpectedly
transmission line, at a given instant, can be accurately activated resulting in the opening of 141 breakers and a loss of
measured by using this technology. Phasor data concen- 399 MW. The outage lasted 46 min and affected 98 700
trators combine data from multiple PMUs and provide a customers. Though the incident occurred due to a poor
time-aligned data set for a particular region to the control configuration management by the employees, it goes on to
center. The North American SynchroPhasor Initiative show the impact an adversary can cause if a substation is
(NASPInet) [35] effort aims to develop a wide-area com- successfully intruded.
munications infrastructure to support this PMU operation.
It is recognized that PMU-based control applications will 2) AMI and Demand Side Management: Future distribu-
be operational within the next five years. Hence, a secure tions systems will rely heavily on AMI to increase reliabi-
and dependable WAN backbone becomes critical to power lity, incorporate renewable energy, and provide consumers
system stability. with granular consumption monitoring. AMI primarily
relies on the deployment of Bsmart meters[ at consumer’s
C. Distribution Control and Security locations to provide real-time meter readings. Smart me-
The distribution system is responsible for delivering ters provide utilities with the ability to implement load
power to the customer. With the emergence of the smart control switching (LCS) to disable consumer devices when
grid, additional control loops that enable direct control of demand spikes. Additionally, demand side management
load at the end user level are becoming common. This [37] introduces a cyber–physical connection between the
section identifies key controls that help achieve this. Fig. 6 metering cyber infrastructure and power provided to con-
identifies communication protocols and other parameters sumers. The meter’s current configuration is controlled by
for key control loops in the distribution system. a meter data management system (MDMS) which lies
under utility control. The MDMS connects to an AMI
1) Load Shedding: Load shedding schemes are useful in headend device which forwards commands and aggregates
preventing a system collapse during emergency operating data collected from the meters throughout the infrastruc-
conditions. These schemes can be classified into proactive, ture [38]. Networking within the AMI infrastructure will
reactive, and manual. Active and proactive schemes are likely rely on many different technologies including RF
automatic load shedding schemes that operate with the mesh, WiMax, WiFi, and power line carrier. Application
help of relays. For example, in cases where the system layer protocols such as C12.22 or IEC 61850 will be uti-
generation is insufficient to match up to the load, auto- lized to transmit both electricity usage and meter control
matic load shedding schemes could be employed to main- operations between the meters and the MDMS. Fig. 7
tain system frequency within safe operating limits and provides an overview of the control flows that could impact
protect the equipment connected to the system. When the consumer power availability.
need arises, load is shed by a utility at the distribution level a) Cyber vulnerabilities and solutions: The smart me-
by the under-frequency relays connected to the distribu- ters at consumer locations also introduce cyber–physical
tion feeder. concerns. Control over whether the meter is enabled or
a) Cyber vulnerabilities and solutions: Modern relays disabled and the ability to remotely disable devices through
are Internet protocol (IP) ready and support communica- load control switching provide potential threats from
tion protocols such as IEC 61850. An attack on the relay attackers. Adding additional security into these functions

Fig. 6. Distribution control classification.

216 Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

Fig. 7. Control functions within AMI.

presents interesting challenges. A malicious meter disabling The development of a trustworthy electric grid requires
command can likely be prevented through the use of time- a thorough reevaluation of the supporting technologies to
wait periods [39]. Since meter disabling does not require a ensure they appropriately achieve the grid’s unique re-
real-time response, meters could be programmed to wait quirements. The remainder of this section will address
some time after receive a command before disabling the required security concerns within the supporting infra-
device. This prevention would only address remote attacks as structure and provide a review of current research efforts
the prevention logic could be bypassed if an attacker addressing these concerns. While there are a vast number
compromises the meter. Malicious LCS commands could of research areas within this domain, this paper will focus
provide a greater challenge due to more strict temporal on areas with active security research tailoring to the smart
requirements. grid’s supporting infrastructure.

A. Secure Communication
IV. SUPPORTING INFRASTRUCTURE Power applications require a secure communications
SECURI TY infrastructure to cope with the grid’s geographic disperse
The development of a secure supporting infrastructure is resources. Data transmission often utilizes wireless com-
necessary to ensure information is accurately stored and munication, dialup, and leased lines which provide in-
transmitted to the appropriate applications. While the creased physical exposure and introduces additional risk.
supporting infrastructure may share some common pro- The grid is also heavily reliant on its own set of higher level
perties with traditional IT systems, the variation is signifi- control system protocols, including Modbus, DNP3, IEC
cant enough to introduce numerous unique and challenging 61850, and ICCP. Often these protocols were not dev-
security concerns [9]. Specific properties include: eloped to be attack resilient and lack sufficient security
• long system lifecycles (> 10 years); mechanism. This section will detail how encryption, au-
• limited physical environment protection; thentication, and access control can be added to current
• restricted updating/change management communications to provide increased security.
capabilities;
• heavy dependency on legacy systems/protocols; 1) Encryption: Retrofitting communication protocols to
• limited information processing abilities. provide additional security is necessary for their continued
A secure information system traditionally enforces the use within untrusted spaces. Often this level of security
confidentiality of its data to protect against unauthorized can be obtained by deploying encrypted virtual private
access while ensuring its integrity remains intact. In addi- networks (VPNs) that protect network traffic through
tion, the system must provide sufficient availability of encapsulation within a cryptographic protocol [9]. Unfor-
information to authorized users. The primary goal of any tunately, this solution is not always feasible as the industry
cyber–physical system is to provide efficient control over is fairly dependent on non-IP networks. In addition, strict
some physical process. This naturally prioritizes informa- availability requirements may not be able to handle the
tion integrity and availability to ensure control state added latency produced by a VPN.
closely mirrors the physical system state. Security mecha- Research into bump-in-the-wire (BITW) encryption
nisms such as cryptography, access control, and authen- hardware attempts to ensure that messages can be appro-
tication are necessary to provide integrity in systems, priately encrypted and authenticated while limiting the
however, all security mechanism tailored for this environ- latency appended by the solution. Work by Tsang and
ment must also provide sufficient availability. This con- Smith provides a BITW encryption method that signifi-
straint often limits the utilization of security mechanisms cantly reduces the latency through the reduction of mes-
which fail-closed as they may deny access to a critical sage hold-back during the encryption and authentication
function. [40]. Additional research has focused on retrofitting old

Vol. 100,
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, at
06,2023 January 2012
17:29:54 | Proceedings
UTC from IEEE Xplore. of
Restrictions
the IEEE apply. 217
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

protocols with appropriate security properties. Numerous role placed on these devices introduces significant cyber-
efforts have addressed the modification of traditional SCADA security concerns due to their placement in physically
protocols such as ICCP, DNP3, and Modbus to provide unprotected environments. Large-scale deployments of
additional security while maintaining integration with embedded devices also incentivizes the use of marginally
current systems [41]–[43]. Deployment and key manage- cheaper hardware leaving little computational capacity to
ment activities still provide difficulties within geographically support various security functions such as malware or in-
disperse environments. trusion monitoring. This also stymies the ability to produce
the amount of entropy required to create secure crypto-
2) Authentication: Secure remote authentication pre- graphic keys [48]. The development of secure computation
sents a challenge due to the lengthy deployments and li- within embedded platforms provides a key challenge
mited change management capabilities. Authentication throughout CPSs.
credentials (e.g., keys and passwords) exposure increases
throughout their lifetime and protocols become increas- 1) Remote Attestation: Smart meters provide one parti-
ingly prone to attack due to continual security reviews and cularly concerning utilization of embedded systems due to
cryptanalysis advancements. The development of strong, their expansive deployments and impact to consumers.
adaptive, and highly available authentication mechanisms Research into the development of remotely attestable
is imperative to prevent unauthorized access. smart meters has suggested that a small static kernel can be
Research by Khurana, et al. has defined design princi- used to cryptographically sign loaded firmware [49]. This
ples required for authentication protocols within the grid resulting signature can then be sent as a response to attes-
[44]. By defining authentication principles, future system tation queries to verify meters have not been corrupted. By
designers can ensure their systems achieve the efficiency also providing support for remote firmware updates the
and adaptability required for continued secure use. kernel can allow future reconfiguration of the devices
Additionally, research into more flexible authentication while still providing a trusted platform. Unfortunately,
protocols has been proposed by Chakravarthy to provide these security mechanisms may still remain vulnerable to
adaptability to long deployments [45]. The proposed pro- additional attack vectors [50].
tocol provides re-keying and remoduling algorithms to Embedded devices also play important roles in the bulk
protect against key compromises and future authentication power system. Intelligent electronic devices (IEDs) utilize
module vulnerabilities. embedded devices to control relays throughout the grid.
Recent events have shown these devices can be maliciously
3) Access Control: While encryption and authentication reprogrammed to usurp intended control functions [5].
can deter external attackers, they do little to prevent against The development of improved attestation mechanisms
insider threats or attackers that have already gained some will play a critical role in the cybersecurity enhancement
internal access. Attackers with access to a communication of the grid.
network may be able to leverage various protocol
functionality to inject malicious commands into control C. Security Management and Awareness
functions. The likelihood of a successful attack could be An increased awareness of security risk and appropri-
significantly reduced by appropriately configuring software ately managing security relevant information provides an
and protocol usage to disable unnecessary functionality. equally important role in maintaining a trusted infrastruc-
Evaluating industry protocols to identify potentially ture. This section will address a range of security activities
malicious functions is imperative to ensuring secure sys- and tools including digital forensics and security incident/
tem configurations. Work by Mander dissects the DNP3 event management.
protocol detailing the function codes and data objects that
would be useful for attackers to access data, control, or 1) Digital Forensics: The ability to perform accurate digital
impact the availability of a remote DNP3 master [46]. This forensics within the electric grid is imperative to identify
research provides a foundation for understanding the security failures and preventing future incidents. Strong
likely physical impact from a compromised communica- forensic capabilities are also necessary during event inves-
tion channel. Additional research in this domain models tigation to determine the cause or extent of damage from an
feasible attacks against a control systems based on the attack. While forensic analysis on traditional IT systems is
current protocol specification [47]. More sophisticated well researched, the large number of embedded systems and
protocols targeted for smart grid use, such as ANSI C.12.22 legacy devices within the grid provides new challenges.
and IEC 61850, require additional analysis to ensure se- Research efforts by Chandia et al. have proposed the
cure implementation in new system deployments. deployment of Bforensic agents[ throughout the cyber
infrastructure to collect data about potential attacks [51].
B. Device Security Information collected by these agents can then be prio-
Embedded systems are used throughout the grid to ritized based on their ability to negatively affect grid
support monitoring and control functions. The critical operations.

218 Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

Expanding forensic capabilities within embedded sys- 2) Research Testbeds and Evaluations: Researching
tems including meters and IEDs is necessary to ensure cyber–physical issues requires the ability to analyze the
these critical resources maintain integrity. Additionally, relationship between the cyber and physical components.
operational systems may not be detached for forensics Real-world data sets containing system architecture, power
analysis, and research into online analysis methods should flows, and communication payloads are currently unavail-
be explored for these instances. able. Without these data researchers are unable to produce
accurate solutions to modern problems. Increased collab-
2) Security Incident and Event Management: The devel- oration between government, industry, and academia is
opment of technologies to collect and analyze interesting required to produce useful data which can facilitate
data sources such as system logs, IDS results and network needed research. While SCADA testbeds provide a founda-
flow information is necessary to ensure data are properly tional tool for the basis of cyber–physical research, ensur-
organized and prioritized. Briesemeister et al. researched the ing that system parameters closely represent real-world
integration of various cybersecurity data sources within a systems remains a challenge.
control system and demonstrated its ability to detect attacks The development of SCADA testbeds provides critical
[52]. This work also coupled visualization tools to provide resources to facilitate research within this domain. The
operators with a real-time understanding of network health. National SCADA Test Bed (NSTB) hosted at Idaho Na-
Tailoring this technology to provide efficient analysis of the tional Laboratory provides a real-world test environment
grid will place an impetus on control system alarms as they employing real bulk power system components and control
provide information on potential physical impacts initiated software [55]. Resulting NSTB research has resulted in the
by cyber attacks. discovery of multiple cyber vulnerabilities [56]. While this
Incidents and events within the smart grid will vary provides an optimal test environment, the cost is imprac-
greatly from their IT counterparts, analysis methods tical for many research efforts. Work done by Sandia
should be correlated with knowledge of the physical sys- National Laboratory has utilized a simulation-based test-
tem to determine anomalies. Aggregation and analysis bed allowing the incorporation of both physical and virtual
algorithms may need tailoring for environments with components. The virtual control system environment
decreased incident rates due to smaller user bases and (VCSE) allows the integration of various different power
segregated networks. system simulators into a simulated network environment
and industry standard control system software [57]. Acade-
mic efforts at Iowa State University and the University of
D. Cybersecurity Evaluation Illinois at Urbana-Champaign provide similar environ-
ments [58], [59].
1) Cybersecurity Assessment: The grid’s security postures
should be continually analyzed to ensure it provides ade-
quate security. The system’s complexity, long lifespans, and E. Intrusion Tolerance
continuously evolving cyber threats present novel attack While attempts to prevent intrusions are imperative to
vectors. The detection and removal of these security issues the development of a robust cyber infrastructure, failures
should be addressed specific to both the power applications in prevention techniques will likely occur. The ability to
and supporting infrastructure. Current research has prima- detect and tolerate intrusions is necessary to mitigate the
rily focused on the supporting infrastructure as it maintains negative effects from a successful attack.
many similarities with more traditional cyber security test-
ing. Methodologies used to perform vulnerability assess- 1) Intrusion Detection Systems: The successful utilization
ments and penetration testing have raised numerous of intrusion detection in the IT domain suggests it may also
cybersecurity concerns within the current grid [53], [54]. provide an important component in smart grid systems.
Smart grid technologies will present increasing inter- Research by Cheung et al. has leveraged salient control
domain connectivity, thereby creating a more exposed cy- system network properties into a basis for IDS technology
ber infrastructures and trust dependencies between many [60]. Common data values, protocols functions, and com-
different parties. NIST’s BGuidelines for Smart Grid Cyber munication endpoints were modeled by the IDS such that
Security[ (NISTIR 7628) has proposed more robust set of all violating packets could be flagged as malicious.
cybersecurity requirements to ensure the appropriateness While the previous research provides unique detection
of cyber protection mechanism [2]. NIST identifies logical capabilities, an attacker may still be able to create packets
interfaces between systems and parties while assigning a which closely resemble normal communications. For ex-
criticality level (e.g., high, medium, low) for the interface’s ample, a command to trip a breaker cannot be flagged as
confidentiality, integrity, and availability requirements. malicious since it is a commonly used control function.
The document then presents a list of necessary controls to Producing grid-aware intrusion detection will require a
provide an appropriate baseline security for the resulting built-in understanding of grid functions. Work by Jin et al.
interfaces. shows how basic power flow laws leveraging Bayesian

Vol. 100,06,2023
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, January 2012
at 17:29:54 | Proceedings
UTC from IEEE Xplore.of
Restrictions
the IEEE apply.219
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

reasoning can help reduce false positives by exhibiting a scenarios should include attacks on the system
real-world understanding of the system [61]. during high wind penetration.
The transition to smart grid technologies will likely • Managing exposure from increased attacks surfaces
reduce the number of IDS affable qualities compared to due to the inclusion of the AMI and MDMS infra-
traditional SCADA communications. Performing intrusion structures, widespread communication links to
detection in such a complex environment will require distribution control centers, and potentially trans-
novel data collection mechanisms as well as the ability to mission and generation control centers. Impact
detect and aggregate attack indicators across multiple studies should include attack vectors that target
network domains [62]. such devices and evaluate system stability.

2) Tolerant Architectures: Intrusion tolerance mechan- B. Risk Mitigation Algorithms


isms have recently have gained increased attention as a As in the case of risk modeling, risk mitigation must
method to ensure a system’s ability to operate effectively include solutions at both the cyber and power system level.
during an attack. Research within the Crutial project Consider the following attack scenario. One fundamental
attempts to explore both proactive and reactive mechan- vision of the smart grid is to allow controllability of do-
isms to prevent cyber attacks from impacting the system’s mestic devices by utilities to help reduce costs. If an
integrity [63]. This research explores a Byzantine tolerant adversary intrudes into the AMI network of a neighbor-
protection paradigm which assures correct operations as hood to turn on large chunks of load when they are
long as no more than f out of 3f þ 1 components are expected to be turned off, the system could experience
attacked. severe stability problems. Cyber defense mechanisms that
Extended research within intrusion tolerance should are able to detect/prevent such an attack, and power
incorporate the smart grid specific availability require- system defense mechanisms that ensure stable operation
ments and infrastructure designs. Traditional models re- in the event of an attack, should be developed.
laying on Byzantine fault/intrusion tolerance mechanism • Attack resilient control provides defense in depth to
present significant cost and may not be practical within the a CPS. In addition to dedicated cybersecurity soft-
smart grid. Future designs can leverage known physical ware and hardware, robust control algorithms
system redundancies and recovery capabilities to assist enhance security by providing security at the ap-
with traditional intrusion/fault tolerance design models. plication layer. Measurements and other data ob-
tained through the SCADA and emerging wide-area
monitoring systems have to be analyzed to detect
V. EMERGING RE SEARCH CHALLENGES the presence of anomalies. For example, an
As smart grid technologies become more prevalent, future application should first check if the obtained
research efforts must target a new set of cybersecurity measurement lies within an acceptable range and
concerns. This section documents emerging research chal- reject the ones that do not comply. However, a
lenges within this domain. smart attacker could develop attack templates that
satisfy these criteria and force the operator into
A. Risk Modeling taking wrong control actions. Hence, additional
The risk modeling methodology and subsequent risk tests that are based on forecasts, historical data and
index should capture both, the vulnerability of cyber net- engineering sense should be devised to ascertain
works in the smart grid and the potential impacts an ad- the current state of the system.
versary could inflict by exploiting these vulnerabilities. An attack might not be successful if the malicious
• The cyber vulnerability assessment plan in risk measurements do not conform to the dynamics of
modeling should be thorough. It should include all the system. In most cases, the physical parameters
sophisticated cyber-attack scenarios such as elec- of the system (e.g., generator constants) are pro-
tronic intrusions, DoS, data integrity attacks, tim- tected by utilities. These parameters play a part in
ing attacks, and coordinated cyber attacks. The determining the state of the system and system
tests should be conducted on different vendors response to an event. Hence, algorithms that incor-
solutions and configurations. porate such checks could help in identifying mali-
• The impact analysis should include dynamics intro- cious data when an attacker attempts to mislead the
duced by new power system components and asso- operator into executing incorrect commands.
ciated control, along with existing ones. The • Intelligent power system control algorithms that are
analyses must check to see if any power system able to keep the system within stability limits dur-
stability limits are violated for different attack ing contingencies are critical. Additionally, the
templates. For example, current wind generation development of enhanced power management sys-
turbines offer uneconomical frequency control and tems capable of addressing high-impact contingen-
do not contribute to system inertia. Hence, attack cy scenarios is necessary.

220Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

• Domain-specific anomaly detection and intrusion Numerous additional privacy concerns have been raised
tolerance algorithms that are able to classify mea- within the smart grid; NIST has provided a more com-
surements and commands as good/bad are key. In prehensive review of these concerns [2].
addition, built-in intelligence is required so that
devices can respond appropriately to anomaly E. Trust Management
situations. The dynamic nature for the smart grid will require
complex notions of trust to evaluated the acceptability of
C. Coordinated Attack Defense system inputs/outputs.
The power system, in most cases, is operated at (N-1) • Dynamic trust distribution with adaptability for
contingency condition and can inherently counter attacks evolving threats and likely cybersecurity failures
that are targeted at single components. This means, the (e.g., exposed authenticator, unpatched systems)
effect from the loss of a single transmission line can be and grid emergencies (e.g., cascading failures,
negated by rerouting power through alternate lines. How- natural disasters, personnel issues).
ever, the system was not designed to fend against attacks • Trust management based on data source (e.g.,
that target multiple components. Such coordinated at- SCADA field device, adjacent utilities) and verifi-
tacks, when carefully structured and executed, can push cation of trust allocations for low-trust systems
the system outside the protection zone. The increased at- (physically unprotected, limited attribution capa-
tack surface introduced by the smart grid provides an bilities), along with trust verification mechanisms/
opening for an adversary to plan such attacks. algorithms and impact analysis of trust manipula-
The North American Electric Reliability Corporation tion mechanisms.
(NERC) has instituted the Cyber Attack Task Force • Aggregation of trust with increasing data/
(CATF) to gauge system risk from such attacks and de- verification sources (e.g., more sensors, correlations
velop feasible, and cost-effective mitigation techniques with previous knowledge of grid status) and accu-
[64]. Future mitigation strategies include the following. mulation of trust requirements throughout AMI.
• Risk modeling and mitigation of coordinated attacks
is key to preventing the occurrence of attacks. F. Attack Attribution
Attack detection tools that monitor traffic and Attack attribution will play an important role in deter-
simultaneously correlate events at multiple sub- rence within the smart grid. High availability requirements
stations could help in early identification of coordi- limit the ability to disconnect potential victims within the
nated attack scenarios. control network, especially when steeping-stone attack
• Future power system planning and reliability studies methods are used.
should accommodate coordinated attack scenarios • Attribution capabilities within/between controlled
in its scope. Strategic enhancements to the networks including AMI, wide area measurement
power system infrastructure could help the system systems, and control networks.
operate within stability limits during such • Leveraging known information flows, data formats,
scenarios. and packet latencies.
• Identifying stepping-stone attacks with utility
D. AMI Security owned/managed infrastructures based on timing
Geographically distributed architectures with high analysis, content inspection, packet marking/
availability requirements present numerous security and logging schemes.
privacy concerns. Specific research challenges with AMI • Methods to reduce insider threat impacts while
include: maintaining appropriate adaptability in emergency
• remote attestation of AMI components and situations such as improved flexibility of autho-
tamper detection mechanisms to prevent meter rization and authentication or defense-in-depth
manipulations; implementations.
• exploration of security failures due to common
modal failures (e.g., propagating malware, re- G. Data Sets and Validation
motely exploitable vulnerabilities, shared Research within the smart grid realm requires realistic
authenticators); data and models to assure accurate results and real-world
• model-based anomaly methods to determine attacks applicability.
based on known usage patterns and fraud/attack • Data models for SCADA networks, AMI, wide area
detection algorithms; monitoring networks including communication
• security versus privacy tradeoffs including inference protocols, common information models (CIM),
capabilities of consumer habits, anonymization data sources/sinks.
mechanisms, anonymity concerns from both data- • Temporal requirements for data (e.g., 4 ms for pro-
at-rest and data-in-motion perspectives. tective relaying, 1–4 s for SCADA, etc.) and realistic

Vol. 100,
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, January
06,2023 2012
at 17:29:54 | Proceedings
UTC from IEEE Xplore. of
Restrictions
the IEEE apply. 221
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

data sets of control-loop interactions (e.g., AGC, infrastructure security into the risk assessment process and
voltage regulation, substation protection schemes). provides a methodology for impact evaluation. A smart
grid control classification is introduced to clearly identify
communication technologies and control messages re-
VI . CONCLUSION quired to support these control functions. Next, a review of
A reliable smart grid requires a layered protection ap- current cyber infrastructure security concerns are pre-
proach consisting of a cyber infrastructure which limits sented to both identify possible weaknesses and address
adversary access and resilient power applications that are current research efforts. Future smart grid research chal-
able to function appropriately during an attack. This work lenges are then highlighted detailing the cyber–physical
provides an overview of smart grid operation, associated security relationship within this domain. While this work
cyber infrastructure and power system controls that di- focuses on the smart grid environment, the general appli-
rectly influence the quality and quantity of power deliv- cation and infrastructure framework including many of the
ered to the end user. The paper identifies the importance research concerns will also transition to other critical
of combining both power application security and supporting infrastructure domains. h

REFERENCES [13] C.-W. Ten, G. Manimaran, and C.-C. Liu, methods in power system state estimationVA
BCybersecurity for critical infrastructures: comparative study,[ IEEE Power Eng. Rev.,
[1] A Systems View of the Modern Grid, National Attack and defense modeling,[ IEEE vol. PER-5, no. 11, pp. 27–28, Nov. 1985.
Energy Technology Laboratory (NETL), Trans. Syst. Man Cybern. A, Syst. [22] A. Monticelli and A. Garcia, BReliable bad
U.S. Department of Energy (DOE), 2007. Humans, vol. 40, no. 4, pp. 853–865, data processing for real-time state
Jul. 2010. estimation,[ IEEE Trans. Power Apparat.
[2] NISTIR 7628: Guidelines for Smart Grid Cyber
Security, National Institute for Standards and [14] C.-W. Ten, C.-C. Liu, and G. Manimaran, Syst., vol. PAS-102, no. 5, pp. 1126–1139,
Technology, Aug. 2010. BVulnerability assessment of cybersecurity May 1983.
for SCADA systems,[ IEEE Trans. Power [23] E. Handschin, F. Schweppe, J. Kohlas, and
[3] GAO-04-354: Critical Infrastructure Protection
Syst., vol. 23, no. 4, pp. 1836–1846, A. Fiechter, BBad data analysis for power
Challenges and Efforts to Secure Control
Nov. 2008. system state estimation,[ IEEE Trans.
Systems, U.S. Government Accountability
Office (GAO), Mar. 2004. [15] Y.-L. Huang, A. A. Cardenas, S. Amin, Power Apparat. Syst., vol. PAS-94, no. 2,
Z.-S. Lin, H.-Y. Tsai, and S. Sastry. (2009). pp. 329–337, Mar. 1975.
[4] NERC Critical Infrastructure Protection
Understanding the physical and economic [24] A. Garcia, A. Monticelli, and P. Abreu,
(CIP) Reliability Standards, North American
consequences of attacks on control systems. BFast decoupled state estimation and bad
Electric Reliability Corporation, 2009.
Int. J. Critical Infrastructure Protect. [Online]. data processing,[ IEEE Trans. Power Apparat.
[5] N. Falliere, L. Murchu, and E. Chien, 2(3), pp. 73–83. Available: http://www. Syst., vol. PAS-98, no. 5, pp. 1645–1652,
BW32.Stuxnet Dossier, Version 1.3,[ sciencedirect.com/science/article/pii/ Sep. 1979.
Symantec, Nov. 2010. S1874548209000213
[25] X. Nian-de, W. Shi-ying, and Y. Er-keng, BA
[6] S. Baker, S. Waterman, and G. Ivanov, [16] C. J. Mozina, M. Reichard, Z. Bukhala, new approach for detection and identification
BCrossfire: Critical infrastructure in the S. Conrad, T. Crawley, J. Gardell, of multiple bad data in power system state
age of cyber war,[ McAfee, 2009. R. Hamilton, I. Hasenwinkle, D. Herbst, estimation,[ IEEE Trans. Power Apparat.
[7] GAO-11-117: Electricity Grid Modernization: L. Henriksen, G. Johnson, P. Kerrigan, Syst., vol. PAS-101, no. 2, pp. 454–462,
Progress Being Made on Cybersecurity S. Khan, G. Kobet, P. Kumar, S. Patel, Feb. 1982.
Guidelines, but Key Challenges Remain B. Nelson, D. Sevcik, M. Thompson,
[26] V. Quintana, A. Simoes-Costa, and M. Mier,
to be Addressed, U.S. Government J. Uchiyama, S. Usman, P. Waudby, and
BBad data detection and identification
Accountability Office (GAO), Jan. 2011. M. Yalla, BCoordination of generator
techniques using estimation orthogonal
[8] G. Stoneburner, A. Goguen, and A. Feringa, protection with generator excitation
methods,[ IEEE Trans. Power Apparat.
BNIST SP 800-30: Risk management guide for control and generator capability; working
Syst., vol. PAS-101, no. 9, pp. 3356–3364,
information technology systems,[ National group j-5 of the rotating machinery
Sep. 1982.
Institute of Standards and Technology, subcommittee, power system relay
committee,[ in Proc. IEEE Power Eng. [27] Y. Liu, P. Ning, and M. K. Reiter,
Tech. Rep., Jul. 2002.
Soc. General Meeting, Jun. 2007, BFalse data injection attacks against
[9] K. Stouffer, J. Falco, and K. Scarfone, state estimation in electric power
DOI: 10.1109/PES.2007.386034.
BNIST SP 800-82: Guide to industrial control grids,[ in Proc. 16th ACM Conf. Comput.
systems (ICS) security,[ National Institute [17] GE EX2100 Excitation Systems. [Online].
Commun. Security. New York: ACM,
of Standards and Technology, Tech. Rep., Available: http://www.ge-mcs.com/
2009, pp. 21–32.
Sep. 2008. en/generator-control-and-protection/
ex-excitation-systems/ex2100.html [28] O. Kosut, L. Jia, R. Thomas, and L. Tong,
[10] Common Cybersecurity Vulnerabilities in BLimiting false data attacks on power
Industrial Control Systems, Department of [18] ABB 800xA Turbine Governor. [Online].
system state estimation,[ in Proc. 44th
Homeland Security (DHS) Control Systems Available: http://www.abb.com/product/
Annu. Conf. Inf. Sci. Syst., Mar. 2010,
Security Program (CSSP), May 2011. us/9AAC115756.aspx
DOI: 10.1109/CISS.2010.5464816.
[11] J.-C. Laprie, K. Kanoun, and M. Kaniche, [19] P. Mohajerin Esfahani, M. Vrakopoulou,
[29] D. Callaway and I. Hiskens, BDetecting
BModelling interdependencies between K. Margellos, J. Lygeros, and G. Andersson,
false data injection attacks on DC state
the electricity and information BCyber attack in a two-area power system:
estimation,[ in Proc. 1st Workshop Secure
infrastructures,[ in Comput. Safety, Impact identification using reachability,[
Control Syst., Apr. 2010. [Online]. Available:
Reliability, Security, vol. 4680, F. Saglietti in Proc. Amer. Control Conf., Jul. 2010,
https://www.truststc.org/conferences/10/
and N. Oster, Eds. Berlin, Germany: pp. 962–967.
CPSWeek/papers.htm.
Springer-Verlag, 2007, pp. 54–67. [20] S. Sridhar and G. Manimaran, BData integrity
[30] L. Xie, Y. Mo, and B. Sinopoli, BFalse data
[12] D. Kundur, X. Feng, S. Liu, T. Zourntos, attacks and their impacts on SCADA control
injection attacks in electricity markets,[ in
and K. Butler-Purry, BTowards a framework system,[ in Proc. Power Energy Soc. General
Proc. 1st IEEE Int. Conf. Smart Grid Commun.,
for cyber attack impact analysis of the Meeting, Jul. 2010, DOI: 10.1109/PES.2010.
Oct. 2010, pp. 226–231.
electric smart grid,[ in Proc. 1st IEEE Int. 5590115.
[31] A. J. Wood and B. F. Wollenberg, Power
Conf. Smart Grid Commun., Oct. 2010, [21] L. Mili, T. Van Cutsem, and
Generation, Operation and Control, 2nd ed.
pp. 244–249. M. Ribbens-Pavella, BBad data identification

222 Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

Hoboken, NJ: Wiley-Interscience, Jan. 1996. [42] I. Fovino, A. Carcano, M. Masera, and [53] R. C. Parks, BSAND2007-7328: Guide to
[Online]. Available: http://www.amazon. A. Trombetta, BDesign and implementation critical infrastructure protection cyber
com/Power-Generation-Operation-Control- of a secure Modbus protocol,[ in Critical vulnerability assessment,[ Sandia National
Allen/dp/0471586994. Infrastructure Protection III, vol. 311, Laboratories, Nov. 2007.
[32] L. R. Phillips, M. Baca, J. Hills, J. Margulies, C. Palmer and S. Shenoi, Eds. Boston, MA: [54] M. R. Permann and K. Rohde, BCyber
B. Tejani, B. Richardson, and L. Weiland, Springer-Verlag, 2009, pp. 83–96. assessment methods for SCADA security,[
Analysis of Operations and Cyber Security [43] J. T. Michalski, A. Lanzone, J. Trent, and The Instrumentation, Systems and
Policies for a System of Cooperating Flexible S. Smith, BSAND2007-3345: Secure Automation Society (ISA), Tech. Rep.,
Alternating Current Transmission System ICCP Integration Considerations and 2005.
(FACTS) Devices, Dec. 2005. Recommendations,[ Sandia National [55] National SCADA Test Bed: Fact Sheet,
[33] S. Sridhar and G. Manimaran, BData integrity Laboratories, Jun. 2007. Idaho National Laboratory (INL), 2007.
attack and its impacts on voltage control [44] H. Khurana, R. Bobba, T. Yardley, P. Agarwal, [56] NSTB Assessments Summary Report:
loop in power grid,[ in Proc. IEEE Power and E. Heine, BDesign principles for power Common Industrial Control System Cyber
Energy Soc. General Meeting, Detroit, MI, grid cyber-infrastructure authentication Security Weaknesses, Idaho National
Jul. 2011. protocols,[ in Proc. 43rd Hawaii Int. Conf. Syst. Laboratory (INL), May 2010.
[34] A. Phadke and J. S. Thorp, Synchronized Sci., Washington, DC, 2010,
[57] M. J. McDonald, G. N. Conrad, T. C. Service,
Phasor Measurements and Their Applications. DOI: 10.1109/HICSS.2010.136.
and R. H. Cassidy, BSAND2008-5954:
New York: Springer-Verlag, 2008. [45] R. Chakravarthy, C. Hauser, and Cyber effects analysis using VCSE, promoting
[35] J. Dagle, BThe North American synchrophasor D. E. Bakken, BLong-lived authentication control system reliability,[ Sandia National
initiative (NASPI),[ in Proc. IEEE Power protocols for process control systems,[ Laboratories, Sep. 2008.
Energy Soc. General Meeting, Jul. 2010, Int. J. Critical Infrastructure Protect., vol. 3,
[58] A. Hahn, B. Kregel, M. Govindarasu,
DOI: 10.1109/PES.2010.5590048. no. 3–4, pp. 174–181, 2010.
J. Fitzpatrick, R. Adnan, S. Sridhar, and
[36] J. Weiss, Protecting Industrial Control [46] T. Mander, R. Cheung, and F. Nabhani, M. Higdon, BDevelopment of the
Systems from Electronic Threats. BPower system DNP3 data object security POWERCYBER SCADA security testbed,[ in
New York: Momentum Press, May 2010. using data sets,[ Comput. Security, vol. 29, Proc. 6th Annu. Workshop Cyber Security Inf.
no. 4, pp. 487–500, 2010. Intell. Res., 2010, pp. 21-1–21-4.
[37] D. Callaway and I. Hiskens, BAchieving
controllability of electric loads,[ [47] S. East, J. Butts, M. Papa, and S. Shenoi, [59] D. C. Bergman, D. Jin, D. M. Nicol, and
Proc. IEEE, vol. 99, no. 1, pp. 184–199, BA taxonomy of attacks on the DNP3 T. Yardley, BThe virtual power system testbed
Jan. 2011. protocol,[ in Critical Infrastructure and inter-testbed integration,[ in Proc. 2nd
Protection III, vol. 311, C. Palmer and Workshop Cyber Security Experiment. Test,
[38] Security Profile for Advanced Metering
S. Shenoi, Eds. Boston, MA: Aug. 2009, pp. 1–6.
Infrastructure, v2.0, The Advanced
Springer-Verlag, 2009, pp. 67–81.
Security Acceleration Project (ASAP-SG), [60] S. Cheung, B. Dutertre, M. Fong, U. Lindqvist,
Jun. 2010. [48] P. Koopman, BEmbedded system security,[ S. K., and A. Valdes, BUsing model-based
Computer, vol. 37, pp. 95–97, Jul. 2004. intrusion detection for SCADA networks,[ in
[39] R. Anderson and S. Fuloria, BWho controls
the off switch?[ 2010 1st Proc. IEEE Int. Conf. [49] M. LeMay and C. A. Gunter, BCumulative Proc. SCADA Security Sci. Symp., Jan. 2007.
Smart Grid Commun. (SmartGridComm), attestation kernels for embedded systems,[ in [61] X. Jin, J. Bigham, J. Rodaway, D. Gamez, and
pp. 96–101, Oct. 4–6, 2010, DOI: 10.1109/ Proc. 14th Eur. Conf. Res. Comput. Security. C. Phillips, BAnomaly Detection in Electricity
SMARTGRID.2010.5622026. [Online]. Berlin, Germany: Springer-Verlag, 2009, Cyber Infrastructures,[ Proc. Int. Workshop
Available: http://ieeexplore.ieee.org/ pp. 655–670. CNIP 2006, 2006.
stamp/stamp.jsp?tp=&arnumber= [50] C. Castelluccia, A. Francillon, D. Perito, and [62] R. Berthier, W. Sanders, and H. Khurana,
5622026&isnumber=5621989. C. Soriente, BOn the difficulty of BIntrusion detection for advanced metering
[40] P. Tsang and S. Smith, BYASIR: A low-latency, software-based attestation of embedded infrastructures: Requirements and
high-integrity security retrofit for legacy devices,[ in Proc. 16th ACM Conf. Comput. architectural directions,[ in Proc. 1st IEEE
SCADA systems,[ in Proc. IFIP TC 11 23rd Commun. Security, 2009, pp. 400–409. Int. Conf. Smart Grid Commun., Oct. 2010,
Int. Inf. Security Conf., vol. 278, S. Jajodia, [51] R. Chandia, J. Gonzalez, T. Kilpatrick, pp. 350–355.
P. Samarati, and S. Cimato, Eds. Boston, M. Papa, and S. Shenoi, BSecurity [63] P. Sousa, A. Bessani, M. Correia, N. Neves,
MA: Springer-Verlag, 2008, pp. 445–459. strategies for SCADA networks,[ in and P. Verissimo, BHighly available
[41] M. Majdalawieh, F. Parisi-Presicce, and Critical Infrastructure Protection, vol. 253, intrusion-tolerant services with
D. Wijesekera, BDNPSec: Distributed E. Goetz and S. Shenoi, Eds. Boston, proactive-reactive recovery,[ IEEE
network protocol version 3 (DNP3) security MA: Springer-Verlag, 2007, pp. 117–131. Trans. Parallel Distrib. Syst., vol. 21, no. 4,
framework,[ in Adv. Comput., Inf., Syst. Sci., [52] L. Briesemeister, S. Cheung, U. Lindqvist, pp. 452–465, Apr. 2010.
Eng., K. Elleithy, T. Sobh, A. Mahmood, and A. Valdes, BDetection, correlation, [64] Scope of Cyber Attack Task Force (CATF),
M. Iskander, and M. Karim, Eds. visualization of attacks against critical North American Electric Reliability
Amsterdam, The Netherlands: infrastructure systems,[ in Proc. 8th Annu. Corporation, 2011.
Springer-Verlag, 2006, pp. 227–234. Int. Conf. Privacy Security Trust, Aug. 2010,
pp. 15–22.

ABOUT THE AUTHORS


Siddharth Sridhar (Student Member, IEEE) re- Adam Hahn (Student Member, IEEE) received the
ceived the B.E. degree in electrical and electronics B.S. degree in computer science from the Univer-
engineering from The College of Engineering, sity of Northern Iowa, Cedar Falls, in 2003 and
Guindy (Anna University), India, in 2004. He is the M.S. degree in computer engineering from
currently working towards the Ph.D. degree in Iowa State University (ISU), Ames, in 2006, where
computer engineering at the Department of Elec- he is currently working towards the Ph.D. degree
trical and Computer Engineering, Iowa State at the Department of Electrical and Computer
University, Ames. Engineering.
His research interests are in the application of He is currently an Information Security Engi-
intelligent cybersecurity methods to power sys- neer at the MITRE Corporation and has participat-
tem monitoring and control. ed in Institute for Information Infrastructure Protection (I3P) projects. His
research interests include cyber vulnerability assessment, critical
infrastructure cybersecurity, and smart grid technologies.

Vol. 100,06,2023
Authorized licensed use limited to: Bahria University. Downloaded on November No. 1, January 2012
at 17:29:54 | Proceedings
UTC from IEEE Xplore.of
Restrictions
the IEEE apply.223
Sridhar et al.: Cyber–Physical System Security for the Electric Power Grid

Manimaran Govindarasu (Senior Member, IEEE) Dr. Govindarasu has given tutorials at reputed conferences (including
received the Ph.D. degree in computer science and IEEE INCOFOM 2004 and IEEE ComSoc Tutorials Now) on the subject of
engineering from the Indian Institute of Technol- cybersecurity. He has served in technical program committee as chair,
ogy (IIT), Chennai, India, in 1998. vice-chair, and member for many IEEE conferences/workshops, and
He is currently a Professor in the Department served as session chair in many conferences. He is a coauthor of the text
of Electrical and Computer Engineering, Iowa Resource Management in Real-Time Systems and Networks (Cambridge,
State University, Ames, and he has been on the MA: MIT Press, 2001). He has served as guest coeditor for several journals
faculty there since 1999. His research expertise is including leading IEEE magazines. He has contributed to the U.S DoE
in the areas of network security, real-time em- NASPInet Specification project and is currently serving as the chair of the
bedded systems, and cyber–physical security of Cyber Security Task Force at IEEE Power and Energy Systems Society
smart grid. He has recently developed cybersecurity testbed for smart (PES) CAMS subcommittee.
grid at Iowa State University to conduct attack–defense evaluations and
develop robust countermeasures. He has coauthored more than 125
peer-reviewed research publications.

224Authorized licensed use


Proceedings oflimited
the to: | Vol.
Bahria
IEEE 100, No.Downloaded
University. 1, January 2012
on November 06,2023 at 17:29:54 UTC from IEEE Xplore. Restrictions apply.

You might also like