skip to main content
research-article

On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach

Published:29 August 2018Publication History
Skip Abstract Section

Abstract

Building an efficient, smart, and multifunctional power grid while maintaining high reliability and security is an extremely challenging task, particularly in the ever-evolving cyber threat landscape. The challenge is also compounded by the increasing complexity of power grids in both cyber and physical domains. In this article, we develop a stochastic Petri net based analytical model to assess and analyze the system reliability of smart grids, specifically against topology attacks under system countermeasures (i.e., intrusion detection systems and malfunction recovery techniques). Topology attacks, evolving from false data injection attacks, are growing security threats to smart grids. In our analytical model, we define and consider both conservative and aggressive topology attacks, and two types of unreliable consequences (i.e., system disturbances and failures). The IEEE 14-bus power system is employed as a case study to clearly explain the model construction and parameterization process. The benefit of having this analytical model is the capability to measure the system reliability from both transient and steady-state analysis. Finally, intensive simulation experiments are conducted to demonstrate the feasibility and effectiveness of our proposed model.

References

  1. Saurabh Amin, Alvaro A. Cárdenas, and S. Shankar Sastry. 2009. Safe and secure networked control systems under denial-of-service attacks. In Proceedings of the International Workshop on Hybrid Systems: Computation and Control (HSCC’09). Springer, 31--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Massoud Amin and Bruce F. Wollenberg. 2005. Toward a smart grid: Power delivery for the 21st century. IEEE Power and Energy Magazine 3, 5 (2005), 34--41.Google ScholarGoogle ScholarCross RefCross Ref
  3. Falko Bause and Pieter S. Kritzinger. 2002. Stochastic Petri Nets. Vol. 1. Vieweg, Wiesbaden.Google ScholarGoogle Scholar
  4. Thomas M. Chen, Juan Carlos Sanchez-Aarnoutse, and John Buford. 2011. Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid 2, 4 (2011), 741--749.Google ScholarGoogle ScholarCross RefCross Ref
  5. Kim-Kwang Raymond Choo. 2014. A conceptual interdisciplinary plug-and-play cyber security framework. In ICTs and the Millennium Development Goals. Springer Science 8 Business Media, New York, 81--99.Google ScholarGoogle Scholar
  6. G. C. Dalton, Robert F. Mills, John M. Colombi, and Richard A. Raines. 2006. Analyzing attack trees using generalized stochastic Petri nets. In Proceedings of the IEEE Information Assurance Workshop (IAW’06). IEEE, 116--123.Google ScholarGoogle Scholar
  7. Ruilong Deng, Gaoxi Xiao, Rongxing Lu, Hao Liang, and Athanasios V. Vasilakos. 2017. False data injection on state estimation in power systems-Attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics 13, 2 (2017), 411--423.Google ScholarGoogle ScholarCross RefCross Ref
  8. Nicholas J. Dingle, William J. Knottenbelt, and Tamas Suto. 2009. PIPE2: A tool for the performance evaluation of generalised stochastic Petri nets. ACM SIGMETRICS Performance Evaluation Review 36, 4 (2009), 34--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zarko Djekic. 2007. Online Circuit Breaker Monitoring System. Ph.D. dissertation. Texas A&M University, College Station, TX.Google ScholarGoogle Scholar
  10. Nicolas Falliere, Liam O. Murchu, and Eric Chien. 2011. W32. Stuxnet dossier. White Paper, Symantec Corp., Security Response 5 (2011), 6.Google ScholarGoogle Scholar
  11. Hassan Farhangi. 2010. The path of the smart grid. IEEE Power and Energy Magazine 8, 1 (2010), 18--28.Google ScholarGoogle ScholarCross RefCross Ref
  12. U.S. Federal Energy Regulatory Commission (FERC). 2009. Smart grid policy. Docket PL09-4-000.Google ScholarGoogle Scholar
  13. Cliff Grigg, Peter Wong, Paul Albrecht, Ron Allan, Murty Bhavaraju, Roy Billinton, Quan Chen, Clement Fong, Suheil Haddad, Sastry Kuruganty, and others. 1999. The IEEE reliability test system-1996. A report prepared by the reliability test system task force of the application of probability methods subcommittee. IEEE Transactions on Power Systems 14, 3 (1999), 1010--1020.Google ScholarGoogle ScholarCross RefCross Ref
  14. Allen Householder, Kevin Houle, and Chad Dougherty. 2002. Computer attack trends challenge internet security. Computer 35, 4 (2002), sulp5--sulp7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lei Huang, Yuanzhang Sun, Jian Xu, Wenzhong Gao, Jun Zhang, and Ziping Wu. 2014. Optimal PMU placement considering controlled islanding of power system. IEEE Transactions on Power Systems 29, 2 (2014), 742--755.Google ScholarGoogle ScholarCross RefCross Ref
  16. Gabriela Hug and Joseph Andrew Giampapa. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid 3, 3 (2012), 1362--1370.Google ScholarGoogle ScholarCross RefCross Ref
  17. Kurt Jensen. 2013. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 1. Springer Science 8 Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kurt Jensen and Grzegorz Rozenberg. 2012. High-Level Petri Nets: Theory and Application. Springer Science 8 Business Media.Google ScholarGoogle Scholar
  19. Jinsub Kim and Lang Tong. 2013. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications 31, 7 (2013), 1294--1305.Google ScholarGoogle ScholarCross RefCross Ref
  20. Wolfgang Kröger. 2008. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliability Engineering 8 System Safety 93, 12 (2008), 1781--1787.Google ScholarGoogle Scholar
  21. Jean-Claude Laprie, Karama Kanoun, and Mohamed Kaâniche. 2007. Modelling interdependencies between the electricity and information infrastructures. In Proceedings of the International Conference on Computer Safety, Reliability, and Security (SAFECOMP’07). Springer, 54--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Edward A. Lee. 2017. Fundamental limits of cyber-physical systems modeling. ACM Transactions on Cyber-Physical Systems 1, 1 (2017), Article 3, 26 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Beibei Li, Rongxing Lu, and Haiyong Bao. 2016a. Behavior rule specification-based false data injection detection technique for smart grid. In Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop. 119--150.Google ScholarGoogle Scholar
  24. Beibei Li, Rongxing Lu, Wei Wang, and Kim-Kwang Raymond Choo. 2016b. DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Transactions on Infromation Forensics and Security 11, 11 (2016), 2415--2425.Google ScholarGoogle ScholarCross RefCross Ref
  25. Beibei Li, Rongxing Lu, Wei Wang, and Kim-Kwang Raymond Choo. 2017. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. Journal of Parallel and Distributed Computing 103 (2017), 32--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Wenyuan Li. 2014. Risk Assessment of Power Systems: Models, Methods, and Applications. John Wiley 8 Sons.Google ScholarGoogle Scholar
  27. Shichao Liu, Xiaoping P. Liu, and Abdulmotaleb El Saddik. 2013. Denial-of-service (DoS) attacks on load frequency control in smart grids. In Proceedings of the Innovative Smart Grid Technologies (ISGT’13), IEEE PES. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  28. Yao Liu, Peng Ning, and Michael K. Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security 14, 1 (2011), Article 5, 33 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zhi Liu, Cheng Zhang, Mianxiong Dong, Bo Gu, Yusheng Ji, and Yoshiaki Tanaka. 2016. Markov-decision-process-assisted consumerscheduling in a networked smart grid. IEEE Access 5 (2016), 2448--2458.Google ScholarGoogle ScholarCross RefCross Ref
  30. James P. McDermott. 2001. Attack net penetration testing. In Proceedings of the New Security Paradigms Workshop (NSPW’00). ACM, 15--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Ryan McDonald, Fernando Pereira, Kiril Ribarov, and Jan Hajič. 2005. Non-projective dependency parsing using spanning tree algorithms. In Proceedings of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing (HLT/EMNLP’05). Association for Computational Linguistics, 523--530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Robert Mitchell and Ing-Ray Chen. 2016. Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Transactions on Reliability 65, 1 (2016), 350--358.Google ScholarGoogle ScholarCross RefCross Ref
  33. Khosrow Moslehi and Ranjit Kumar. 2010. A reliability perspective of the smart grid. IEEE Transactions on Smart Grid 1, 1 (2010), 57--64.Google ScholarGoogle ScholarCross RefCross Ref
  34. Jose Pagliery. 2015. ISIS is Attacking the U.S. Energy Grid. Retrieved January 8, 2017 from http://money.cnn.com/2015/10/15/technology/isis-energy-grid/.Google ScholarGoogle Scholar
  35. Fatih Tüysüz and Cengiz Kahraman. 2010. Modeling a flexible manufacturing cell using stochastic Petri nets with fuzzy parameters. Expert Systems with Applications 37, 5 (2010), 3910--3920. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Hjalte Wedel Vildhøj and David Kofoed Wind. 2016. Supplementary notes for graph theory 1. 26--26. https://hwv.dk/pdfs/01227-notes.pdf.Google ScholarGoogle Scholar
  37. James Weimer, Soummya Kar, and Karl Henrik Johansson. 2012. Distributed detection and isolation of topology attacks in power networks. In Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS’12). ACM, 65--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jun Wu, Mianxiong Dong, Kaoru Ota, Zhenyu Zhou, and Bin Duan. 2014. Towards fault-tolerant fine-grained data access control for smart grid. Wireless Personal Communications 75, 3 (2014), 1787--1808. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Rongfei Zeng, Yixin Jiang, Chuang Lin, and Xuemin Shen. 2012. Dependability analysis of control center networks in smart grid using stochastic Petri nets. IEEE Transactions on Parallel and Distributed Systems 23, 9 (2012), 1721--1730. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Cyber-Physical Systems
          ACM Transactions on Cyber-Physical Systems  Volume 3, Issue 1
          Special Issue on Dependability in CPS
          January 2019
          256 pages
          ISSN:2378-962X
          EISSN:2378-9638
          DOI:10.1145/3274532
          • Editor:
          • Tei-Wei Kuo
          Issue’s Table of Contents

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 August 2018
          • Accepted: 1 July 2017
          • Revised: 1 May 2017
          • Received: 1 March 2017
          Published in tcps Volume 3, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format