Abstract
Building an efficient, smart, and multifunctional power grid while maintaining high reliability and security is an extremely challenging task, particularly in the ever-evolving cyber threat landscape. The challenge is also compounded by the increasing complexity of power grids in both cyber and physical domains. In this article, we develop a stochastic Petri net based analytical model to assess and analyze the system reliability of smart grids, specifically against topology attacks under system countermeasures (i.e., intrusion detection systems and malfunction recovery techniques). Topology attacks, evolving from false data injection attacks, are growing security threats to smart grids. In our analytical model, we define and consider both conservative and aggressive topology attacks, and two types of unreliable consequences (i.e., system disturbances and failures). The IEEE 14-bus power system is employed as a case study to clearly explain the model construction and parameterization process. The benefit of having this analytical model is the capability to measure the system reliability from both transient and steady-state analysis. Finally, intensive simulation experiments are conducted to demonstrate the feasibility and effectiveness of our proposed model.
- Saurabh Amin, Alvaro A. Cárdenas, and S. Shankar Sastry. 2009. Safe and secure networked control systems under denial-of-service attacks. In Proceedings of the International Workshop on Hybrid Systems: Computation and Control (HSCC’09). Springer, 31--45. Google ScholarDigital Library
- S. Massoud Amin and Bruce F. Wollenberg. 2005. Toward a smart grid: Power delivery for the 21st century. IEEE Power and Energy Magazine 3, 5 (2005), 34--41.Google ScholarCross Ref
- Falko Bause and Pieter S. Kritzinger. 2002. Stochastic Petri Nets. Vol. 1. Vieweg, Wiesbaden.Google Scholar
- Thomas M. Chen, Juan Carlos Sanchez-Aarnoutse, and John Buford. 2011. Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid 2, 4 (2011), 741--749.Google ScholarCross Ref
- Kim-Kwang Raymond Choo. 2014. A conceptual interdisciplinary plug-and-play cyber security framework. In ICTs and the Millennium Development Goals. Springer Science 8 Business Media, New York, 81--99.Google Scholar
- G. C. Dalton, Robert F. Mills, John M. Colombi, and Richard A. Raines. 2006. Analyzing attack trees using generalized stochastic Petri nets. In Proceedings of the IEEE Information Assurance Workshop (IAW’06). IEEE, 116--123.Google Scholar
- Ruilong Deng, Gaoxi Xiao, Rongxing Lu, Hao Liang, and Athanasios V. Vasilakos. 2017. False data injection on state estimation in power systems-Attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics 13, 2 (2017), 411--423.Google ScholarCross Ref
- Nicholas J. Dingle, William J. Knottenbelt, and Tamas Suto. 2009. PIPE2: A tool for the performance evaluation of generalised stochastic Petri nets. ACM SIGMETRICS Performance Evaluation Review 36, 4 (2009), 34--39. Google ScholarDigital Library
- Zarko Djekic. 2007. Online Circuit Breaker Monitoring System. Ph.D. dissertation. Texas A&M University, College Station, TX.Google Scholar
- Nicolas Falliere, Liam O. Murchu, and Eric Chien. 2011. W32. Stuxnet dossier. White Paper, Symantec Corp., Security Response 5 (2011), 6.Google Scholar
- Hassan Farhangi. 2010. The path of the smart grid. IEEE Power and Energy Magazine 8, 1 (2010), 18--28.Google ScholarCross Ref
- U.S. Federal Energy Regulatory Commission (FERC). 2009. Smart grid policy. Docket PL09-4-000.Google Scholar
- Cliff Grigg, Peter Wong, Paul Albrecht, Ron Allan, Murty Bhavaraju, Roy Billinton, Quan Chen, Clement Fong, Suheil Haddad, Sastry Kuruganty, and others. 1999. The IEEE reliability test system-1996. A report prepared by the reliability test system task force of the application of probability methods subcommittee. IEEE Transactions on Power Systems 14, 3 (1999), 1010--1020.Google ScholarCross Ref
- Allen Householder, Kevin Houle, and Chad Dougherty. 2002. Computer attack trends challenge internet security. Computer 35, 4 (2002), sulp5--sulp7. Google ScholarDigital Library
- Lei Huang, Yuanzhang Sun, Jian Xu, Wenzhong Gao, Jun Zhang, and Ziping Wu. 2014. Optimal PMU placement considering controlled islanding of power system. IEEE Transactions on Power Systems 29, 2 (2014), 742--755.Google ScholarCross Ref
- Gabriela Hug and Joseph Andrew Giampapa. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid 3, 3 (2012), 1362--1370.Google ScholarCross Ref
- Kurt Jensen. 2013. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 1. Springer Science 8 Business Media. Google ScholarDigital Library
- Kurt Jensen and Grzegorz Rozenberg. 2012. High-Level Petri Nets: Theory and Application. Springer Science 8 Business Media.Google Scholar
- Jinsub Kim and Lang Tong. 2013. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications 31, 7 (2013), 1294--1305.Google ScholarCross Ref
- Wolfgang Kröger. 2008. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliability Engineering 8 System Safety 93, 12 (2008), 1781--1787.Google Scholar
- Jean-Claude Laprie, Karama Kanoun, and Mohamed Kaâniche. 2007. Modelling interdependencies between the electricity and information infrastructures. In Proceedings of the International Conference on Computer Safety, Reliability, and Security (SAFECOMP’07). Springer, 54--67. Google ScholarDigital Library
- Edward A. Lee. 2017. Fundamental limits of cyber-physical systems modeling. ACM Transactions on Cyber-Physical Systems 1, 1 (2017), Article 3, 26 pages. Google ScholarDigital Library
- Beibei Li, Rongxing Lu, and Haiyong Bao. 2016a. Behavior rule specification-based false data injection detection technique for smart grid. In Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop. 119--150.Google Scholar
- Beibei Li, Rongxing Lu, Wei Wang, and Kim-Kwang Raymond Choo. 2016b. DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Transactions on Infromation Forensics and Security 11, 11 (2016), 2415--2425.Google ScholarCross Ref
- Beibei Li, Rongxing Lu, Wei Wang, and Kim-Kwang Raymond Choo. 2017. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. Journal of Parallel and Distributed Computing 103 (2017), 32--41. Google ScholarDigital Library
- Wenyuan Li. 2014. Risk Assessment of Power Systems: Models, Methods, and Applications. John Wiley 8 Sons.Google Scholar
- Shichao Liu, Xiaoping P. Liu, and Abdulmotaleb El Saddik. 2013. Denial-of-service (DoS) attacks on load frequency control in smart grids. In Proceedings of the Innovative Smart Grid Technologies (ISGT’13), IEEE PES. 1--6.Google ScholarCross Ref
- Yao Liu, Peng Ning, and Michael K. Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security 14, 1 (2011), Article 5, 33 pages. Google ScholarDigital Library
- Zhi Liu, Cheng Zhang, Mianxiong Dong, Bo Gu, Yusheng Ji, and Yoshiaki Tanaka. 2016. Markov-decision-process-assisted consumerscheduling in a networked smart grid. IEEE Access 5 (2016), 2448--2458.Google ScholarCross Ref
- James P. McDermott. 2001. Attack net penetration testing. In Proceedings of the New Security Paradigms Workshop (NSPW’00). ACM, 15--21. Google ScholarDigital Library
- Ryan McDonald, Fernando Pereira, Kiril Ribarov, and Jan Hajič. 2005. Non-projective dependency parsing using spanning tree algorithms. In Proceedings of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing (HLT/EMNLP’05). Association for Computational Linguistics, 523--530. Google ScholarDigital Library
- Robert Mitchell and Ing-Ray Chen. 2016. Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Transactions on Reliability 65, 1 (2016), 350--358.Google ScholarCross Ref
- Khosrow Moslehi and Ranjit Kumar. 2010. A reliability perspective of the smart grid. IEEE Transactions on Smart Grid 1, 1 (2010), 57--64.Google ScholarCross Ref
- Jose Pagliery. 2015. ISIS is Attacking the U.S. Energy Grid. Retrieved January 8, 2017 from http://money.cnn.com/2015/10/15/technology/isis-energy-grid/.Google Scholar
- Fatih Tüysüz and Cengiz Kahraman. 2010. Modeling a flexible manufacturing cell using stochastic Petri nets with fuzzy parameters. Expert Systems with Applications 37, 5 (2010), 3910--3920. Google ScholarDigital Library
- Hjalte Wedel Vildhøj and David Kofoed Wind. 2016. Supplementary notes for graph theory 1. 26--26. https://hwv.dk/pdfs/01227-notes.pdf.Google Scholar
- James Weimer, Soummya Kar, and Karl Henrik Johansson. 2012. Distributed detection and isolation of topology attacks in power networks. In Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS’12). ACM, 65--72. Google ScholarDigital Library
- Jun Wu, Mianxiong Dong, Kaoru Ota, Zhenyu Zhou, and Bin Duan. 2014. Towards fault-tolerant fine-grained data access control for smart grid. Wireless Personal Communications 75, 3 (2014), 1787--1808. Google ScholarDigital Library
- Rongfei Zeng, Yixin Jiang, Chuang Lin, and Xuemin Shen. 2012. Dependability analysis of control center networks in smart grid using stochastic Petri nets. IEEE Transactions on Parallel and Distributed Systems 23, 9 (2012), 1721--1730. Google ScholarDigital Library
Index Terms
- On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach
Recommendations
Classifying resilience approaches for protecting smart grids against cyber threats
AbstractSmart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication technologies and their distributed nature. While preventing or detecting cyber attacks is a well-...
Towards insider threats detection in smart grid communication systems
In today's communication systems, the most damaging security threats are not originating from the outsiders but from the trusted insiders – both malicious insiders and negligent insiders. Always endowed with high privileges, insiders are significantly ...
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks
Wireless Algorithms, Systems, and ApplicationsAbstractFalse data injection attacks modify the meter measurements to mislead the control center into estimating inaccurate system states and thus affect the reliable operation of smart grids. In this paper, we propose a deep reinforcement learning based ...
Comments