1,845 research outputs found
CPS Attacks Mitigation Approaches on Power Electronic Systems with Security Challenges for Smart Grid Applications: A Review
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities, mitigation approaches on the power electronics and the security challenges for the smart grid applications. With the rapid evolution of the physical systems in the power electronics applications for interfacing renewable energy sources that incorporate with cyber frameworks, the cyber threats have a critical impact on the smart grid performance. Due to the existence of electronic devices in the smart grid applications, which are interconnected through communication networks, these networks may be subjected to severe cyber-attacks by hackers. If this occurs, the digital controllers can be physically isolated from the control loop. Therefore, the cyber-physical systems (CPSs) in the power electronic systems employed in the smart grid need special treatment and security. In this paper, an overview of the power electronics systems security on the networked smart grid from the CP perception, as well as then emphases on prominent CP attack patterns with substantial influence on the power electronics components operation along with analogous defense solutions. Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed. Finally, the paper concludes with upcoming trends and challenges in CP security in the smart grid applications
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids
Smart grid is a large complex network with a myriad of vulnerabilities,
usually operated in adversarial settings and regulated based on estimated
system states. In this study, we propose a novel highly secure distributed
dynamic state estimation mechanism for wide-area (multi-area) smart grids,
composed of geographically separated subregions, each supervised by a local
control center. We firstly propose a distributed state estimator assuming
regular system operation, that achieves near-optimal performance based on the
local Kalman filters and with the exchange of necessary information between
local centers. To enhance the security, we further propose to (i) protect the
network database and the network communication channels against attacks and
data manipulations via a blockchain (BC)-based system design, where the BC
operates on the peer-to-peer network of local centers, (ii) locally detect the
measurement anomalies in real-time to eliminate their effects on the state
estimation process, and (iii) detect misbehaving (hacked/faulty) local centers
in real-time via a distributed trust management scheme over the network. We
provide theoretical guarantees regarding the false alarm rates of the proposed
detection schemes, where the false alarms can be easily controlled. Numerical
studies illustrate that the proposed mechanism offers reliable state estimation
under regular system operation, timely and accurate detection of anomalies, and
good state recovery performance in case of anomalies
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts
Smart Grid has rapidly transformed the centrally controlled power system into
a massively interconnected cyber-physical system that benefits from the
revolutions happening in the communications (e.g. 5G) and the growing
proliferation of the Internet of Things devices (such as smart metres and
intelligent electronic devices). While the convergence of a significant number
of cyber-physical elements has enabled the Smart Grid to be far more efficient
and competitive in addressing the growing global energy challenges, it has also
introduced a large number of vulnerabilities culminating in violations of data
availability, integrity, and confidentiality. Recently, false data injection
(FDI) has become one of the most critical cyberattacks, and appears to be a
focal point of interest for both research and industry. To this end, this paper
presents a comprehensive review in the recent advances of the FDI attacks, with
particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts
in the Smart Grid infrastructure. This review paper aims to provide a thorough
understanding of the incumbent threats affecting the entire spectrum of the
Smart Grid. Related literature are analysed and compared in terms of their
theoretical and practical implications to the Smart Grid cybersecurity. In
conclusion, a range of technical limitations of existing false data attack
research is identified, and a number of future research directions is
recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl
Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention across academia, government, and industry sectors and covers a wide range of applications like agriculture, energy, medical, transportation, etc. The traditional power systems with physical equipment as a core element are more integrated with information and communication technology, which evolves into the Cyber-Physical Power System (CPPS). The CPPS consists of a physical system tightly integrated with cyber systems (control, computing, and communication functions) and allows the two-way flows of electricity and information for enabling smart grid technologies. Even though the digital technologies monitoring and controlling the electric power grid more efficiently and reliably, the power grid is vulnerable to cybersecurity risk and involves the complex interdependency between cyber and physical systems. Analyzing and resolving the problems in CPPS needs the modelling methods and systematic investigation of a complex interaction between cyber and physical systems. The conventional way of modelling, simulation, and analysis involves the separation of physical domain and cyber domain, which is not suitable for the modern CPPS. Therefore, an integrated framework needed to analyze the practical scenario of the unification of physical and cyber systems. A comprehensive review of different modelling, simulation, and analysis methods and different types of cyber-attacks, cybersecurity measures for modern CPPS is explored in this paper. A review of different types of cyber-attack detection and mitigation control schemes for the practical power system is presented in this paper. The status of the research in CPPS around the world and a new path for recommendations and research directions for the researchers working in the CPPS are finally presented.publishedVersio
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
The rapid development of information and communications technology has
enabled the use of digital-controlled and software-driven distributed energy
resources (DERs) to improve the flexibility and efficiency of power supply, and
support grid operations. However, this evolution also exposes
geographically-dispersed DERs to cyber threats, including hardware and software
vulnerabilities, communication issues, and personnel errors, etc. Therefore,
enhancing the cyber-resiliency of DER-based smart grid - the ability to survive
successful cyber intrusions - is becoming increasingly vital and has garnered
significant attention from both industry and academia. In this survey, we aim
to provide a systematical and comprehensive review regarding the
cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an
integrated threat modeling method is tailored for the hierarchical DER-based
smart grid with special emphasis on vulnerability identification and impact
analysis. Then, the defense-in-depth strategies encompassing prevention,
detection, mitigation, and recovery are comprehensively surveyed,
systematically classified, and rigorously compared. A CRE framework is
subsequently proposed to incorporate the five key resiliency enablers. Finally,
challenges and future directions are discussed in details. The overall aim of
this survey is to demonstrate the development trend of CRE methods and motivate
further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication
Consideratio
Recommended from our members
Developing a usable security approach for user awareness against ransomware
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonThe main purpose of the research presented in this thesis is to design and develop
a game prototype for improving user awareness against ransomware, which has been
reported as the most significant cyber security threat to the United Kingdom by the
National Cyber Security Centre. Digital transformation is helping individuals, organisations,
governments and Industrial control systems to modernise and improve
their effectiveness. At the same time, cyber crimes are evolving and targeting essential
services. A successful cyber attack can compromise users’ privacy, bring bad
publicity and financial damage to organisations and target national security.
A literature review was conducted to understand threats to the cyber social
system. Literature in this thesis reports attackers exploit humans as the weakest
link to execute successful security breaches. Therefore to address this challenge, a
significant gap has been identified as an opportunity to contribute to user awareness
of the ransomware cyber security threat.
The current thesis proposes RansomAware a novel game prototype to improve
user awareness. The game is based on Technology Threat Avoidance Theory (TTAT)
model. In this thesis two studies are carried out, study 1 empirically validates the
elements of TTAT to be embedded in the RansomAware prototype and reports a
significant change in users’ motivation to avoid ransomware cyber security threat
55% and avoidance behaviour 29%, whereas study 2 evaluates game usability and
report significant results of SUS average score of 87.58 and statistical results of p <
0.01 indicate user’s satisfaction of the RansomAware. Finally, the research provides
guidelines on how the proposed RansomAware game can be adopted by practitioners
and individuals to improve their awareness against the ransomware cyber security
threat
- …