11 research outputs found

    Vulnerability of Synchrophasor-Based WAMPAC Applications’ to Time Synchronization Spoofing

    Full text link

    Intelligent GPS Spoofing Attack Detection in Power Grids

    Full text link
    The GPS is vulnerable to GPS spoofing attack (GSA), which leads to disorder in time and position results of the GPS receiver. In power grids, phasor measurement units (PMUs) use GPS to build time-tagged measurements, so they are susceptible to this attack. As a result of this attack, sampling time and phase angle of the PMU measurements change. In this paper, a neural network GPS spoofing detection (NNGSD) with employing PMU data from the dynamic power system is presented to detect GSAs. Numerical results in different conditions show the real-time performance of the proposed detection method

    Cybersecurity by Prediction of Time Synchronization using Bayesian Base Gradient Descent Approach

    Get PDF
    347-353Time Commerce tends to struggle, which necessities an improved time framework.Legal escalations for conflicts of time commerce in the digital economy demand a solution that helps to address technology, standards, and policies. To meet the demand, we have to build a system that can understand every domain essential for building an inter-organizational system. "Date" and "Timestamp" reflect the root of the current term "Date Trade" in the cyber world. The threat to these roots has been studied in-depth and proposed solutions specific to UTC NPLI. The electricity grid shifts to the energy network to improve operating efficiency and reliability by developing advanced information and communication technology. However, the Internet also provides a range of entry points dependent on the internet, which produce additional vulnerabilities due to malicious cyber-attacks, thereby threatening Nations' economic health. This paper proposes therefore a new mechanism to protect critical infrastructure against these malicious attacks, based on interval state predictors. This paper uses the prediction-based approach for reducing the impact of such attacks from cyberspace. In prediction, we have used a machine learning approach like Bayesian classifier by Bayesian approach to forecasting time synchronization concerning universal time clock (UTC). In our analysis, we have taken the basic UTC, UTC, and UTC likelihood proposed approach on basis of communication. This work has improved considerably the results to take care of CPS against such cybersecurity threats

    Cybersecurity by Prediction of Time Synchronization Using Bayesian base Gradient Descent Approach  

    Get PDF
    Abstract Time Commerce tends to be an effort that needs to be adapted to remove framework limitations and judicial intensifications to the inclusive digital economy in the form of a regional collaborative organisational system. "Date" and "Timestamp" reflect the root of the current term "Date Trade" in the cyber world The electricity grid shifts to the energy network to improve operating efficiency and reliability by developing advanced information and communication technology. However, the Internet also provides a range of entry points dependent on the internet, which produce additional vulnerabilities due to malicious cyber-attacks, thereby threatening nations' economic health. This paper proposes, a new mechanism to protect Critical Systems against malicious attacks, based on interval state predictors. In this paper using prediction-based approach for reducing the impact of cyber space attack. In prediction we use machine learning approach of Bayesian classifier by Bayesian approach forecast time synchronization according to universal time clock (UTC). In experiment analysis basic UTC, UTC and its likelihood and proposed approach on base of communication to improve substantially in proposed approach. Keywords Time Commerce, Timestamp, Cyber Security, Indian Standard Time, Time Dissemination, Cyber-Physical Systems, Big Data, Bayesian Prediction, Gradient Descent.

    GNSS Related Threats to Power Grid Applications

    Get PDF
    As power grid environments are moving towards the smart grid vision of the future, the traditional schemes for power grid protection and control are making way for new applications. The advancements in this field have made the requirements for power grid’s time synchronization accuracy and precision considerably more demanding. So far, the signals provided by Global Navigation Satellite Systems have generally addressed the need for highly accurate and stable reference time in power grid applications. These signals however are highly susceptible to tampering as they are being transmitted. Since electrical power transmission and distribution are critical functions for any modern society, the risks and impacts affiliated with satellite-based time synchronization in power grids ought to be examined. This thesis aims to address the matter. The objective is to examine how Global Navigation Satellite Systems are utilized in the power grids, how different attacks would potentially be carried out by employing interference and disturbance to GNSS signals and receivers and how the potential threats can be mitigated. A major part of the research is done through literature review, and the core concepts and different implementations of Global Navigation Satellite Systems are firstly introduced. The literature review also involves the introduction of different power grid components and subsystems, that utilize Global Positioning System for time synchronization. Threat modeling techniques traditionally practiced in software development are applied to power grid components and subsystems to gain insight about the possible threats and their impacts. The threats recognized through this process are evaluated and potential techniques for mitigating the most notable threats are presented.Sähköverkot ovat siirtymässä kohti tulevaisuuden älykkäitä sähköverkkoja ja perinteiset sähköverkon suojaus- ja ohjausmenetelmät tekevät tilaa uusille sovelluksille. Alan kehitys on tehnyt aikasynkronoinnin tarkkuusvaatimuksista huomattavasti aikaisempaa vaativampia. Tarkka aikareferenssi sähköverkoissa on tähän saakka saavutettu satelliittinavigointijärjestelmien tarjoamien signaalien avulla. Nämä signaalit ovat kuitenkin erittäin alttiita erilaisille hyökkäyksille. Sähkönjakelujärjestelmät ovat kriittinen osa nykyaikaista yhteiskuntaa ja riskejä sekä seuraamuksia, jotka liittyvät satelliittipohjaisten aikasynkronointimenetelmien hyödyntämiseen sähköverkoissa, tulisi tarkastella. Tämä tutkielma pyrkii vastaamaan tähän tarpeeseen. Päämääränä on selvittää, miten satelliittinavigointijärjestelmiä hyödynnetään sähköverkoissa, kuinka erilaisia hyökkäyksiä voidaan toteuttaa satelliittisignaaleja häiritsemällä ja satelliittisignaalivastaanottimia harhauttamalla ja kuinka näiden muodostamia uhkia voidaan lieventää. Valtaosa tästä tutkimuksesta on toteutettu kirjallisuuskatselmoinnin pohjalta. Työ kattaa satelliittinavigointijärjestelmien perusteet ja esittelee erilaisia tapoja, kuinka satelliittisignaaleja hyödynnetään sähköverkoissa erityisesti aikasynkronoinnin näkökulmasta. Työssä hyödynnettiin perinteisesti ohjelmistokehityksessä käytettyjä uhkamallinnusmenetelmiä mahdollisten uhkien ja seurausten analysointiin. Lopputuloksena esitellään riskiarviot uhkamallinnuksen pohjalta tunnistetuista uhkista, sekä esitellään erilaisia menettelytapoja uhkien lieventämiseksi

    Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing

    No full text
    This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs' time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications

    Vulnerability Assessment and Privacy-preserving Computations in Smart Grid

    Get PDF
    Modern advances in sensor, computing, and communication technologies enable various smart grid applications which highlight the vulnerability that requires novel approaches to the field of cybersecurity. While substantial numbers of technologies have been adopted to protect cyber attacks in smart grid, there lacks a comprehensive review of the implementations, impacts, and solutions of cyber attacks specific to the smart grid.In this dissertation, we are motivated to evaluate the security requirements for the smart grid which include three main properties: confidentiality, integrity, and availability. First, we review the cyber-physical security of the synchrophasor network, which highlights all three aspects of security issues. Taking the synchrophasor network as an example, we give an overview of how to attack a smart grid network. We test three types of attacks and show the impact of each attack consisting of denial-of-service attack, sniffing attack, and false data injection attack.Next, we discuss how to protect against each attack. For protecting availability, we examine possible defense strategies for the associated vulnerabilities.For protecting data integrity, a small-scale prototype of secure synchrophasor network is presented with different cryptosystems. Besides, a deep learning based time-series anomaly detector is proposed to detect injected measurement. Our approach observes both data measurements and network traffic features to jointly learn system states and can detect attacks when state vector estimator fails.For protecting data confidentiality, we propose privacy-preserving algorithms for two important smart grid applications. 1) A distributed privacy-preserving quadratic optimization algorithm to solve Security Constrained Optimal Power Flow (SCOPF) problem. The SCOPF problem is decomposed into small subproblems using the Alternating Direction Method of Multipliers (ADMM) and gradient projection algorithms. 2) We use Paillier cryptosystem to secure the computation of the power system dynamic simulation. The IEEE 3-Machine 9-Bus System is used to implement and demonstrate the proposed scheme. The security and performance analysis of our implementations demonstrate that our algorithms can prevent chosen-ciphertext attacks at a reasonable cost

    Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing

    No full text
    \u3cp\u3eThis paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs' time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications.\u3c/p\u3

    Detection and Mitigation of Cyber Attacks on Time Synchronization Protocols for the Smart Grid

    Get PDF
    The current electric grid is considered as one of the greatest engineering achievements of the twentieth century. It has been successful in delivering power to consumers for decades. Nevertheless, the electric grid has recently experienced several blackouts that raised several concerns related to its availability and reliability. The aspiration to provide reliable and efficient energy, and contribute to environment protection through the increasing utilization of renewable energies are driving the need to deploy the grid of the future, the smart grid. It is expected that this grid will be self-healing from power disturbance events, operating resiliently against physical and cyber attack, operating efficiently, and enabling new products and services. All these call for a grid with more Information and Communication Technologies (ICT). As such, power grids are increasingly absorbing ICT technologies to provide efficient, secure and reliable two-way communication to better manage, operate, maintain and control electric grid components. On the other hand, the successful deployment of the smart grid is predicated on the ability to secure its operations. Such a requirement is of paramount importance especially in the presence of recent cyber security incidents. Furthermore, those incidents are subject to an augment with the increasing integration of ICT technologies and the vulnerabilities they introduce to the grid. The exploitation of these vulnerabilities might lead to attacks that can, for instance, mask the system observability and initiate cascading failures resulting in undesirable and severe consequences. In this thesis, we explore the security aspects of a key enabling technology in the smart grid, accurate time synchronization. Time synchronization is an immense requirement across the domains of the grid, from generation to transmission, distribution, and consumer premises. We focus on the substation, a basic block of the smart grid system, along with its recommended time synchronization mechanism - the Precision Time Protocol (PTP) - in order to address threats associated with PTP, and propose practical and efficient detection, prevention, mitigation techniques and methodologies that will harden and enhance the security and usability of PTP in a substation. In this respect, we start this thesis with a security assessment of PTP that identifies PTP security concerns, and then address those concerns in the subsequent chapters. We tackle the following main threats associated with PTP: 1) PTP vulnerability to fake timestamp injection through a compromised component 2) PTP vulnerability to the delay attack and 3) The lack of a mechanism that secures the PTP network. Next, and as a direct consequence of the importance of time synchronization in the smart grid, we consider the wide area system to demonstrate the vulnerability of relative data alignment in Phasor Data Concentrators to time synchronization attacks. These problems will be extensively studied throughout this thesis, followed by discussions that highlight open research directions worth further investigations

    Performance Improvement of Wide-Area-Monitoring-System (WAMS) and Applications Development

    Get PDF
    Wide area monitoring system (WAMS), as an application of situation awareness, provides essential information for power system monitoring, planning, operation, and control. To fully utilize WAMS in smart grid, it is important to investigate and improve its performance, and develop advanced applications based on the data from WAMS. In this dissertation, the work on improving the WAMS performance and developing advanced applications are introduced.To improve the performance of WAMS, the work includes investigation of the impacts of measurement error and the requirements of system based on WAMS, and the solutions. PMU is one of the main sensors for WAMS. The phasor and frequency estimation algorithms implemented highly influence the performance of PMUs, and therefore the WAMS. The algorithms of PMUs are reviewed in Chapter 2. To understand how the errors impact WAMS application, different applications are investigated in Chapter 3, and their requirements of accuracy are given. In chapter 4, the error model of PMUs are developed, regarding different parameters of input signals and PMU operation conditions. The factors influence of accuracy of PMUs are analyzed in Chapter 5, including both internal and external error sources. Specifically, the impacts of increase renewables are analyzed. Based on the analysis above, a novel PMU is developed in Chapter 6, including algorithm and realization. This PMU is able to provide high accurate and fast responding measurements during both steady and dynamic state. It is potential to improve the performance of WAMS. To improve the interoperability, the C37.118.2 based data communication protocol is curtailed and realized for single-phase distribution-level PMUs, which are presented in Chapter 7.WAMS-based applications are developed and introduced in Chapter 8-10. The first application is to use the spatial and temporal characterization of power system frequency for data authentication, location estimation and the detection of cyber-attack. The second application is to detect the GPS attack on the synchronized time interval. The third application is to detect the geomagnetically induced currents (GIC) resulted from GMD and EMP-E3. These applications, benefited from the novel PMU proposed in Chapter 6, can be used to enhance the security and robust of power system
    corecore