11 research outputs found

    Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts

    Full text link
    Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G) and the growing proliferation of the Internet of Things devices (such as smart metres and intelligent electronic devices). While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also introduced a large number of vulnerabilities culminating in violations of data availability, integrity, and confidentiality. Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry. To this end, this paper presents a comprehensive review in the recent advances of the FDI attacks, with particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts in the Smart Grid infrastructure. This review paper aims to provide a thorough understanding of the incumbent threats affecting the entire spectrum of the Smart Grid. Related literature are analysed and compared in terms of their theoretical and practical implications to the Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl

    Vulnerability and Impact Analysis of the IEC 61850 Goose Protocol in the Smart Grid

    Get PDF
    IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders

    Data-driven Approach for State Prediction and Detection of False Data Injection Attacks in Smart Grid

    No full text
    In a smart grid, state estimation (SE) is a very important component of energy management system. Its main functions include system SE and detection of cyber anomalies. Recently, it has been shown that conventional SE techniques are vulnerable to false data injection (FDI) attack, which is a sophisticated new class of attacks on data integrity in smart grid. The main contribution of this paper is to propose a new FDI attack detection technique using a new data-driven SE model, which is different from the traditional weighted least square based SE model. This SE model has a number of unique advantages compared with traditional SE models. First, the prediction technique can better maintain the inherent temporal correlations among consecutive measurement vectors. Second, the proposed SE model can learn the actual power system states. Finally, this paper shows that this SE model can be effectively used to detect FDI attacks that otherwise remain stealthy to traditional SE-based bad data detectors. The proposed FDI attack detection technique is evaluated on a number of standard bus systems. The performance of state prediction and the accuracy of FDI attack detection are benchmarked against the state-of-the-art techniques. Experimental results show that the proposed FDI attack detection technique has a higher detection rate compared with the existing techniques while reducing the false alarms significantly

    Energy-Efficient Hybrid Routing Protocol for IoT Communication Systems in 5G and Beyond

    No full text
    One of the major concerns in wireless sensor networks (WSNs) is most of the sensor nodes are powered through limited lifetime of energy-constrained batteries, which majorly affects the performance, quality, and lifetime of the network. Therefore, diverse clustering methods are proposed to improve energy efficiency of the WSNs. In the meantime, fifth-generation (5G) communications require that several Internet of Things (IoT) applications need to adopt the use of multiple-input multiple-output (MIMO) antenna systems to provide an improved capacity over multi-path channel environment. In this paper, we study a clustering technique for MIMO-based IoT communication systems to achieve energy efficiency. In particular, a novel MIMO-based energy-efficient unequal hybrid clustering (MIMO-HC) protocol is proposed for applications on the IoT in the 5G environment and beyond. Experimental analysis is conducted to assess the effectiveness of the suggested MIMO-HC protocol and compared with existing state-of-the-art research. The proposed MIMO-HC scheme achieves less energy consumption and better network lifetime compared to existing techniques. Specifically, the proposed MIMO-HC improves the network lifetime by approximately 3× as long as the first node and the final node dies as compared with the existing protocol. Moreover, the energy that cluster heads consume on the proposed MIMO-HC is 40% less than that expended in the existing protocol

    Energy-efficient hybrid routing protocol for IoT communication systems in 5G and beyond

    No full text
    One of the major concerns in wireless sensor networks (WSNs) is most of the sensor nodes are powered through limited lifetime of energy-constrained batteries, which majorly affects the performance, quality, and lifetime of the network. Therefore, diverse clustering methods are proposed to improve energy efficiency of the WSNs. In the meantime, fifth-generation (5G) communications require that several Internet of Things (IoT) applications need to adopt the use of multiple-input multiple-output (MIMO) antenna systems to provide an improved capacity over multi-path channel environment. In this paper, we study a clustering technique for MIMO-based IoT communication systems to achieve energy efficiency. In particular, a novel MIMO-based energy-efficient unequal hybrid clustering (MIMO-HC) protocol is proposed for applications on the IoT in the 5G environment and beyond. Experimental analysis is conducted to assess the effectiveness of the suggested MIMO-HC protocol and compared with existing state-of-the-art research. The proposed MIMO-HC scheme achieves less energy consumption and better network lifetime compared to existing techniques. Specifically, the proposed MIMO-HC improves the network lifetime by approximately 3× as long as the first node and the final node dies as compared with the existing protocol. Moreover, the energy that cluster heads consume on the proposed MIMO-HC is 40% less than that expended in the existing protocol

    Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid

    No full text
    IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders
    corecore