Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks
Abstract
:Featured Application
Abstract
1. Introduction
2. Framework of ECPSs
2.1. Model of ECPSs
2.2. DC Power Flow
3. Solution Approach
3.1. Localization of Possible Faults
Algorithm 1 Identify the possible fault set |
1: Input the overloaded branch 2: For , 3: Calculate the distance and , respectively (not including the path ) 4: Identify nodes that have the shortest distance with node 5: Identify nodes that have the shortest distance with node 6: End 7: For , 8: Calculate the distance and , respectively (not including the path ) 9: Identify nodes that have the shortest distance with node 10: Identify nodes that have the shortest distance with node 11: End 12: Combine steps 4, 5, 9, and 10, get the possible fault set |
3.2. Protection Procedure of ECPSs under Cyber Attacks
- (a)
- Judge the connectivity of the system after cutting off a branch.
- (a-1)
- If there is a splitting incident, then go to step (b).
- (a-2)
- If there is no separation of the system, directly go to step (f).
- (b)
- Identify the main area as the remaining system after splitting.
- (b-1)
- If there is a main area, go to step (c).
- (b-2)
- If there is no main area, go to step (i).
- (c)
- Upload the changed topology and electrical information to the control center.
- (d)
- Make decisions with the unbalanced power in the control center.
- (e)
- Download and adjust the control strategies to the appointed generators.
- (f)
- Update the topology and electrical information to the control center for calculation.
- (g)
- Calculate the power flow.
- (h)
- Search for the overloaded branches.
- (h-1)
- If there are overloaded branches, cut off the branches and go back to step (a).
- (h-2)
- If there is no overloaded branch, then go to step (i).
- (i)
- End the procedure, record the loss.
Algorithm 2 Assess the damage degree |
1: Input , set and . 2: For 3: For 4: If branch 5: If 6: If 7: Then , ; 8: End if 9: Else 10: If 11: Then ; 12: Else 13: For 14: If 15: ; 16: End; end; end; end; end; end; end. 17: Output and count the number of areas. |
Algorithm 3 Search for the main area after splitting |
1: Input , , 2: For , for 3: Count and 4: if 5: , 6: End if; end; end 7: Output |
3.3. Method of the Control Center under Unbalanced Power
Algorithm 4 Calculate the weighted adjustment |
1: Input , and the tripped branch with node (generator or load bus) 2: Let , 3: For 4: Reconnect branch to , and calculate , , 5: End 6: For 7: Calculate the weight and the adjustment 8: End |
4. Vulnerability Assessment and Simulation Platform
4.1. Vulnerability Assessment Aspects
- (a)
- The stability and robustness of the system. In this procedure, we randomly cut off a branch, balance the power supplies and demands, redistribute the power flow, and count the number of remaining buses. At last, we calculate the proportion of the numbers of remaining buses. A system is said to have good stability against a single tripped branch if none of the nodes will be split during the procedure, while the system has bad stability if the system will suffer a cascading failure owing to the tripped branch. As for robustness assessment, the statistics show that a system has good robustness if the system is stable in most of the faulty situations, but not vice versa.
- (b)
- The vulnerable branches which will cause higher economic costs. When a branch is randomly cut off from the grid, the consequential balance of power supplies and demands leads to economic cost. The economic cost can be represented by the sum of adjusted outputs of the generators (Algorithm 4) along the shortest path which is defined in Section 3. Generally speaking, the tripped branches which will lead to higher economic costs should be protected by some specific methods.
- (c)
- The vulnerable branches which will lead to a serious damage. If we randomly cut off a branch, the degree of damage will be represented by the number of remaining buses or branches after cascading failures. The tripped branch which leads to less remaining buses or branches is more vulnerable.
- (d)
- Vulnerable nodes against extra power injection. Randomly choose a power node (generator or load), inject the same amount of power, and recalculate the power flows on the branches. A node is vulnerable if the power injection will cause other lines to overload. The result is influenced by both the topological and electrical properties.
- (e)
- The trip point of the cascading failure propagation. It reflects the controllability of a system. The trip point is the point when the number of remaining buses decreases the fastest. In a discrete system, the duration of cascading failures is replaced by the number of loops in the procedure. The system has more time to deal with the emergence if the trip point appears slowly.
4.2. Simulation Platform
5. Discussion
6. Conclusions
7. Future Works
Author Contributions
Funding
Conflicts of Interest
References
- Liu, X.; Zhang, J.; Zhu, P. Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory. Int. J. Crit. Infrastruct. Prot. 2017, 16, 13–25. [Google Scholar] [CrossRef]
- Bordel, B.; Alcarria, R.; Robles, T.; Martín, D. Cyber–physical systems: Extending pervasive sensing from control theory to the Internet of Things. Pervasive Mob. Comput. 2017, 40, 156–184. [Google Scholar] [CrossRef]
- Lee, E.A. The past, present and future of cyber-physical systems: A focus on models. Sensors 2015, 15, 4837–4869. [Google Scholar] [CrossRef] [PubMed]
- Lee, E.A. Cyber-physical systems-are computing foundations adequate. In Position Paper for NSF Workshop On Cyber-Physical Systems: Research Motivation. Technol. Roadmap 2006, 2, 1–9. [Google Scholar]
- Xiong, G.; Zhu, F.; Liu, X.; Dong, X.; Huang, W.; Chen, S.; Zhao, K. Cyber-physical-social system in intelligent transportation. IEEE/CAA J. Autom. Sin. 2015, 2, 320–333. [Google Scholar]
- Lee, E.A. Cyber Physical Systems: Design Challenges. In Proceedings of the IEEE International Symposium on Object Oriented Real-Time Distributed Computing, Orlando, FL, USA, 5–7 May 2008; pp. 363–369. [Google Scholar]
- Javanmardi, S.; Shojafar, M.; Shariatmadari, S.; Ahrabi, S.S. Fr trust: A fuzzy reputation–based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 2014, 6, 57–66. [Google Scholar] [CrossRef]
- Kleissl, J.; Agarwal, Y. Cyber-physical energy systems: Focus on smart buildings. In Proceedings of the 47th Design Automation Conference, Anaheim, CA, USA, 13–18 June 2010; ACM: New York, NY, USA, 2010; pp. 749–754. [Google Scholar]
- Peterson, D. Ics-Cert: Stuxnet Lessons Learned; Digital Bond: Sunrise, FL, USA, 2010. [Google Scholar]
- Guo, Q.; Xin, S.; Wang, J.; Sun, H.B. Comprehensive Security Assessment for a Cyber Physical Energy System: A Lesson from Ukraine’s Blackout. Autom. Electr. Power Syst. 2016, 40, 145–147. [Google Scholar]
- Moslemi, R.; Mesbahi, A.; Velni, J.M. A Fast, Decentralized Covariance Selection-based Approach to Detect Cyber Attacks in Smart Grids. IEEE Trans. Smart Grid 2017, 99. [Google Scholar] [CrossRef]
- Shakeruzzaman, A.; Akter, M.N.; Nasiruzzaman, A. Power Grid Connectivity Monitoring by Identifying Critical Transmission Lines Based on Network Flow. In Proceedings of the IEEE International Conference on Electrical, Computer and Communication Engineering, Cox’s Bazar, Bangladesh, 16–18 February 2017; pp. 235–238. [Google Scholar]
- Wang, Y.N.; Lin, Z.Y.; Liang, X.; Xu, W.Y.; Yang, Q.; Yan, G.F. On modeling of electrical cyber-physical systems considering cyber security. Front. Inf. Technol. Electron. Eng. 2016, 17, 465–478. [Google Scholar] [CrossRef]
- Xiang, Y.; Wang, L.; Liu, N. A Robustness-Oriented Power Grid Operation Strategy Considering Attacks. IEEE Trans. Smart Grid 2017, 99. [Google Scholar] [CrossRef]
- Zhang, H.; Cheng, P.; Shi, L.; Chen, J. Optimal DoS attack scheduling in wireless networked control system. IEEE Trans. Control Syst. Technol. 2016, 24, 843–852. [Google Scholar] [CrossRef]
- Teixeira, A.; Sou, K.C.; Sandberg, H.; Johansson, K.H. Secure control systems: A quantitative risk management approach. IEEE Control Syst. Mag. 2015, 35, 24–45. [Google Scholar] [CrossRef]
- Zhao, T.; Xu, Y.; Wang, Y.; Lin, Z.; Xu, W.; Yang, Q. On Identifying Vulnerable Nodes for Power Systems in the Presence of Undetectable Cyber-Attacks. In Proceedings of the IEEE Conference on Industrial Electronics and Applications, Hefei, China, 5–7 June 2016; pp. 1062–1067. [Google Scholar]
- Cardenas, A.A.; Amin, S.; Sastry, S. Secure Control: Towards Survivable Cyber-Physical Systems. In Proceedings of the IEEE International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 495–500. [Google Scholar]
- Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–physical security of a smart grid infrastructure. Proc. IEEE 2011, 100, 195–209. [Google Scholar]
- Rahman, M.A.; Mohsenian-Rad, H. False Data Injection Attacks with Incomplete Information against Smart Power Grids. In Proceedings of the IEEE Global Communications Conference, Anaheim, CA, USA, 3–7 December 2012; pp. 3153–3158. [Google Scholar]
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. 2011, 14, 13. [Google Scholar] [CrossRef]
- Gu, C.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC State Estimation. IEEE Trans. Smart Grid 2015, 6, 2476–2483. [Google Scholar]
- Teixeira, A.; Amin, S.; Sandberg, H.; Johansson, K.H.; Sastry, S.S. Cyber Security Analysis of State Estimators in Electric Power Systems. In Proceedings of the IEEE Conference on Decision and Control, Atlanta, GA, USA, 15–17 December 2010; pp. 5991–5998. [Google Scholar]
- Pasqualetti, F.; Dorfler, F.; Bull, F. Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks. In Proceedings of the IEEE Conference on Decision and Control, Maui, HI, USA, 10–13 December 2012; pp. 3418–3425. [Google Scholar]
- Pooranian, Z.; Chen, K.C.; Yu, C.M.; Conti, M. RARE: Defeating Side Channels based on Data-Deduplication in Cloud Storage. In Proceedings of the Infocom Workshop, Honolulu, HI, USA, 15–19 April 2018; pp. 660–665. [Google Scholar]
- Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed]
- Shao, J.; Buldyrev, S.V.; Havlin, S.; Stanley, H.E. Cascade of failures in coupled network systems with multiple support-dependence relations. Phys. Rev. E 2011, 83, 036116. [Google Scholar] [CrossRef] [PubMed]
- Guo, J.; Wang, D.R. Vulnerability analysis on power communication network based on complex network theory. Telecommun. Electr. Power Syst. 2009, 30, 6–10. [Google Scholar]
- Nezamoddini, N.; Mousavian, S.; Erol-Kantarci, M. A risk optimization model for enhanced power grid resilience against physical attacks. Electr. Power Syst. Res. 2017, 143, 329–338. [Google Scholar] [CrossRef]
- Wei, J.; Kundur, D.; Zourntos, T.; Butler-Purry, K.L. A flocking-based paradigm for hierarchical cyber-physical smart grid modeling and control. IEEE Trans. Smart Grid 2014, 5, 2687–2700. [Google Scholar] [CrossRef]
- Chen, P.Y.; Cheng, S.M.; Chen, K.C. Smart attacks in smart grid communication networks. IEEE Commun. Mag. 2012, 50, 24–29. [Google Scholar] [CrossRef]
- Wang, C.; Fang, L.; Dai, Y. A simulation environment for SCADA security analysis and assessment. In Proceedings of the IEEE International Conference on Measuring Technology and Mechatronics Automation, Changsha, China, 13–14 March 2010; pp. 342–347. [Google Scholar]
- Carlini, E.M.; Giannuzzi, G.M.; Mercogliano, P.; Schiano, P.; Vaccaro, A.; Villacci, D. A decentralized and proactive architecture based on the cyber physical system paradigm for smart transmission grids modelling, monitoring and control. Technol. Econ. Smart Grids Sustain. Energy 2016, 1, 5. [Google Scholar] [CrossRef]
- Li, W.; Zhang, X.; Li, H. Co-simulation platforms for co-design of networked control systems: An overview. Control Eng. Pract. 2014, 23, 44–56. [Google Scholar] [CrossRef]
- Li, W.; Zhang, X. Simulation of the smart grid communications: Challenges, techniques, and future trends. Comput. Electr. Eng. 2014, 40, 270–288. [Google Scholar] [CrossRef]
- Vaccaro, A.; Popov, M.; Villacci, D.; Terzija, V. An integrated framework for smart microgrids modeling, monitoring, control, communication, and verification. Proc. IEEE 2011, 99, 119–132. [Google Scholar] [CrossRef]
- Morris, T.; Srivastava, A.; Reaves, B.; Gao, W.; Pavurapu, K.; Reddi, R. A control system testbed to validate critical infrastructure protection concepts. Int. J. Crit. Infrastruct. Prot. 2011, 4, 88–103. [Google Scholar] [CrossRef]
- Huang, P.; Wang, Y.; Yan, G. Vulnerability analysis of electrical cyber physical systems using a simulation platform. In Proceedings of the IEEE the 43rd Annual Conference, Beijing, China, 29 October–1 November 2017; pp. 489–494. [Google Scholar]
- Parandehgheibi, M.; Modiano, E.; Hay, D. Mitigating cascading failures in interdependent power grids and communication networks. In Proceedings of the IEEE International Conference on Smart Grid Communications, Venice, Italy, 3–6 November 2014; pp. 242–247. [Google Scholar]
- Stott, B.; Jardim, J.; Alsaç, O. DC power flow revisited. IEEE Trans. Power Syst. 2009, 24, 1290–1300. [Google Scholar] [CrossRef]
Item | System Scale 1 | Algorithm Complexity 2 | Control Parameter | Platform Type | Considering Cyber Attack | Failure Propagation |
---|---|---|---|---|---|---|
Our | Large | Low | Bus/Branch/Power | Simulator | Yes/Multiple | Yes |
[15] | Large | Medium | Control Command | Simulator | Yes/Single | No |
[16,17] | Small | High | Angle/Frequency | Simulator | Yes/Single | No |
[20,21,22,23] | Small | High | Control Command | Simulator | Yes/Single | No |
[24] | Medium | Medium | Control Command | Simulator | Yes/Single | No |
[26,27] | Large | Low | Node/Line | Simulator | Yes/- | Yes |
[29] | Large | Low | Power | Simulator | Yes/Single | No |
[30] | Small | High | Angle/Frequency | Simulator | No | No |
[31] | Large | Low | Node | Simulator | Yes/Single | Yes |
[32,33] | Small | - | - | Hardware | No | No |
[34] | Medium | - | Angle/Frequency | OPNET | No | No |
[35] | Medium | - | Pack loss/Delay | NS-2 | Yes | No |
[36,37] | Medium | - | Angle/Frequency | HIL | No | No |
Item | Content |
---|---|
Operating system | Windows 7/10, Mac OS X 10.11 |
CPU | Intel (R) Core (TM) i7-4790, 3.60 GHz |
RAM | 8.00 GB |
System Type | 64-bit |
Software | MATLAB 2012a |
No. | Extra Injection Node ID | Overloaded Branch | Possible Gen ID | Possible Load ID |
---|---|---|---|---|
1 | 12(3–5) | 6–11 | 31/32 | 7/12 |
2 | 20(1–5) | 16–19 | 33/35/36 | 15/20/24 |
3 | 21(4–5) | 16–21 | 33/35 | 16/21 |
4 | 23(4–5) | 21–22, 23–24 | 33/35/36 | 16/21/23 |
5 | 25(3–5) | 2–25 | 30/37 | 1/25/26 |
6 | 26(5) | 2–25 | 30/37 | 1/25/26 |
7 | 28(5) | 2–25 | 30/37 | 1/25/26 |
8 | 29(5) | 2–25, 28–29 | 30/37/38 | 1/25/26/28/29 |
Faulty Branch | Remaining | Cost | Running Time | |||||
---|---|---|---|---|---|---|---|---|
Branch | Bus | (100 MVA) | ||||||
A | W | A | W | A | W | A | W | |
2–30 | 45 | 45 | 38 | 38 | 2.50 | 2.50 | 1 | 1 |
4–14 | 21 | 21 | 20 | 20 | 6.74 | 6.74 | 3 | 3 |
6–31 | 14 | 17 | 14 | 17 | 26.53 | 16.75 | 7 | 5 |
6–11 | 21 | 6 | 18 | 6 | 8.13 | 18.88 | 5 | 5 |
10–11 | 13 | 13 | 13 | 13 | 28.68 | 27.18 | 7 | 7 |
10–32 | 13 | 13 | 13 | 13 | 28.68 | 27.18 | 6 | 6 |
10–13 | 22 | 22 | 21 | 21 | 13.22 | 11.77 | 5 | 5 |
13–14 | 19 | 19 | 18 | 18 | 13.12 | 11.80 | 5 | 5 |
16–21 | 7 | 8 | 8 | 9 | 20.70 | 18.71 | 7 | 6 |
16–19 | 42 | 11 | 35 | 11 | 4.60 | 24.36 | 1 | 6 |
19–33 | 9 | 13 | 10 | 13 | 35.99 | 27.60 | 6 | 5 |
19–20 | 42 | 11 | 35 | 11 | 7.86 | 17.76 | 2 | 7 |
20–34 | 45 | 10 | 38 | 10 | 5.08 | 32.32 | 1 | 5 |
21–22 | 0 | 8 | 0 | 9 | 20.32 | 18.44 | 7 | 6 |
22–35 | 12 | 13 | 12 | 13 | 23.38 | 17.96 | 6 | 5 |
23–24 | 7 | 8 | 8 | 9 | 20.70 | 18.80 | 7 | 6 |
23–36 | 10 | 10 | 10 | 10 | 35.18 | 32.86 | 5 | 5 |
25–37 | 45 | 45 | 38 | 38 | 5.40 | 5.40 | 1 | 1 |
26–27 | 37 | 37 | 33 | 33 | 5.18 | 5.18 | 2 | 2 |
29–38 | 45 | 45 | 38 | 38 | 8.30 | 8.30 | 1 | 1 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, Y.; Yan, G.; Zheng, R. Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks. Appl. Sci. 2018, 8, 768. https://doi.org/10.3390/app8050768
Wang Y, Yan G, Zheng R. Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks. Applied Sciences. 2018; 8(5):768. https://doi.org/10.3390/app8050768
Chicago/Turabian StyleWang, Yinan, Gangfeng Yan, and Ronghao Zheng. 2018. "Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks" Applied Sciences 8, no. 5: 768. https://doi.org/10.3390/app8050768
APA StyleWang, Y., Yan, G., & Zheng, R. (2018). Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks. Applied Sciences, 8(5), 768. https://doi.org/10.3390/app8050768