Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey
Abstract
:1. Introduction
- it provides an overview of the vulnerability assessment of LFC operation from a network-based attack standpoint;
- it presents the implementation of network-based attacks on LFC operation in a simulated environment;
- it provides a brief review of attack detection, identification and mitigation strategies on normal LFC operation along with existing techniques for hardware validation;
- it discusses the role of data-driven and learning-based algorithms as trending tools for the attack modeling and defense strategy in the LFC operation.
2. Motivation and the LFC System
2.1. Cyber-Attack Cases
2.2. Mathematical Description of LFC Operation
3. Classification of Attacks on LFC
3.1. Strategic Attack
- Replay attack: Replay attack is a kind of data manipulation attack. The attacker records the data coming from the sensor and replays the recorded data with the actual data in order to hide the theft or attack. Replay attacks can be executed in two phases which are as follows:
- (a)
- Monitoring Phase: In this phase, the attacker records the data or information coming from the sensor/actuator and stores it in a different variable.
- (b)
- Replaying Phase: At this stage, the data collected in the monitoring phase are replayed again and again until the attack has been successfully executed by the attacker.
- Denial of Service (DoS): The transmission channel is blocked by flooding the excessive message (measurements) coming from the sensor.
- Data integrity attack: The transmissions are modified to a create false signal. For example, the modified area control error takes the form
- Timing attack: Delay is created to prevent the transmissions to reach in time. For example,
- Covert Attack: This attack basically works on the principle of canceling the effect of attack signal by calculating the response of the output and subtracting the readings which are being measured. Covert attack becomes more stealthy as it can access the data as well as inject the false data into the channels of sensors and actuators of a CPS.
- Zero dynamics attack: For successful execution of zero dynamics attack the attacker should have perfect knowledge of plant dynamics which are computed from state and output equations matrices. In this attack, the output of linear system are decoupled and uses the zeroes in transfer function to develop a particular attack strategy.
3.2. Template Attack
- Scaling attack: The magnitude or value of messages are scaled. For example,
- Ramp attack: The message of constant magnitude is continuously transmitted. For example,
- Pulse attack: The transmissions acquires a pulse shape with fixed time.
- Random attack: The messages of random values are propagated.
- Resonance attack: The message is modified according to a resonance source (e.g., rate of change of frequency).
- Bias injection attack: In this attack, a constant bias signal is injected into the channels of sensors or control signal.
3.3. Location Attack
- Attack on sensor: The transmitted measurements are altered under this attack.
- Attack on control: The control signal is varied.
- Attack on actuator: The actuator signal is distorted in this type of attack.
- Attack through Load: In LFC operation, the attacker can also penetrate through the load disturbance . The attack format may be
4. Simulation Study
- The integrity attack actually produces a constant bias in the scheduled frequency and such an attack can be eliminated easily.
- In a timing attack, if the delay identification is possible or the upper bound on the delay is predicted then delay compensation schemes could be applied as mitigation tools.
- The template attack simulated in this paper is the amplification of the error signal, and such an attack is among the most dangerous attacks as it immediately amplifies the signal and even the noise present in the network.
- The random attacks are often probabilistic in nature and such attacks can be modeled with the stochastic control theory.
- The nature of ramp attack presented in simulation studies seems to be a jamming type as the measurements received are fixed and error is not exactly diagnosed.
- Pulse attack is also one of the dangerous type of cyber-attack as it has fluctuating nature, that is, the magnitude increases or decreases frequently which results into the wear and tear of the electrical grid.
- Location-based attack as already mentioned are risky and easy to implement as there is a requirement of load perturbations that could be easily injected into the generation system.
5. Attack Detection and Prevention
5.1. Limited Access in the Control Center
5.2. DoS Prevention
5.3. False Data Injection Prevention
5.4. Time Delay Mitigation
6. Hardware Validation
7. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Song, H.; Fink, G.; Jeschke, S. Security and Privacy in Cyber-Physical Systems; Wiley Online Library: Vienna, Austria, 2017. [Google Scholar]
- Weerakkody, S.; Ozel, O.; Mo, Y.; Sinopoli, B. Resilient control in cyber-physical systems: Countering uncertainty, constraints, and adversarial behavior. Found. Trends Syst. Control 2019, 7, 1–252. [Google Scholar]
- Xie, L.; Ilic, M.D. Module-based modeling of cyber-physical power systems. In Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 513–518. [Google Scholar]
- Liu, Y.; Peng, Y.; Wang, B.; Yao, S.; Liu, Z. Review on cyber-physical systems. IEEE/CAA J. Autom. Sin. 2017, 4, 27–40. [Google Scholar] [CrossRef]
- Pasqualetti, F.; Dörfler, F.; Bullo, F. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of the 2011 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, FL, USA, 12–15 December 2011; pp. 2195–2201. [Google Scholar]
- Ding, D.; Han, Q.L.; Xiang, Y.; Ge, X.; Zhang, X.M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
- Dibaji, S.M.; Pirani, M.; Flamholz, D.B.; Annaswamy, A.M.; Johansson, K.H.; Chakrabortty, A. A systems and control perspective of CPS security. Annu. Rev. Control 2019, 47, 394–411. [Google Scholar] [CrossRef] [Green Version]
- Bhatia, S.; Kush, N.S.; Djamaludin, C.; Akande, A.J.; Foo, E. Practical modbus flooding attack and detection. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149]; Australian Computer Society, Inc.: Darlinghurst, Australia, 2014; pp. 57–65. [Google Scholar]
- Pour, M.M.; Anzalchi, A.; Sarwat, A. A review on cyber security issues and mitigation methods in smart grid systems. In Proceedings of the SoutheastCon 2017, Charlotte, NC, USA, 31 March–2 April 2017; pp. 1–4. [Google Scholar]
- Koutsoukos, X.; Neema, H.; Martins, G.; Bhatia, S.; Sztipanovits, J.; Stouffer, K.; Tang, C.Y.; Candell, R. Performance evaluation of secure industrial control system design: A railway control system case study. In Proceedings of the 2016 Resilience Week (RWS), Chicago, IL, USA, 16–18 August 2016; pp. 101–108. [Google Scholar]
- Parian, C.; Guldimann, T.; Bhatia, S. Fooling the Master: Exploiting Weaknesses in the Modbus Protocol. Procedia Comput. Sci. 2020, 171, 2453–2458. [Google Scholar] [CrossRef]
- Farwell, J.P.; Rohozinski, R. Stuxnet and the future of cyber war. Survival 2011, 53, 23–40. [Google Scholar] [CrossRef]
- Sánchez, H.S.; Rotondo, D.; Escobet, T.; Puig, V.; Quevedo, J. Bibliographical review on cyber attacks from a control oriented perspective. Annu. Rev. Control 2019, 48, 103–128. [Google Scholar] [CrossRef] [Green Version]
- Gheisarnejad, M.; Khooban, M.H.; Dragicevic, T. The future 5G network based secondary load frequency control in maritime microgrids. IEEE J. Emerg. Sel. Top. Power Electron. 2019. [Google Scholar] [CrossRef]
- He, H.; Yan, J. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 13–27. [Google Scholar] [CrossRef] [Green Version]
- Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2011, 2, 645–658. [Google Scholar] [CrossRef] [Green Version]
- Pappachen, A.; Fathima, A.P. Critical research areas on load frequency control issues in a deregulated power system: A state-of-the-art-of-review. Renew. Sustain. Energy Rev. 2017, 72, 163–177. [Google Scholar] [CrossRef]
- Saxena, S.; Fridman, E. Event-triggered load frequency control via switching approach. IEEE Trans. Power Syst. 2020, 35, 4484–4494. [Google Scholar] [CrossRef]
- Saxena, S. Load frequency control strategy via fractional-order controller and reduced-order modeling. Int. J. Electr. Power Energy Syst. 2019, 104, 603–614. [Google Scholar] [CrossRef]
- Saxena, S.; Hote, Y.V. Stabilization of perturbed system via IMC: An application to load frequency control. Control Eng. Pract. 2017, 64, 61–73. [Google Scholar] [CrossRef]
- Hanwate, S.; Hote, Y.V.; Saxena, S. Adaptive policy for load frequency control. IEEE Trans. Power Syst. 2017, 33, 1142–1144. [Google Scholar] [CrossRef]
- Smith, E.; Corzine, S.; Racey, D.; Dunne, P.; Hassett, C.; Weiss, J. Going beyond cybersecurity compliance: What power and utility companies really need to consider. IEEE Power Energy Mag. 2016, 14, 48–56. [Google Scholar] [CrossRef]
- Case, D.U. Analysis of the cyber attack on the Ukrainian power grid. Electr. Inf. Shar. Anal. Cent. (E-ISAC) 2016, 21, 388. [Google Scholar]
- Weerakkody, S.; Sinopoli, B. Challenges and opportunities: Cyber-physical security in the smart grid. In Smart Grid Control; Springer: Berlin/Heidelberg, Germany, 2019; pp. 257–273. [Google Scholar]
- Kundur, P.; Balu, N.J.; Lauby, M.G. Power System Stability and Control; McGraw-Hill New York: New York, NY, USA, 1994; Volume 7. [Google Scholar]
- Saxena, S.; Hote, Y.V. Load frequency control in power systems via internal model control scheme and model-order reduction. IEEE Trans. Power Syst. 2013, 28, 2749–2757. [Google Scholar] [CrossRef]
- Sarangan, S.; Singh, V.K.; Govindarasu, M. Cyber attack-defense analysis for automatic generation control with renewable energy sources. In Proceedings of the 2018 North American Power Symposium (NAPS), Fargo, ND, USA, 9–11 September 2018; pp. 1–6. [Google Scholar]
- Fries, S.; Hof, H.J.; Seewald, M. Enhancing IEC 62351 to improve security for energy automation in smart grid environments. In Proceedings of the 2010 Fifth International Conference on Internet and Web Applications and Services, Barcelona, Spain, 9–15 May 2010; pp. 135–142. [Google Scholar]
- Liu, S.; Liu, X.P.; El Saddik, A. Denial-of-service (DoS) attacks on load frequency control in smart grids. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6. [Google Scholar]
- Wu, C.; Wu, L.; Liu, J.; Jiang, Z.P. Active defense-based resilient sliding mode control under denial-of-service attacks. IEEE Trans. Inf. Forensics Secur. 2019, 15, 237–249. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, P.; Ma, L. Denial of service attack and defense method on load frequency control system. J. Frankl. Inst. 2019, 356, 8625–8645. [Google Scholar] [CrossRef]
- Cheng, Z.; Yue, D.; Hu, S.; Xie, X.; Huang, C. Detection-based weighted H∞ LFC for multi-area power systems under DoS attacks. IET Control Theory Appl. 2019, 13, 1909–1919. [Google Scholar] [CrossRef]
- Srikantha, P.; Kundur, D. Denial of service attacks and mitigation for stability in cyber-enabled power grid. In Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 18–20 February 2015; pp. 1–5. [Google Scholar]
- Yuan, Y.; Sun, F.; Liu, H. Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach. Int. J. Syst. Sci. 2016, 47, 2067–2077. [Google Scholar] [CrossRef]
- Sun, H.; Peng, C.; Wang, Y.; Tian, Y.C. Output-based resilient event-triggered control for networked control systems under denial of service attacks. IET Control Theory Appl. 2019, 13, 2521–2528. [Google Scholar] [CrossRef] [Green Version]
- Shen, Y.; Fei, M.; Du, D. Cyber security study for power systems under denial of service attacks. Trans. Inst. Meas. Control 2019, 41, 1600–1614. [Google Scholar] [CrossRef]
- Liu, J.; Gu, Y.; Zha, L.; Liu, Y.; Cao, J. Event-Triggered H∞ Load Frequency Control for Multiarea Power Systems Under Hybrid Cyber Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1665–1678. [Google Scholar] [CrossRef]
- Chen, X.; Wang, Y.; Hu, S. Event-triggered quantized H∞ control for networked control systems in the presence of denial-of-service jamming attacks. Nonlinear Anal. Hybrid Syst. 2019, 33, 265–281. [Google Scholar] [CrossRef]
- Chen, W.; Ding, D.; Dong, H.; Wei, G. Distributed resilient filtering for power systems subject to denial-of-service attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1688–1697. [Google Scholar] [CrossRef]
- Huang, T.; Satchidanandan, B.; Kumar, P.; Xie, L. An online detection framework for cyber attacks on automatic generation control. IEEE Trans. Power Syst. 2018, 33, 6816–6827. [Google Scholar] [CrossRef] [Green Version]
- Mo, Y.; Chabukswar, R.; Sinopoli, B. Detecting integrity attacks on SCADA systems. IEEE Trans. Control. Syst. Technol. 2013, 22, 1396–1407. [Google Scholar]
- Dan, G.; Sandberg, H. Stealth attacks and protection schemes for state estimators in power systems. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 214–219. [Google Scholar]
- Teixeira, A.; Amin, S.; Sandberg, H.; Johansson, K.H.; Sastry, S.S. Cyber security analysis of state estimators in electric power systems. In Proceedings of the 49th IEEE conference on decision and control (CDC), Atlanta, GA, USA, 15–17 December 2010; pp. 5991–5998. [Google Scholar]
- Zhong, H.; Du, D.; Li, C.; Li, X. A novel sparse false data injection attack method in smart grids with incomplete power network information. Complexity 2018, 2018, 8503825. [Google Scholar] [CrossRef]
- Alhalali, S.; Nielsen, C.; El-Shatshat, R. Mitigation of cyber-physical attacks in multi-area automatic generation control. Int. J. Electr. Power Energy Syst. 2019, 112, 362–369. [Google Scholar] [CrossRef]
- Tuttle, M.; Wicker, B.; Poshtan, M.; Callenes, J. Algorithmic approaches to characterizing power flow cyber-attack vulnerabilities. In Proceedings of the 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 18–21 February 2019; pp. 1–5. [Google Scholar]
- Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 2013, 58, 2715–2729. [Google Scholar] [CrossRef] [Green Version]
- Alhelou, H.H.; Golshan, M.E.H.; Hatziargyriou, N.D. A decentralized functional observer based optimal LFC considering unknown inputs, uncertainties, and cyber-attacks. IEEE Trans. Power Syst. 2019, 34, 4408–4417. [Google Scholar] [CrossRef]
- Lygeros, J. On reachability and minimum cost optimal control. Automatica 2004, 40, 917–927. [Google Scholar] [CrossRef]
- Esfahani, P.M.; Vrakopoulou, M.; Margellos, K.; Lygeros, J.; Andersson, G. Cyber attack in a two-area power system: Impact identification using reachability. In Proceedings of the 2010 American Control Conference, Baltimore, MD, USA, 30 June–2 July 2010; pp. 962–967. [Google Scholar]
- Bi, W.; Zhang, K.; Li, Y.; Yuan, K.; Wang, Y. Detection scheme against cyber-physical attacks on load frequency control based on dynamic characteristics analysis. IEEE Syst. J. 2019, 13, 2859–2868. [Google Scholar] [CrossRef]
- Chen, C.; Zhang, K.; Yuan, K.; Zhu, L.; Qian, M. Novel detection scheme design considering cyber attacks on load frequency control. IEEE Trans. Ind. Inform. 2017, 14, 1932–1941. [Google Scholar] [CrossRef]
- Kontouras, E.; Tzes, A.; Dritsas, L. Impact analysis of a bias injection cyber-attack on a power plant. IFAC-PapersOnLine 2017, 50, 11094–11099. [Google Scholar] [CrossRef]
- Kontouras, E.; Anthony, T.; Dritsas, L. Set-theoretic detection of data corruption attacks on cyber physical power systems. J. Mod. Power Syst. Clean Energy 2018, 6, 872–886. [Google Scholar] [CrossRef] [Green Version]
- Sridhar, S.; Govindarasu, M. Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 2014, 5, 580–591. [Google Scholar] [CrossRef]
- Zhao, F.; Yuan, J.; Wang, N.; Zhang, Z.; Wen, H. Secure Load Frequency Control of Smart Grids under Deception Attack: A Piecewise Delay Approach. Energies 2019, 12, 2266. [Google Scholar] [CrossRef] [Green Version]
- Esfahani, P.M.; Vrakopoulou, M.; Margellos, K.; Lygeros, J.; Andersson, G. A robust policy for automatic generation control cyber attack in two area power network. In Proceedings of the 49th IEEE Conference on Decision and Control (CDC), Atlanta, GA, USA, 15–17 December 2010; pp. 5973–5978. [Google Scholar]
- Ayyarao, T.S.; Kiran, I.R. A Two-Stage Kalman Filter for Cyber-Attack Detection in Automatic Generation Control System. J. Mod. Power Syst. Clean Energy 2021. [Google Scholar] [CrossRef]
- Badal, F.R.; Nayem, Z.; Sarker, S.K.; Datta, D.; Rahman Fahim, S.; Muyeen, S.; Islam Sheikh, M.; Das, S.K. A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity. Energies 2021, 14, 1401. [Google Scholar] [CrossRef]
- Lou, X.; Tran, C.; Tan, R.; Yau, D.K.; Kalbarczyk, Z.T. Assessing and mitigating impact of time delay attack: A case study for power grid frequency control. In Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, Montreal, QC, Canada, 16–18 April 2019; pp. 207–216. [Google Scholar]
- Sargolzaei, A.; Yen, K.K.; Abdelghani, M.N. Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 2015, 7, 1176–1185. [Google Scholar] [CrossRef]
- Mohan, A.M.; Meskin, N.; Mehrjerdi, H. A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems. Energies 2020, 13, 3860. [Google Scholar] [CrossRef]
- Tan, R.; Nguyen, H.H.; Foo, E.Y.; Yau, D.K.; Kalbarczyk, Z.; Iyer, R.K.; Gooi, H.B. Modeling and mitigating impact of false data injection attacks on automatic generation control. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1609–1624. [Google Scholar] [CrossRef]
- Ashok, A.; Wang, P.; Brown, M.; Govindarasu, M. Experimental evaluation of cyber attacks on automatic generation control using a CPS security testbed. In Proceedings of the 2015 IEEE Power & Energy Society General Meeting, Denver, CO, USA, 26–30 July 2015; pp. 1–5. [Google Scholar]
- Wang, B.; Sun, Q.; Han, R.; Ma, D. Consensus-based secondary frequency control under denial-of-service attacks of distributed generations for microgrids. J. Frankl. Inst. 2019, 358, 114–130. [Google Scholar] [CrossRef]
- Cybersecurity. Available online: https://www.opal-rt.com/cybersecurity-overview/ (accessed on 10 December 2019).
- Khalghani, M.R.; Solanki, J.; Solanki, S.K.; Khooban, M.H.; Sargolzaei, A. Resilient Frequency Control Design for Microgrids Under False Data Injection. IEEE Trans. Ind. Electron. 2020, 68, 2151–2162. [Google Scholar] [CrossRef]
- Montoya, J.; Brandl, R.; Vishwanath, K.; Johnson, J.; Darbali-Zamora, R.; Summers, A.; Hashimoto, J.; Kikusato, H.; Ustun, T.S.; Ninad, N.; et al. Advanced laboratory testing methods using real-time simulation and hardware-in-the-loop techniques: A survey of smart grid international research facility network activities. Energies 2020, 13, 3267. [Google Scholar] [CrossRef]
- Liu, Z.; Wang, Q.; Tang, Y. Design of a cosimulation platform with hardware-in-the-loop for cyber-attacks on cyber-physical power systems. IEEE Access 2020, 8, 95997–96005. [Google Scholar] [CrossRef]
- Ozay, M.; Esnaola, I.; Vural, F.T.Y.; Kulkarni, S.R.; Poor, H.V. Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 2015, 27, 1773–1786. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yan, Z.; Xu, Y. A multi-agent deep reinforcement learning method for cooperative load frequency control of a multi-area power system. IEEE Trans. Power Syst. 2020, 35, 4599–4608. [Google Scholar] [CrossRef]
- Abbaspour, A.; Sargolzaei, A.; Forouzannezhad, P.; Yen, K.K.; Sarwat, A.I. Resilient control design for load frequency control system under false data injection attacks. IEEE Trans. Ind. Electron. 2019, 67, 7951–7962. [Google Scholar] [CrossRef]
- Foroutan, S.A.; Salmasi, F.R. Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 161–171. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saxena, S.; Bhatia, S.; Gupta, R. Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey. Designs 2021, 5, 52. https://doi.org/10.3390/designs5030052
Saxena S, Bhatia S, Gupta R. Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey. Designs. 2021; 5(3):52. https://doi.org/10.3390/designs5030052
Chicago/Turabian StyleSaxena, Sahaj, Sajal Bhatia, and Rahul Gupta. 2021. "Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey" Designs 5, no. 3: 52. https://doi.org/10.3390/designs5030052
APA StyleSaxena, S., Bhatia, S., & Gupta, R. (2021). Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey. Designs, 5(3), 52. https://doi.org/10.3390/designs5030052