Sun 2018
Sun 2018
Review
A R T I C L E I N F O A B S T R A C T
Keywords: The integration of computing and communication capabilities with the power grid has led to numerous vul-
Cyber-physical system nerabilities in the cyber-physical system (CPS). This cyber security threat can significantly impact the physical
Cyber security infrastructure, economy, and society. In traditional IT environments, there are already abundant attack cases
Intrusion detection demonstrating that unauthorized users have the capability to access and manipulate sensitive data from a
CPS testbed
protected network domain. Electric power grids have also heavily adopted information technology (IT) to
Smart grid
perform real-time control, monitoring, and maintenance tasks. In 2015, a sophisticated cyber attack targeted
Ukrainian’s power grid causing wide area power outages. It highlights the importance of investment on cyber
security against intruders. This paper provides a state-of-the-art survey of the most relevant cyber security
studies in power systems. It reviews research that demonstrates cyber security risks and constructs solutions to
enhance the security of a power grid. To achieve this goal, this paper covers: (1) a survey of the state-of-the-art
smart grid technologies, (2) power industry practices and standards, (3) solutions that address cyber security
issues, (4) a review of existing CPS testbeds for cyber security research, and (5) unsolved cyber security pro-
blems. Power grid cyber security research has been conducted at Washington State University (WSU) with a
hardware-in-a-loop CPS testbed. A demonstration is provided to show how the proposed defense systems can be
deployed to protect a power grid against cyber intruders.
1. Introduction automated reclosers), and sends the fault information back to the
control center. Since power grids span a wide geographic area, public
To improve the efficiency and reliability, a significant investment and private networks (e.g., fiber optics, RF/microwave, cellular) can
has been made by industry and government to build a smarter and more provide a communication path between remote sites and a control
automated/connected power system. With the support of information center. These capabilities also open doors for attackers to access a
and communications technology (ICT), power system operators can power grid and cause disruptions to the normal operation of the grid.
perform operation and control tasks based on data acquired from re- Cyber attackers also have the ability to access power system commu-
mote facilities. For example, the advanced automation system isolates a nication networks and connect to remote access points at a power
faulted segment by opening switching devices (e.g., circuit breakers and system infrastructure. This can lead to serious and harmful
Abbreviations: ADS, Anomaly detection system; ADA, Advanced distribution automation; AMI, Advanced metering infrastructure; AMR, Automatic meter reading; ANSI, America
National Standards Institute; CC, Control center; CCADS, Coordinated cyber attack detection system; CIP, Critical infrastructure protection; CPS, Cyber-physical system; CT, Current
transformer; DA, Distribution automation; DER, Distributed energy resources; DMS, Distribution management system; DNP3, Distributed network protocol 3.0; DOE, Department of
Energy; DoS, Denial of service; EMS, Energy management system; E-ISAC, Electricity Information Sharing and Analysis Center; ESCSWG, Energy Sector Control Systems Working Group;
FCN, Field communication network; FDIR, Fault detection, isolation and recovery; FRTU, Feeder remote terminal unit; GOOSE, Generic object-oriented substation event; GPS, Global
positioning system; HAN, Home area network; HMI, Human machine interface; HIDS, Host-based IDS; LAN, Local area network; MDMS, Meter data management system; MMS,
Manufacturing message specification; MTTC, Mean-time-to-compromise; MU, Merging unit; NAN, Neighborhood area network; NERC, North American Electric Reliability Corporation;
NIDS, Network-based IDS; NIST, National Institute for Standards and Technology; IADS, Integrated ADS; ICT, Information and communications technology; ICCP, Inter-control center
communications protocol; IDPS, Intrusion detection and prevention system; IDS, Intrusion detection system; IEC, International Electrotechnical Commission; IED, Intelligent electronic
device; IP, Internet Protocol; ISA, International Society for Automation; ISEAGE, Internet-scale event and attack generation environment; ISM, Industrial, scientific, and medical (radio
bandwidth); IT, Information technology; OMS, Outage management system; OPC, Object linking and embedding for process control; PDC, Phasor data concentrator; PLC, Programmable
logic controller; PMU, Phasor measurement unit; RTDS, Real-time digital simulator; RTU, Remote terminal unit; SAS, Substation automation system; SAIFI, System average interruption
frequency index; SAIDI, System average interruption duration index; SCADA, Supervisory control and data acquisition; SCL, Substation configuration language; SCT, Smart City Testbed;
SDO, Standard Development Organization; SMV, Sample measured value; TO, Transmission operator; VT, Voltage transformer; WAMS, Wide area monitoring system; WAN, Wide area
network; WSU, Washington State University
⁎
Corresponding author at: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA.
E-mail addresses: [email protected] (C.-C. Sun), [email protected] (A. Hahn), [email protected] (C.-C. Liu).
https://doi.org/10.1016/j.ijepes.2017.12.020
Received 9 November 2017; Accepted 18 December 2017
0142-0615/ © 2018 Elsevier Ltd. All rights reserved.
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
consequences. As a result, cyber security of smart grids has been re- energy from generators to remote load centers. Dynamic interactions
cognized as a critical issue. among the large number of geographically dispersed generators,
In December 2015, Ukraine’s power system experienced a wide area transmission lines, and loads are key factors that affect the system
power outage in a cyber attack incident. The outage affected approxi- stability (e.g., small disturbance, transient, and voltage stability issues).
mately 225,000 customers. The power companies, SANS institute and The ICT system supports on-line data acquisition for monitoring and
Electricity Information Sharing and Analysis Center (E-ISAC), published control in a power system. Fig. 2 shows the communication structure in
reports [1] about the event. The attack started from malware installa- the transmission system operation level, such as operator level, control
tions by phishing mails several months prior to the attack. During the center level, and substation level.
reconnaissance period, attackers monitored the operations of the tar- Supervisory control and data acquisition (SCADA): For on-line
geted power grid for planning of the attack steps. On the attack day, operation and monitoring, SCADA systems have been installed in var-
human machine interface (HMI) was hijacked and used by the attackers ious industries (e.g., water, oil/gas, and power). In a power grid, the
to remotely open a number of circuit breakers which directly cut power SCADA system is a common tool for collecting measurements and status
to the customers. To further complicate the restoration process, the data and sending control commands to switching devices (e.g., circuit
telephone system and communication network were compromised by a breakers). Based on the collected data, an energy management system
denial of service (DoS) attack so that the call-center could not accept (EMS) provides analytical tools for operators to determine the system
incoming trouble calls from customers. Furthermore, the malware on state and take appropriate actions.
the HMI was used to delete software on the system, which prevented Substation automation system (SAS): The concept of SASs has
the operators from determining the extent of the power outage and been the subject of Working Group (WG) 10 of International
hampered restoration actions. Electrotechnical Commission (IEC) Technical Committee (TC) 57. IEC
While numerous efforts have focused the development and de- 61850 standard specifies the design of SASs [2]. It provides some ad-
ployment of technologies to protect computer systems and networks, vantages: (1) Reducing the engineering cost by integrating Ethernet-
these techniques do not provide perfect security. Hence, important is- based communication, (2) Enhancing interoperability of devices from
sues of cyber security research include classification of the normal or different vendors, and (3) Minimizing the impact when the commu-
abnormal system activities and identification of vulnerabilities. In order nication topology is changed [3]. Ethernet-based communication net-
to discover weaknesses of the smart grid communication systems, dif- work supports multiple standards that encompass different media types,
ferent cyber assessment approaches are proposed to support different such as copper and fiber-optic. Due to the ubiquitous nature of Ethernet
subsystems. The studies of attack/impact analysis provide the require- and large numbers of suppliers, the communication equipment cost is
ments to design cyber detection systems, e.g., intrusion detection sys- reduced. In addition, utilization of substation configuration language
tems (IDSs) and anomaly detection systems (ADSs). (SCL) improves the interoperability of IEC 61850 based devices. SCL
In the remaining of this paper, Section 2 describes the state-of-the- uses a standard file format to exchange information between proprie-
art of smart grid technology. Section 3 presents the cyber security tary configuration tools for substation devices. It reduces the impact
vulnerabilities in a smart grid. In Section 4, the solutions against cyber when a device is added/removed from the substation communication
intrusions are provided. Section 5 describes the potential cyber threats network. IEC 61850 provides high-speed communication protocols for
yet to be solved. In Section 6, research on cyber security at WSU will be substation automation facilities. Generic object oriented substation
used to demonstrate the emerging solutions, including the cyber-phy- event (GOOSE) messages are used to send tripping signals from pro-
sical testbed and anomaly detection systems. The conclusions are given tective IEDs to circuit breakers. Measurement values (i.e., current and
in Section 7. voltage) are sent from merging units (MUs) to IEDs by sampled mea-
sured value (SMV). In addition, the manufacturing message specifica-
2. State-of-the-art tion (MMS) is used for exchanging system data (e.g., measurement
readings and devices’ status) and control commands between a user
This section provides an overview of the emerging smart grid interface and IEDs.
technology and their impact on grid operations. Due to differences of Phasor measurement unit (PMU): The synchrophasor system has
configurations and objectives between power transmission and dis- been deployed in large scale over the last decade to enhance the power
tribution systems, they possess unique monitoring requirements, con- system observability. The digital sensor of a standard PMU is able to
trol systems, and embedded digital communication applications. sample 60–120 data points per second. The collected data (e.g., voltage,
current, frequency, and phase angle) can be synchronized by time
2.1. Digital communication systems stamps from the global positioning system (GPS). In 2017, over 2500 of
PMUs are installed and networked in North America [4]. The collected
In a traditional substation, analog communication between each measurements in each PMU are sent to a phasor data concentrator
pair of devices requires an individual copper cable. Digital commu- (PDC) in a control center using IEEE C37.118 protocol [5]. Various
nication, on the other hand, enables interconnectivity among various PMU applications (e.g., wide-area visualization, oscillation detection,
devices. Engineering costs can be reduced and the communication and voltage stability) have been proposed to improve the reliability of a
configuration becomes easier by using Ethernet and/or Internet power grid.
Protocol (IP). It also improves the efficiency of data exchange since the
configuration of digital communication allows multiple signals to be 2.2.2. Distribution system
transmitted concurrently on the same line. Fig. 1 shows the differences The effort in distribution automation over the last decades helped to
in configuration between traditional and digital substation commu- increase the reliability of the grid, but also increased the complexity of
nication networks. By connecting to the local area network (LAN), operation and control. These increasingly digital devices and systems
gateway devices (e.g., remote terminal units (RTUs) and routers) can include remote controlled switching devices, protection relays, voltage
aggregate the internal data in a substation and forward it to the desti- regulators, distributed energy resources, smart meters, and outage
nations (e.g., control centers and data centers). management systems. The equipped network interfaces enable remote
monitoring and control from a distribution operating center. Fig. 3 il-
2.2. Communication architecture of smart grids lustrates an ICT model of a distribution system.
AMI: With the embedded digital sensors, a smart meter is able to
2.2.1. ICT of transmission system record the power consumption profile at a time scale of seconds.
The primary purpose of a transmission system is to deliver electric Compared to the automatic meter reading (AMR) system, AMI has a
46
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
higher data exchange rate and is equipped with a full duplexed com- reporting power outage events with the embedded storage [11]. Com-
munication module, sending and receiving meter readings and control pared to trouble calls from customers, operators can respond to an
commands [6]. Generally, meter readings are sent to a control center outage event faster and reduce the outage duration.
every 5–60 min, depending on the meter configuration and availability DER: DERs (e.g., distributed generators, renewable energy devices,
of a network [7]. The communication network of AMI is formed by and energy storage) are usually deployed in a distribution system.
smart meters, local data aggregators, and meter data management These devices may be owned and controlled by consumers, third-par-
systems (MDMSs). With wireless communication protocols as defined in ties, or utilities for local consumption and/or trading in the electricity
IEEE 802.15.4 standard [8], the communication distance between a market [12]. These devices are also increasingly dependent on digital
local data aggregator and smart meters can be extended by the mesh control as many devices utilize smart inverters to provide improved
and point-to-multipoint networking topologies [9]. The wireless signal control over how the device is integrated with the grid and supports
strength of a local data aggregator is not necessary to cover all smart advanced applications, such as fault ride-through and VAR support.
meters in a neighborhood. This feature allows AMI devices to consume However, because these devices are increasingly owned by consumers,
less transmitting power (0 dBm) via low-gain antennas. Finally, the they are often not configured as securely as smart meters and often
meter data is sent to MDMS in a distribution operation center for fur- connected to other consumer devices (e.g., home WiFi routers). For a
ther analysis and planning purposes. utility scale DER system, facilities DER energy management systems are
The real-time meter readings enable several on-line operations used to manage a group of DER systems via WAN/LAN at the facility
which can improve system reliability and energy efficiency. For ex- [13].
ample, demand response [10] has been developed for reshaping the Distribution Automation (DA): DA enables remote monitoring and
power demand curve. The peak load can be reduced by shifting energy control in a distribution system; such remote controlled devices include
usage from the peak time to off-peak periods. It prevents overloading in feeder switches, voltage regulators, and capacitor banks. It provides
the power network and reduces the cost of electricity for consumers. functions of fault detection, isolation and recovery (FDIR) and volt-var
AMI also contributes to the outage management system (OMS) by control that improves reliability indices, including system average
47
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
interruption duration index (SAIDI) and system average interruption have perfect knowledge of all cyber assets in their network and all
frequency index (SAIFI). While many DA devices are found within authorized communications. However, this information is rarely
substations, which have some physical security and dedicated wired available, while the grid’s dependency on proprietary software plat-
communication, many are physically exposed pole-top devices that forms further complicates this process. In [18–20], identification ap-
depend on vulnerable wireless communication. proaches have been proposed to discover anomalies in firewall policies.
In addition, America National Standards Institute (ANSI)/International
3. Cyber security Society for Automation (ISA) also propose best practices (i.e., ANSI/ISA
62443-1-1) for a high-level security policy to mitigate threats in control
Many industry and government reports have identified that cyber systems. Furthermore, firewalls have other limitations as they cannot
intruders have become a serious threat to the secure operation of a protect against spoofed messages which may bypass their filter rules,
smart grid. Forty-six cyber attack incidents have been reported in the and they may also contain software vulnerabilities that may allow an
energy sector in 2015 [14], most of which targeted the IT system of attacker to bypass their protection.
utilities and vendors. The U.S. Department of Energy (DOE) indicates Network packets travelling in a WAN may not be protected by
that the actual number of cyber attacks is higher than reported [15]. To firewalls as there is often a concern that the devices may introduce
identify and eliminate cyber vulnerabilities in a smart grid, methods to excessive communication latency. To ensure confidentiality and in-
detect cyber intrusions and mitigate their impact need to be developed. tegrity of the grid data, cryptographic protection mechanisms of com-
munication protocols are critical. Many communication protocols and
devices used by the power industry communications were developed
3.1. Vulnerabilities in cyber infrastructures
before cyber security becomes a serious concern and do not implement
strong cryptographic protection. For example, MODBUS and
To prevent unauthorized access to a private network, firewalls are
Distributed Network Protocol 3.0 (DNP3) are used in SCADA, SAS, PMU
installed behind an access point (e.g., router and gateway) in order to
and DER systems [21,22]. However, they may not be well protected
filter incoming network traffic as a front line defense. Using the prop-
against cyber attacks [23]. Moreover, DNP3 is used in WAN commu-
erties of packets, such as time delay, source/destination IP address and
nication that increases security risks as WAN is accessible to many
port numbers, firewalls are capable of inspecting and discarding sus-
users. To secure communication protocols, MODBUS authentication
picious packets. However, the performance of firewalls relies on a pre-
frameworks have been proposed [24,25]. A lightweight security au-
defined rule set. Since a commercial grade firewall has hundreds of
thentication scheme [26,27] and a secured frame format are proposed
configurable rules [16], which can often conflict in many cases [17].
for DNP3 [28].
Furthermore, developing accurate firewall rules requires that the utility
48
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
3.2. Vulnerability assessment in a smart grid IT systems, the unique communication protocols and operations re-
quirements of the smart grid require the development of techniques
It is necessary to study the interactions between the cyber system that are tailored towards these environments. This section will explore
and physical system in a cyber attack event. As a core component in the current types of IDSs and how they are integrated and validated on
control systems, SCADA is a primary target for attackers. Ref. [29] in- CPS testbeds.
dicates that information exchange among various power entities via
WANs is a source of vulnerabilities. SCADA integrates smart grid sub- 4.1. Types of IDSs
systems (e.g., AMI, DER, and DA) in a distribution system. Cyber attacks
become damaging once intruders gain access to the SCADA network. In The design of an IDS includes three parts: (1) Detection technique,
2010, Stuxnet, a computer worm, was deployed to infect programmable (2) IDS type, and (3) Active/passive detection. IDSs can be categorized
logic controllers (PLCs) in an industrial control system [30]. It repro- by different ways as shown in Table 2.
grammed the PLCs to act in a manner intended by the attacker and to
hide the modifications from the operators. The affected systems include 4.1.1. Detection techniques
SCADA, PLCs, and nuclear facilities [31]. Ref. [32] provides an as- Knowledge based (or signature based) IDSs possess a database of
sessment framework to evaluate the vulnerabilities of SCADA systems. attack patterns or footprints. By comparing the signatures, intrusion
In [33], the mean-time-to-compromise (MTTC) is proposed as an index events are identified as the network traffic matches the same pattern in
to quantify the vulnerability of a SCADA system. Specific vulnerabilities a pre-defined database. Knowledge based IDSs have a low false positive
of SCADA and EMSs have been reported [34,35]. rate for detecting known attacks, however, this depends on a strong set
Power system operators rely on SCADA and SAS to perform opera- of rules that is tailored for the environment. While these are effective
tions via communications between a control center and remote sites. An against known attack patterns, they are not able to detect attacks which
IEC 61850 based substation automation system contains various IEDs. do not have previously developed signatures and also require frequent
Ref. [36] indicates that multicast messages defined in IEC 61850 (e.g., database updates.
GOOSE and SV) do not include cyber and information security features. Unlike knowledge based IDSs, behavior based (or anomaly based)
They are vulnerable to spoofing, replay, and packet modification, in- IDSs overcome the disadvantage by using profiles of network traffic
jection and generation attacks. Although IEC 62351 proposes compre- rather than searching for specific signatures. A base-line profile of
hensive security measures (e.g., authentication) to secure IEC 61850 normal network traffic is constructed to serve as the standard of normal
based communication protocols, the weaknesses still exist by analyzing conditions. Once the deviation of an inspected network profile from the
the specifications of both IEC standards [37]. An attack example is standard is significant, an anomaly alarm will be triggered. However, a
demonstrated in [38] in which attackers are able to modify the GOOSE major drawback of anomaly based detection is the difficulty in defining
packets to trip circuit breakers. In a massive attack event, attackers can anomaly patterns of network traffic, along with the fact that many
trigger a sequence of cascading events by compromising critical sub- system anomalies may be benign, such as system maintenance session
stations, causing a catastrophic outage. or upgrades. If the malicious behavior falls under the accepted areas,
A high level penetration of smart meters brings advantages to dis- the attack is regarded as normal.
tribution system operation. However, smart meters also bring cyber
security concerns, e.g., privacy, smart meter data modification attacks, 4.1.2. Anomaly data types
unauthorized remote load control, and interoperability problem. Note Detection approaches can be categorized based on the type of data
that intruder(s) may access the AMI network from various nodes in a they monitor. A network-based IDS (NIDS) monitors traffic in a network
public area, such as smart meters and local data collectors. These segment. With a physical network interface card connected to a LAN, a
problems indicate that a single layer of cyber security protection cannot NIDS is able to access network flows in the same network segment.
provide a higher level of cyber security. Several cyber attacks targeting Some techniques only inspect the lower-level network data, such as
the AMI have been identified, including energy theft, false data injec- network flows, which include the Ethernet and IP addresses, along with
tion, and leakage of the customer information [39–42]. the source and destination ports. Other techniques inspect the header
information and contents in higher layers of the communication
3.3. Smart grid standard and regulations structure, such as the SCADA protocol and payload. According to the
unique defined format and structure of each communication protocol, a
To ensure system reliability, [43] proposes baseline requirements predefined rule set is used to inspect the incoming network traffic.
and suggests implementation guidelines for data delivery systems in A host-based IDS (HIDS) is installed in each communication device
power grids. Critical infrastructure protection (CIP) standards CIP-002 individually. It monitors network activities and the device status in a
through CIP-009 are established by North American Electric Reliability single host system by analyzing log files, executables, system calls,
Corporation (NERC) [44]. The purpose is to “provide a cyber security process memory contents, and host network traffic. Since a HIDS does
framework for the identification and protection of critical cyber assets not utilize a LAN, the detection range is limited in the host devices.
to support reliable operation of the bulk electric system.” A “Roadmap
to Achieve Energy Delivery System Cyber Security” is published by the 4.1.3. Active and passive detection
Energy Sector Control Systems Working Group (ESCSWG) for im- A passive IDS only analyzes network flows and detects anomalies.
proving cyber security of energy delivery systems [45]. A smart grid When an anomaly is detected, a passive IDS triggers alarms. However,
cyber security guideline, NISTIR 7628, is published by National In- operators need to mitigate and clear the incident manually. In contrast,
stitute of Standards and Technology (NIST) [46,47]. Standard Devel- active IDSs are configured to disconnect suspicious connections auto-
opment Organizations (SDOs), such as IEC, ANSI, NIST, and IEEE, matically. Hence, an active IDS is also called intrusion detection and
publish multiple standards to serve as a paradigm for each subsystem of prevention system (IDPS).
a smart grid. Table 1 lists major standards for a smart grid.
4.2. Detection systems in smart grids
4. Anomaly and intrusion detection systems
Research has been conducted to explore the development of IDS
As previously mentioned, ADSs and IDSs are critical for detecting if techniques applied to an array of smart grid environments and appli-
an attacker has compromised grid systems and gained access to power cations. Table 3 provides an overview of the proposed techniques in-
grid networks. While these techniques have been heavily researched for cluding network-based, host-based, or integrated methods. However,
49
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
Table 1
Major standards for operating a smart grid.
while many approaches have been proposed, most have not yet been Wireless technology enables communication among devices without
integrated into industry due to insufficient verification and validation being limited by physical cables and rugged terrain. In a smart grid, DA,
on realistic environments. AMI and PMU systems utilize wireless systems to transmit/receive data.
Based on current regulations on the frequency spectrum, most wireless
communications use industrial, scientific, and medical (ISM) radio band
4.3. CPS testbed
for communication channels [73,74]. Since ISM band is license-free,
adversaries can legally access the bandwidth, causing an increase in
Since a field test of cyber attacks may cause damages to the real
cyber security risks. Under this circumstance, reliable encryption and
world power grid, a real-time CPS testbed is an alternative for study of
authentication mechanisms are critical for protection of data con-
the interactions between cyber and physical systems. In general, a CPS
fidentiality and integrity. As a matter of fact, latest cryptographic me-
testbed has three parts: (1) Power systems simulation tools (e.g., real
chanisms already made eavesdropping difficult. However, data avail-
time digital simulator (RTDS), DIgSILENT, PowerWrold, TSAT, and
ability is not ensured in a wireless communication environment. A
PSS/E), (2) Communication system simulation/emulation tools (e.g.,
portable software defined radio transmitter is able to emit wireless
network simulator3, Mininet, and OPNET), and (3) Connection between
signals at the designated frequency bandwidth in an open space [75]. If
(1) and (2), e.g., object linking and embedding (OLE) for process con-
attackers launched a jamming attack near smart grid devices (e.g.,
trol (OPC) communication. A hardware-in-the-loop testbed involves
smart meters, meter data collectors, DA remote control devices, and
physical devices (e.g., smart meters, IEDs, PMUs and switching devices)
GPS antenna of PMUs), components can be disconnected in a certain
for the study of specific cyber security areas, e.g., distribution system,
area. The effective area depends on the emission power of a jamming
transmission system, SCADA, AMI network, and DERs. Testbed-based
device (i.e., signal transmitter).
research is essential for research concerning: (1) Vulnerability assess-
ment, (2) Impact analysis, and (3) Attack-defense evaluation and vali-
dation. Table 4 lists a number of CPS testbeds in the U.S. 5.4. Validation of ADS and IDS
50
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
Table 4
Some CPS testbeds in the U.S.
Smart City Testbed [64] Washington State University ▪ Multiple industry standards based network simulation environment, covering
transmission and distribution systems
▪ Power systems simulator
▪ Physical devices integration
National SCADA Test Bed [65] U.S. National Labs (Argonne, Idaho, Oak Ridge, ▪ Comprehensive components of cyber and physical systems, including full size
Pacific Northwest, and Sandia) physical substations
Virtual Power System Testbed [66] University of Illinois at Urbana-Champaign ▪ Real-time immersive network simulation environment.
▪ Power system simulator
PowerCyber Security Testbed [67] Iowa State University ▪ Accessible to remote users
▪ Wide-area network emulation (ISEAGE)
▪ Power system simulator
Distribution Cyber Security National Renewable Energy Laboratory ▪ Focus on cyber security of distribution systems
Testbed [68] ▪ Able to interact with field equipment
SCADA Security Testbed [69] Mississippi State University ▪ Integration with PMUs and the communication system
▪ Power system simulation
5.5. Coordinated attacks well-organized plan including multiple attack steps within a time
window. Unfortunately, most ADS/IDS cannot handle coordinated
Since power grids are designed to be robust, simple cyber attacks cyber attack events since they are designed to monitor a local area. In a
are unlikely to cause operational impacts to the grid. In recent attack coordinated cyber attack, decoys might deceive defenders to waste the
events on Ukraine's power grids [1] and the physical attack on PG&E’s protection resource on minor abnormality in a power system.
transmission substation in San Jose, California [77], attackers have a
51
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
Table 5
Modules of SCT at WSU.
Transmission Control Center HMI and data servers EMS, firewalls, DNP 3.0
SAS Protective IEDs and data servers HMI, firewalls, IEC 61,850 and DNP 3.0
Distribution Operation Center HMI and data servers DMS, firewalls, DNP 3.0
Distribution Automation Feeder protection relays and automated switches DNP 3.0
AMI Smart meters and data collector IEEE 802.15.4 and ANSI C12.19
DER Solar panels (72 kW) and smart inverters MODBUS and VOLTTRON [80]
52
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
Fig. 8. HMI of CCADS presenting the criticality and geography relations of targeted substation.
53
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
A coordinated cyber attack has unique features: (1) A well-orga- on a cyber-power system testbed. Test cases of coordinated cyber attack
nized attack plan before the attack, and (2) Each attack step related to show that attackers are able to impact a power system by compromising
other step(s). Based on these observations, CCADS is designed to critical substations. Furthermore, the proposed IADS and CCADS are
identify pre-defined relations among detected events captured by IADS. applied to validate the anomaly detection capabilities. Once the mal-
Three pre-defined relations are developed: anomalies, targeted substa- icious network packets are detected by IADSs, CCADS analyzes the
tion locations, and criticality of substations. The proposed Relation predefined relations by collecting attack information from each tar-
Algorithm (RA) provides a reasoning process to quantify the likelihood geted substation. Based on the similarity index which is calculated by
of coordinated cyber attack events. The index ranges from 0 to 1, re- CCADS, the coordinated cyber attack alarm is triggered. Concurrently,
presenting the strength of the relations. Finally, a relation correlation IADSs execute the mitigation process, blocking the circuit breaker op-
system combines the indices from all relations to calculate the simi- erations and sending a disconnect command to firewalls to block the
larity index. If the similarity index is greater than a user-defined intruders’ connections.
threshold, the attack event is judged to be a coordinated cyber attack. In order to prevent unknown cyber attacks, Section 5 summarizes
The threshold represents the sensitivity of CCADS. the potential cyber security vulnerabilities to indicate research needs
In this paper, a demonstration with two attack scenarios on the IEEE for enhancing cyber security of a smart grid. Wireless communications
39 bus system is provided to: are threatened by jamming attacks since the absence of mitigation
approaches creates a weakness in connectivity of smart grid compo-
1. Demonstrate how the SCT supports cyber security research. nents. GPS signals are vulnerable to spoofing attacks that may impact
2. Demonstrate the collaboration between the proposed IADS and the time-based synchronization requirements for PMU data. Then, there
CCADS. is no standard to assess the performance of ADSs/IDSs. Although sev-
3. Demonstrate how the proposed ADSs protect a power grid against eral detection systems have been proposed and tested for different
coordinated cyber attacks. sectors of a smart grid, there is no guarantee for the detection rate in
practice. Finally, further research on coordinated cyber attacks is much
In this demonstration, attackers are assumed to have the knowledge needed. The Ukrainian power grid attack has shown that coordinated
to access multiple substation communication systems. By capturing and cyber attacks increase the success rate of cyber intrusions. Also, the
analyzing unencrypted GOOSE packets, attackers are able to modify response of operators should be taken into account in the cyber security
and resend them to trip circuit breakers in targeted substations. studies. In a cyber attack event, an operator could be deceived by fal-
In the first attack scenario, attackers' targets are substations 38, 35, sified data.
33 and 32 since these substations connect to generation sources. The
attack starts at t = 5 s, and the targets are compromised one by one Acknowledgments
every 5 s. Once the last targeted substation (i.e., substation 32) is
compromised, this power system collapses due to insufficient power This paper is based on work supported by the Department of Energy
generation. Fig. 5 is a screenshot from PowerFactor with the mea- under Award Number DE-OE0000780. The views and opinions of the
surements (i.e., voltage and frequency) during the cyber attack. After 4 authors expressed herein do not necessarily state or reflect those of the
generators are disconnected from the power grid, cascading events are United States Government or any agency thereof. The authors also
triggered. Finally, a wide area power outage is caused by the co- thank DOE for their funding under project Grid Modernization
ordinated cyber attacks. Laboratory Call (GMLC) Project GM0100.
In the second scenario, the same attack is simulated with the pro-
posed ADSs. Fig. 6 shows the interface of IADS in one of targeted Conflict of Interest
substations. It indicates the number of malicious GOOSE packets that
have been detected. Once the CCADS receives the information from None.
IADS, it performs the reasoning to calculate the index value for each
pre-defined relation and the final result. Fig. 7 shows that the relation Appendix A. Supplementary material
correlation system gives an index value of 0.9892 which is higher than
the user-defined threshold, 0.9. Thus, the CCADS triggers the alarm to Supplementary data associated with this article can be found, in the
report a coordinated cyber attack. Fig. 8 shows the criticality and online version, at http://dx.doi.org/10.1016/j.ijepes.2017.12.020.
geographic relations of targeted substations by graphical interfaces.
During the cyber attack, circuit breakers remain closed in targeted References
substations since the proposed IADS captures the malicious network
packets. Thus, effectiveness of the proposed ADSs is validated by the [1] SANS and Electricity Information Sharing and Analysis Center (E-ISAC). Analysis of
SCT. the cyber attack on the Ukrainian power grid; Mar. 18, 2016. Available: < http://
www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_
18Mar2016.pdf > .
7. Conclusion [2] Clavel F, Savary E, Angays P, Vieux-Melchior A. Integration of a new standard: a
network simulator of IEC 61850 architectures for electrical substations. IEEE Ind
Appl Mag 2015;21(1):41–8.
ICT systems have become a backbone of modern power grids. Cyber [3] Cheng X, Lee WJ, Pan X. Modernizing substation automation systems: adopting IEC
security is important for stability and reliability of the smart grid. This Standard 61850 for modeling and communication. IEEE Ind Appl Mag
paper is a state-of-the-art survey of cyber security R&D for a smart grid. 2017;23(1):42–9.
[4] North American SynchroPhasor Initiative. Sychrophasors & the grid; 2017.
Vulnerabilities are increasingly present in the cyber-power system en-
Available: < https://www.naspi.org/sites/default/files/reference_documents/
vironment due to the growing dependency on computer systems and naspi_naruc_silverstein_20170714.pdf > .
digital communication. Since there are limitations for firewalls to [5] IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE Standard
C37.118.2-2011 (Revision of IEEE Standard C37.118-2005); 2011.
identify malicious packets, ADSs/IDSs are critical to detect anomalies
[6] Fischer R, Schulz N, Anderson GH. Information management for an automated
inside a private network (e.g., LAN, HAN, and NAN). Furthermore, the meter reading system. In: Proc of the 62nd American power conf; Apr. 2000.
performance of detection systems should meet the requirements for [7] CENTRON Meter Technical Reference Guide. Liberty Lake, WA, USA: Itron Inc.;
power systems, such as accuracy and communication delay. With a 2006. Available: < http://www.smartmetereducationnetwork.com/uploads/how-
to-tell-if-I-have-a-ami-dte-smart-advanced-meter/Itron%20Centron%20Meter
realistic CPS testbed, researchers can test their cyber protection systems %20Technical%20Guide1482163-201106090057150.pdf > .
to evaluate whether requirements are met. [8] IEEE Standard for Low-Rate Wireless Networks. IEEE Standard 802.15.4-2015
Research results on cyber security of a smart grid are demonstrated (Revision of IEEE Standard 802.15.4-2011); 2016.
54
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
[9] Leon G. Smart planning for smart grid AMI mesh networks. Technology white krebsonsecurity.com/2012/04/fbi-smart-meterhacks-likely-to-spread/ > .
paper. EDX Wireless [Online]. Available: < http://www.edxwireless.biz/news/ [42] Rosenbaum H. Danville utilities sees increase in meter tampering; 2012.
EDXWP_Smart_Grid_AMI_Mesh_ Networks_May_11.pdf > . Available: < http://www.wset.com/story/20442252/danville-utilities-sees-
[10] The U.S. Pacific Northwest National Laboratory (PNNL). AMI communication re- increase-in-meter-tampering > .
quirements to implement demand-response: applicability of hybrid spread spectrum [43] Bakken DE, Bose A, Hauser CH, Whitehead DE, Zweigle GC. Smart generation and
wireless [Online]. Available: < http://www.pnnl.gov/main/publications/external/ transmission with coherent, real-time data. Proc IEEE Jun. 2011;99(6):928–51.
technical_reports/PNNL-20806.pdf > . [44] North American Electric Reliability Corporation (NERC). CIP standard. Available
[11] Jiang Y, Liu CC, Diedesch M, Lee E, Srivastava AK. Outage management of dis- online: < ftp://www.nerc.com/pub/sys/all_updl/standards/sar/CIP-002-009-1_30-
tribution systems incorporating information from smart meters. IEEE Trans Power day_Pre-ballot_Comment.pdf > .
Syst Sept. 2016;31(5):4144–54. [45] The U.S. Department of Energy, Energy Sector Control Systems Working Group
[12] Smart Grid Interoperability Panel (SGIP). Distributed Energy Resources (DER): (ESCSWG). Roadmap to achieve energy delivery system cyber security. Available
hierarchical classification of use cases and the process for developing information online: < http://energy.gov/oe/downloads/roadmap-achieve-energy-delivery-
exchange requirements and object models, white paper; 2014. Available: < http:// systems-cybersecurity-2011 > .
www.sgip.org/wp-content/uploads/Distributed-Energy-Resources_DER- [46] National Institute for Standards and Technology. Guidelines for smart grid cyber
Hierarchical-Classification-of-Use-Cases-and-the-Process-for-Developing- security, NISTIR 7628. [Online]. Available: < http://online.wsj.com/news/
Information-Exchange-Requirements-and-Object-Models-2014-07-18.pdf > . articles/SB10001424052702304851104579359141941621778 > .
[13] Qi J, Hahn A, Lu X, Wang J, Liu CC. Cybersecurity for distributed energy resources [47] National Institute for Standards and Technology. The cyber security coordination
and smart inverters. IET Cyber-Phys Syst: Theor Appl 2016;1(1):28–39. task group: smart grid cyber security strategy and requirements. Available on-
[14] NCCIC and ICS-CERT. NCCIC/ICS-CERT 2015 year in review; Apr. 19, 2016. line: < http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol2.pdf > .
Available: < https://ics-cert.us-cert.gov/sites/default/files/Annual_Reports/Year_ [48] Yang Y, McLaughlin K, Sezer S, Littler T, Im EG, Pranggono B, et al. Multiattribute
in_Review_FY2015_Final_S508C.pdf > . SCADA-specific intrusion detection system for power networks. IEEE Trans Power
[15] The U.S. Department of Energy. Cyber threat and vulnerability analysis of the U.S. Del Jun. 2014;29(3):1092–102.
electric sector; Aug. 2016. Available: < https://energy.gov/sites/prod/files/2017/ [49] Zhang Y, Wang L, Sun W, Green II RC, Alam M. Distributed intrusion detection
01/f34/Cyber%20Threat%20and%20Vulnerability%20Analysis%20of%20the system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid
%20U.S.%20Electric%20Sector.pdf > . Dec. 2011;2(4):796–808.
[16] Chapman D, Fox A, Stiffler R. Cisco secure PIX firewalls. Cisco Press; 2001. [50] Yang Y, McLaughlin K, Littler T, Sezer S, Pranggono B, Wang HF. Intrusion detec-
[17] Hari A, Suri S, Parulkar G. Detecting and resolving packet filter conflicts. In: Proc of tion system for IEC 60870-5-104 based SCADA Networks. In: 2013 IEEE power &
the IEEE INFOCOM 2000. Conf comput commun; 2000. p. 1203–12. energy society general meeting, Vancouver, BC; 2013. p. 1–5.
[18] Hamed H, Al-Shaer E, Marrero W. Modeling and verification of IPSec and VPN [51] Mo Y, Chabukswar R, Sinopoli B. Detecting integrity attacks on SCADA systems.
security policies. In 13TH IEEE intl conf network protocols (ICNP'05); 2005. p. 10. IEEE Trans Control Syst Technol Jul. 2014;22(4):1396–407.
[19] Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: [52] Barbosa RRR, Sadre R, Pras A. Flow whitelisting in SCADA networks. Int J Crit
IEEE INFOCOM 2004, vol. 4; 2004. p. 2605–16. Infrastruct Protect Aug. 2013;6:150–8.
[20] Yuan L, Chen H, Mai J, Chuah CN, Su Z, Mohapatra P. FIREMAN: a toolkit for [53] Hahn A, Govindarasu M. Model-based intrusion detection for the smart grid
firewall modeling and analysis. In: 2006 IEEE symp. security and privacy (S&P'06), (MINDS). In: ACM proc of the eighth annual CSIIRW, New York, NY, USA; 2013.
Berkeley/Oakland, CA; 2006. [54] Ten CW, Hong J, Liu CC. Anomaly detection for cybersecurity of the substations.
[21] Modbus Application Protocol Specification, V1.1B Modbus Organization; 2006. IEEE Trans Smart Grid Dec. 2011;2(4):865–73.
Available: < http://www.modbus-IDA.org > . [55] Yang Y, Xu HQ, Gao L, Yuan YB, McLaughlin K, Sezer S. Multidimensional intrusion
[22] Padilla E, Agbossou K, Cardenas A. Towards smart integration of distributed energy detection system for IEC 61850-based SCADA networks. IEEE Trans Power Del Apr.
resources using distributed network protocol over ethernet. IEEE Trans Smart Grid 2017;32(2):1068–78.
Jul. 2014;5(4):1686–95. [56] Premaratne UK, Samarabandu J, Sidhu TS, Beresh R, Tan JC. An intrusion detection
[23] Shahzad A, Musa S, Aborujilah A, Irfan M. Industrial Control Systems (ICSs) vul- system for IEC61850 automated substations. IEEE Trans Power Del Oct.
nerabilities analysis and SCADA security enhancement using testbed encryption. In: 2010;25(4):2376–83.
Proc of the ACM 8th intl conf ubiquitous inf. management and commun (ICUIMC [57] Wu J, Xiong J, Shil P, Shi Y. Real time anomaly detection in wide area monitoring of
'14). New York, NY; Jan. 2014. p. 7. smart grids. In: 2014 IEEE/ACM intl conf comput-aided design (ICCAD), San Jose,
[24] Phan RCW. Authenticated modbus protocol for critical infrastructure protection. CA; 2014. p. 197–204.
IEEE Trans Power Del July 2012;27(3):1687–9. [58] Fan Y, Zhang Z, Trinkle M, Dimitrovski AD, Song JB, Li H. A cross-layer defense
[25] Hayes G, El-Khatib K. Securing modbus transactions using hash-based message mechanism against gps spoofing attacks on PMUs in smart grids. IEEE Trans Smart
authentication codes and stream transmission control protocol. In: 2013 Third intl Grid Nov. 2015;6(6):2659–68.
conf commun and inf technol (ICCIT), Beirut; 2013. p. 179–84. [59] Mitchell R, Chen IR. Behavior-rule based intrusion detection systems for safety
[26] Gilchrist G. Secure authentication for DNP3. In: Proc IEEE power energy soc gen critical smart grid applications. IEEE Trans Smart Grid Sept. 2013;4(3):1254–63.
meeting-convers del elect energy 21st century, Pittsburgh, PA, USA; 2008. p. 1–3. [60] McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S. A multi-sensor energy
[27] Amoah R, Camtepe S, Foo E. Securing DNP3 broadcast communications in SCADA theft detection framework for advanced metering infrastructures. IEEE J Select
systems. IEEE Trans Ind Informat Aug. 2016;12(4):1474–85. Areas Commun Jul. 2013;31(7):1319–30.
[28] Song KY, Yu KS, Lim D. Secure frame format for avoiding replay attack in dis- [61] Liu Y, Hu S, Ho TY. Leveraging strategic detection techniques for smart home
tributed network protocol (DNP3). In: 2015 Intl conf inf and comm technol con- pricing cyberattacks. IEEE Trans Depend Secure Comput 2016;13(2):220–35.
vergence (ICTC), Jeju; 2015. p. 344–49. [62] Liu X, Zhu P, Zhang Y, Chen K. A collaborative intrusion detection mechanism
[29] Ericsson G. Toward a framework for managing information security for an electric against false data injection attack in advanced metering infrastructure. IEEE Trans
power utility—CIGRÉ experiences. IEEE Trans Power Del Jul. 2007;22(3):1461–9. Smart Grid Sept. 2015;6(5):2435–43.
[30] Falliere N, Murchu LO, Chien E. W32.Stuxnet Dossier. Symantec security response, [63] Berthier R, Sanders W. Specification-based intrusion detection for advanced me-
Version 1.4; Feb. 2011. Available: < https://www.symantec.com/content/en/us/ tering infrastructures. In: Proc IEEE 17th Pacific rim int symp dependable com-
enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf > . puting; Dec. 2011. p. 184–93.
[31] Kushner D. The real story of stuxnet. IEEE Spectr Mar. 2013;50(3):48–53. [64] Sun CC, Hong J, Liu CC. A co-simulation environment for integrated cyber and
[32] Ten CW, Liu CC, Manimaran G. Vulnerability assessment of cybersecurity for power systems. In: 2015 IEEE intl conf smart grid commun (SmartGridComm),
SCADA systems. IEEE Trans Power Syst Nov. 2008;23(4):1836–46. Miami, FL; 2015. p. 133–38.
[33] Zhang Y, Wang L, Xiang Y, Ten CW. Inclusion of SCADA cyber vulnerability in [65] Idaho National Laboratory. Fact sheet: national SCADA test bed; 2009.
power system reliability assessment considering optimal resources allocation. IEEE Available: < https://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/
Trans Power Syst Nov. 2016;31(6):4379–94. NSTB_Fact_Sheet_FINAL_09-16-09.pdf > .
[34] Amanullah MTO, Kalam A, Zayegh A. Network security vulnerabilities in SCADA [66] Bergman DC, Jin D, Nicol DM, Yardley T. The virtual power system testbed and
and EMS. In: 2005 IEEE/PES transmission & distribution conference & exposition: inter-testbed integration. In: 2nd Workshop cyber security experimentation and
Asia and Pacific, Dalian; 2005. p. 1–6. test; Aug. 2009.
[35] Li GW, Ju WY, Shi DY. Functional vulnerability assessment of SCADA network. In: [67] Ashok A, Krishnaswamy S, Govindarasu M. PowerCyber: a remotely accessible
2012 Asia-Pacific power and energy eng conf, Shanghai; 2012. p. 1–4. testbed for cyber physical security of the smart grid. In: 2016 IEEE power & energy
[36] Hong J, Liu CC, Govindarasu M. Detection of cyber intrusions using network-based society innovative smart grid technol conf (ISGT), Minneapolis, MN; 2016. p. 1–5.
multicast messages for substation automation. In: 2014 IEEE power & energy so- [68] National Renewable Energy Laboratory (NREL). NREL’s cybersecurity initiative
ciety innovative smart grid technol conf (ISGT), Washington, DC; 2014. p. 1–5. aims to wall off the smart grid from hackers; 2016. Available: < http://www.nrel.
[37] Strobel M, Wiedermann N, Eckert C. Novel weaknesses in IEC 62351 protected gov/news/features/2016/21612 > .
smart grid control systems. In: 2016 IEEE intl conf smart grid commun [69] Reaves B, Morris T. An open virtual testbed for industrial control system security
(SmartGridComm), Sydney, NSW; 2016. p. 266–70. research. Int J Inf Security 2012;11(4):215–29.
[38] Hong J, Liu CC, Govindarasu M. Integrated anomaly detection for cyber security of [70] Bonebrake C, Ross O'Neil L. Attacks on GPS time reliability. IEEE Secur Priv
the substations. IEEE Trans Smart Grid Jul. 2014;5(4):1643–53. 2014;12(3):82–4.
[39] Namboodiri V, Aravinthan V, Mohapatra SN, Karimi B, Jewell W. Toward a secure [71] Zhang Z, Gong S, Dimitrovski AD, Li H. Time synchronization attack in smart grid:
wireless-based home area network for metering in smart grids. IEEE Syst J Jun. impact and analysis. IEEE Trans Smart Grid Mar. 2013;4(1):87–98.
2014;8(2):509–20. [72] Jiang X, Zhang J, Harding BJ, Makela JJ, Domínguez-García AD. Spoofing GPS
[40] Liang X, Li X, Lu R, Lin X, Shen X. UDP: usage-based dynamic pricing with privacy receiver clock offset of phasor measurement units. IEEE Trans Power Syst
preservation for smart grid. IEEE Trans Smart Grid Mar. 2013;4(1):141–50. 2013;28(3):3253–62.
[41] Krebs B. FBI: Smart meter hacks likely to spread; 2012. Available: < http:// [73] The U.S. Department of Commerce. United States frequency allocations. Available
55
C.-C. Sun et al. Electrical Power and Energy Systems 99 (2018) 45–56
56