Cyber–Physical System Security for the Electric Power Grid

@article{Sridhar2012CyberPhysicalSS,
  title={Cyber–Physical System Security for the Electric Power Grid},
  author={Siddharth Sridhar and Adam Hahn and G. Manimaran},
  journal={Proceedings of the IEEE},
  year={2012},
  volume={100},
  pages={210-224}
}
The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from successful cyber attacks. Estimating feasible attack impact requires an evaluation of the grid's dependency on its cyber infrastructure and its ability to tolerate potential failures. A further exploration of the cyber-physical relationships within the smart grid and a specific review of possible attack vectors is necessary to determine the adequacy of cybersecurity efforts. This… 

Figures and Tables from this paper

Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations.
TLDR
The significance of cyber infrastructure security in conjunction with power application security to pre- vent, mitigate, and tolerate cyber attacks is highlighted and a layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber structure.
Physical and cyber security in a smart grid environment
TLDR
Critical vulnerabilities of a smart grid that can be exploited for physical and cyber intrusions are discussed and the interdependency of physical and Cyber security is illustrated with an intrusion scenario.
Cyber-Physical System Security and Impact Analysis
TLDR
A testbed architecture provides an accurate and powerful tool for identification of cyber-physical system vulnerabilities, security enhancement, impact analysis, and mitigation of cyber attacks.
Towards a Smarter Power Grid: Vulnerability Assessmentand Security Metric Deployment
Smart Grid is considered as one of the most critical cyber-physical infrastructure; leveraging the advanced coupled communication infrastructure, it is designed to address the limitations and
A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis
TLDR
This survey establishes a complete causal chain from component-wise vulnerability to system-wide impact assessment for enhancing cyber security, and potential research directions for enhancing power grid cyber security are identified.
Cyber-physical attacks and defences in the smart grid: a survey
TLDR
This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid, and focuses on prominent CP attack schemes with significant impact on the smartgrid operation and corresponding defense solutions.
A Review of Cyber-Physical Security in the Generation System of the Grid
TLDR
This work proposes a detection in-depth structure for holistic detection of attacks in the system and reviews the response and recovery measures and discusses the emergence of digital forensics in the smart grid.
A Review of Cyber-Physical Security in the Generation System of the Grid
TLDR
This work proposes a detection in-depth structure for holistic detection of attacks in the system and reviews the response and recovery measures and discusses the emergence of digital forensics in the smart grid.
Cyber risk modeling and attack-resilient control for power grid
The electric power grid is a cyber-physical system (CPS) that forms the lifeline of modern society. The advanced devices and communication infrastructure of the Supervisory Control and Data
A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks
TLDR
A function-based methodology to evaluate smart grid resilience against cyber-physical attacks, a Bayesian Attack Graph for Smart Grid tool to compute the likelihood of the compromise of cyber components of the smart grid system, and risk analysis methodology which combines the results of the function- based methodology and BAGS to quantify risk.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 100 REFERENCES
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
TLDR
A supervisory control and data acquisition security framework with the following four major components is proposed: (1) real-time monitoring; (2) anomaly detection; (3) impact analysis; and (4) mitigation strategies; an attack-tree-based methodology for impact analysis is developed.
Vulnerability Assessment of Cybersecurity for SCADA Systems
TLDR
A vulnerability assessment framework to systematically evaluate the vulnerabilities of SCADA systems at three levels: system, scenarios, and access points is proposed based on cyber systems embedded with the firewall and password models, the primary mode of protection in the power industry today.
Cyber Assessment Methods For SCADA Security
TLDR
Vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure are described.
Development of the PowerCyber SCADA security testbed
TLDR
The design and implementation of the testbed are documents while proposing cyber attack scenarios which will negatively affect grid operations and the results of an initial cyber vulnerability assessment are documents to evaluate the security posture of the current design.
Data integrity attack and its impacts on voltage control loop in power grid
TLDR
A template that might be used by an attacker with knowledge of system functionality to perform data integrity attacks on messages exchanged between the control center and actuators in the voltage control loop is presented.
Data integrity attacks and their impacts on SCADA control system
TLDR
Impact on the physical system is estimated by magnitude of load-generation imbalance and frequency deviation after a successful attack on the Automatic Generation Control (AGC) loop.
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
TLDR
This work builds on past work in the area of principles of authentication in Internet protocols but focuses the discussion on the constraints of the Power Grid; in particular, the need for efficient and highly available systems.
Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid
TLDR
This paper presents a framework for cyber attack impact analysis of a smart grid and illustrates how cause-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems.
False data injection attacks against state estimation in electric power grids
TLDR
A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection.
Cyber attack in a two-area power system: Impact identification using reachability
TLDR
A new framework is developed and a systematic methodology is defined, based on reachability, for identifying the impact that an intrusion might have in the Automatic Generation Control loop, which regulates the frequency and the power exchange between the controlled areas.
...
1
2
3
4
5
...