Cyber-Physical Security for the Smart Grid Deepa Kundur Texas - - PowerPoint PPT Presentation

cyber physical security for the smart grid
SMART_READER_LITE
LIVE PREVIEW

Cyber-Physical Security for the Smart Grid Deepa Kundur Texas - - PowerPoint PPT Presentation

Cyber-Physical Security for the Smart Grid Deepa Kundur Texas A&M University (Joint work with Shan Liu, Takis Zourntos and Karen Butler-Purry) CYBER SECURITY POWER SYSTEMS DYNAMICAL SYSTEMS 2 A Smarter Grid MARRIAGE OF INFORMATION


slide-1
SLIDE 1

Cyber-Physical Security for the Smart Grid

Deepa Kundur

Texas A&M University

(Joint work with Shan Liu, Takis Zourntos and Karen Butler-Purry)

slide-2
SLIDE 2

2

CYBER SECURITY POWER SYSTEMS DYNAMICAL SYSTEMS

slide-3
SLIDE 3

A Smarter Grid

Bidirectional information transfer! Bidirectional energy transfer!

MARRIAGE OF INFORMATION TECHNOLOGY WITH THE EXISTING ELECTRICITY NETWORK

3

slide-4
SLIDE 4

Why Cyber Protect the Grid?

Technical

Public-Welfare Business

INCREASED MOTIVATION INCREASED OPPORTUNITY SECURE FOR COMPLIANCE PROTECT/REDUCE LIABILITY ASSURE REVENUE TERRORISM PHYSICAL DAMAGE CASCADING FAILURES

4

slide-5
SLIDE 5

What has history taught us?

 Commerce

 eCommerce has provided greater consumer-

and vendor-centricity

 Entertainment

 Digital entertainment has enabled more

flexible business models

 Friendship

 Social networking has allowed us to keep in

touch with geographically distant friends

5

IMPERSONATION PIRACY PRIVACY

slide-6
SLIDE 6

Lessons Learned

 Cyber security should be part of system

design.

 Cyber security is a support service that

should not hinder usability

 Cyber security is a process; no system is

completely secure.

6

slide-7
SLIDE 7

Cyber-Physical Interface

7

slide-8
SLIDE 8

Cyber-Physical Interface

8

slide-9
SLIDE 9

Fundamental R&D Questions

 What are the electrical system impacts of

a cyber attack?

 How should security resources be

prioritized for the greatest advantage?

 Is the new data/control worth the

security risk?

9

slide-10
SLIDE 10

Of Interest to the EPU Community

 Attacks on information accuracy

 False data injection attacks

 Attacks on timely delivery

 Denial of information access

 Attacks on access control

 Reconfiguration attacks

10

slide-11
SLIDE 11

Design Mantra

 Cyber assets:

 Any data, device or component of the

environment that supports information- related activities

 E.g., IEDs, PLCs, RTUs, PMUs, PDCs, SCADA,

AMI, communication infrastructure …

11

“Cyber assets are targets of cyber attacks.”

slide-12
SLIDE 12

False Data Injection Attacks

12

STATE ESTIMATION

 Liu et al. (2009)  Corruption of measurements:

 za = z + a, for a = Hc and constraints on a

 Figures of merit:

 Likelihood of finding a  Impact = ||xa – x||

slide-13
SLIDE 13

Denial-of-Service Attacks

 How do you make decisions with lack of

  • r delayed information?

13

G(s) H(s)

slide-14
SLIDE 14

Risk

 Risk = Likelihood x Impact  Risk = PThreats x PVulnerabilities x Impact

THREATS NATURALLY OCCURRING UNTRAINED PERSONNEL MALICIOUS INSIDERS LONE ACTORS ORGANIZED CRIME TERRORISM NATION-STATES VLUNERABILITIES COMMUNICATIONS INTERNET GRID COMPLEXITY CONTROL SYSTEM COMPLEXITY NEW SYSTEMS NEW DEVICES IMPACT AREAS GENERATION SENSORS GENERATION ACTUATORS XMISSION SENSORS XMISSION ACTUATORS DISTRIB SENSORS DISTRIB ACTUATORS DISTRIB GNERATION MICROGRIDS

14

ICT Simulator Power System Simulator

slide-15
SLIDE 15

Emerging Design Mantra

 Cyber-physical assets:

 Any component of the environment that

supports energy-related activities

 E.g., IEDs, PLCs, RTUs, PMUs, PDCs, SCADA,

AMI, communication infrastructure, energy sources, transformers, transmission lines, buses, loads

15

“Cyber-physical assets are targets of cyber-physical attacks.”

slide-16
SLIDE 16

Cyber-Physical Vulnerabilities

 Cyber assets can be direct targets of

cyber and physical attacks.

 Physical assets can be direct targets of

physical attack and indirect targets of cyber attack.

16

slide-17
SLIDE 17

Cyber-Physical Attacks

 Evolving definitions:

 A coordinated set of cyber and physical attacks on

cyber-physical assets with the goal of maximizing physical disruption

 E.g., combination of transmission line fault with state

estimation modification

 A cyber attack employed on a cyber asset with the

goal of disruptive impacts to the physical assets

 E.g., control signal modification to reconfigure power

system to an emergency state

17

Emerging Grand challenge: Modeling

slide-18
SLIDE 18

Modeling Wish List

 Tight coupling of cyber and physical

components:

 time-scale integration, vulnerability analysis

 Formalism using powerful mathematical

constructs

 Flexible granularity of modeling detail to

tune complexity

 ‘What if’ analysis possible.

18

slide-19
SLIDE 19

Dynamical Systems

Dynamical Systems

 Describes time evolution of state vector:  Models physics of power systems effectively

19

✓ Formalism ฀ Variable granularity ฀ ‘What if’ analysis

How can you model cyber and physical entities within a common framework?

slide-20
SLIDE 20

20

slide-21
SLIDE 21

13 Node System

21

slide-22
SLIDE 22

22

Graph Model

slide-23
SLIDE 23

Of Interest to the Power Community

 Attacks on information accuracy

 False data injection attacks

 Attacks on timely delivery

 Denial of information access

23

 Attacks on access control

 Reconfiguration attacks

slide-24
SLIDE 24

Cyber-Physical Attacks

 Evolving definitions:

 A coordinated set of cyber and physical attacks on

cyber-physical assets with the goal of maximizing physical disruption

 E.g., combination of transmission line fault with state

estimation modification

24

 A cyber attack employed on a cyber asset with the

goal of disruptive impacts to the physical assets

 E.g., control signal modification to reconfigure power

system to an emergency state

slide-25
SLIDE 25

Coordinated Switching Attacks

 Smart grid envisions remote access of

circuit breakers and switches

 Breaker control signals are corrupted  Exploits physical vulnerabilities from

reconfiguration

25

slide-26
SLIDE 26

Coordinated Switching Attacks

 Goal: physical disruption through rotor

angle instability

 Exploit local state info to define a

disruptive cyber control switching sequence

 Model the cyber-physical system as a type

  • f hybrid dynamic system:

 Exhibit both continuous and discrete behaviors

26

slide-27
SLIDE 27

Variable Structure System

27

switching signal

slide-28
SLIDE 28

Variable Structure System

28

slide-29
SLIDE 29

Variable Structure System

29

slide-30
SLIDE 30

Static Switch Phase Portraits

30

slide-31
SLIDE 31

Variable Structure System

31

slide-32
SLIDE 32

Variable Structure System

32

slide-33
SLIDE 33

The Sliding Mode

 “Emergent” property from switching that

has characteristics different from individual subsystems

 Motion of state trajectory along a chosen

line/plane/surface

33

slide-34
SLIDE 34

Existence of Sliding Mode

34

s>0 s<0

slide-35
SLIDE 35

Attack Construction

  • 1. Represent smart system as variable

structure system whereby s(x) is general.

  • 2. Determine existence of and identify

class of sliding modes.

  • 3. Assign identified sliding surface for

attack.

35

slide-36
SLIDE 36

WECC System

36

Western Electricity Coordinating Council, 3 machine, 9-bus system

slide-37
SLIDE 37

Step 1: Modeling

37

slide-38
SLIDE 38

Step 2: Existence of Sliding Mode

38

Phase Portrait of A1 Phase Portrait of A2 Overlapping Close-up

slide-39
SLIDE 39

Step 2: Existence of Sliding Mode

39

VALID SLIDING SURFACE

A1 A2

slide-40
SLIDE 40

Step 3: Assign s(x) for attack

40

slide-41
SLIDE 41

Attack Simulation on SMIB Model

41

Switching applied From 0 s to 2.5 s.

slide-42
SLIDE 42

Attack Simulation on WECC

 PSCAD Simulations

42

slide-43
SLIDE 43

Attack Simulation on WECC

43

slide-44
SLIDE 44

Final Remarks

 Coordinated variable structure switching

attacks represent a new class of attacks aimed specifically to disrupt power system operation.

 Hybrid dynamical system models are

effective tools in vulnerability analysis.

44

slide-45
SLIDE 45

Where should we go from here?

 Develop common problem formulations

within community

 Exciting area, but still ad hoc

 Encourage greater collaboration amongst

power system researchers, control theorists and information technology community

45

slide-46
SLIDE 46

Contact

  • Dr. Deepa Kundur

Associate Professor Electrical & Computer Engineering Texas A&M University dkundur@tamu.edu http://www.ece.tamu.edu/~ deepa/

46