Cyber Security in Smart Grids
EE 772 : Smart Grids
- Prof. S. A. Khaparde
Indian Institute of Technology Bombay
Cyber Security in Smart Grids EE 772 : Smart Grids Prof. S. A. - - PowerPoint PPT Presentation
Cyber Security in Smart Grids EE 772 : Smart Grids Prof. S. A. Khaparde Indian Institute of Technology Bombay Introduction to Cyber-Physical Systems - Communication between physical devices through a cyber layer - Sensors and Actuators
Indian Institute of Technology Bombay
and meter, communication link between sensor, meter and data center
real communication links, servers and control centers
influence of one’s dynamics on the other
impact analysis and performance of mitigation algorithms
training
Components in a CPS Testbed:
grid state in real time
system simulator and control center
system simulation, allows integration of IEDs and associated hardwares through standard protocols IEC 61850 and DNP3, closely mimics the physical response of the power system when subjected to fault type scenarios
communicating with control center, or could be virtual substations with virtual IEDs communicating with control center. Capable of computing and actuating capabilities related to protection.
status and commands between both other IEDs and the RTU
communicate analog and binary values between the IEDs and RTUs
Logical Block Diagram of a CPS Environment
sources.
3. Time Delay Attacks - Attackers can introduce deliberate delays into the sensing and feedback loops by jamming the network or by attacking the routing tables. Time delays can severely degrade the performance of control systems, can even lead to small signal instability. In protection paradigm, information is time critical. Latencies can lead to malfunctioning of relays. 4. GPS Spoofing Attacks - A GPS spoofing attack attempts to deceive a
GPS receiver by broadcasting incorrect GPS signals, structured to resemble a set of normal GPS signals, or by rebroadcasting genuine signals captured elsewhere or at a different time. PMUs are susceptible to these attacks.
5. False Data Injection Attacks - Attacker hacks into the system and corrupts the sensor readings in a way that it gets undetected by the bad data detection system in control center. Due to high degree of correlation between the sensor readings in power system (thanks to KCL and KVL), the attacker has to have access to a large set
Power injection & flow measurement Data from remote sensors Control Centre System States Operation Decisions
Attacker modifies either the MEASUREMENT DATA received by the control centre or the NETWORK TOPOLOGY as perceived by the control centre Corruption is intelligent to AVOID DETECTION
WRONG ESTIMATES lead to WRONG DECISIONS in merit
PERFECT ATTACKS – Attacker has knowledge of topology IMPERFECT ATTACKS – Attacks constructed from measurement data alone. Knowledge of Topology is NOT EXACT ! Attacker’s Intention: Economic Merit in Market, Large Scale Terrorism
matrix
Residues :
For Generalized False Data Injection
Perfect Attack: To Ensure
Adjust GENERATOR OUTPUTS to maintain FREQUENCY and TIE LINE FLOWS to scheduled values Very fast acting : ACE signals every 5 secs No elaborate algorithm to validate data But… perceived change in FREQUENCY and perceived change in LOAD should be consistent
AREA CONTROL ERROR
If ACE is positive, it is a signal to the generators to Ramp Down If ACE is negative, it is a signal to the generators to Ramp Up An attacker modifies the sensor outputs of TIE LINE flows and FREQUENCY to orchestrate an attack
Any change in TIE LINE flow is perceived as a change in LOAD and hence change in frequency has to corroborate with it
Interpreted by AGC as excess generation in area 1, send signal to ramp down Load Generation Mismatch …. Shortage in generation…. Fall in frequency Under-frequency relays trip… Large regions are isolated
Ex-Ante LMP at each Node Optimal Generation Schedule Expected Line Flows
Generator Bids and Forecasted Loads
Attack Variations
Manipulated Sensor Data
Ex- Post LMP
Attacker has the information about Ex- Ante LMPs and Line Flows
Dispatch Schedule & Ex- Ante LMP Calculation Day Ahead Market LMP calculated from Lagrange Multipliers Dispatch Instruction sent to Generators
Stochastic Nature of Loads…. Variation in Dispatch… Real time generation and flows are different Need to recalculate LMP based on run time data to charge the difference in consumption/generation
Real Time Market
Incremental OPF
flows
Difference in LMP between two nodes
Virtual Trading j1
Node
j2
Node Buy at Day Ahead Market & Sell at Real Time Market Sell at Day Ahead Market & Buy at Real Time Market
Attacking Principle
Corrupt sensor data such that Ensure:
Attacks targeted on TAP CHANGING TRANSFORMERS
Attackers compromise sensors Reported values lower than actual Operators increase tap setting System operates inefficiently at higher voltage Voltage stress on equipment
Under Normal Operating Conditions
Attacks targeted on TAP CHANGING TRANSFORMERS
Under Conditions of Voltage Drop
Attackers compromise sensors Reported values higher than actual Operators decrease tap setting System voltage further drops Voltage collapse
Types of Attacks on Voltage Control
De-synchronization Attacks
Denial of Cooperation Attacks
Data Injection Attacks
DoS attack on the communication network by flooding it with junk packets Delay in Time critical voltage signals for control Insertion of malicious data into voltage measurements
1.
4.
Attack-Resilient Monitoring and Control
Kaustav Chatterjee
Department of Electrical Engineering Indian Institute of Technology Bombay
M.Tech. Presentation, 2018
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 1 / 41
Part II Detection of Replay Attack on Wide-Area Measurement System
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 12 / 41
Replay Attack on WAMS
Attacker hacks PMU - records data - later replays disturbance data to mislead the operator Can suppress the periods of disturbance with recorded ambient data Cannot be detected by observing individual PMU data - Need for centralized detector
time, s
2 4 6 8 10 12 14 16 18
voltage, pu
0.5 1
Bus 9
Fault Replay Attack Duration Actual Fault
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 13 / 41
Replay Attack on WAMS
Attacker hacks PMU - records data - later replays disturbance data to mislead the operator Can suppress the periods of disturbance with recorded ambient data Cannot be detected by observing individual PMU data - Need for centralized detector
time, s
2 4 6 8 10 12 14 16 18
voltage, pu
0.2 0.4 0.6 0.8 1
Bus 1 Bus 2 Bus 3 Bus 4 Bus 5 Bus 6 Bus 7 Bus 8 Bus 9 Bus 10
Fault Replay Attack Duration Actual Fault
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 13 / 41
Replay Attack Detection
Objective: Distinguish between data from actual disturbance and replay attack Previous Works: Kalman Filter and LQG Control based detector 1 , Injecting harmonic oscillations 2 Needs accurate linearized system model - would vary with operating point - knowledge of system parameters Proposed Detectors:
Data-driven, model free, looks into the trends in PMU data in unison SVD based, Pearson Correlation based Theme: Correlation in data, and lack of during an attack
1 Y. Mo and B. Sinopoli, “Secure Control Against Replay Attacks,” in Forty-SeventhAnnual Allerton Conference, July 2009, 2 A. Hoehn and P. Zhang, “Detection of Replay Attacks in Cyber-Physical Systems”, in 2016 American Control Conference (ACC), July 2016, Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 14 / 41
SVD Based Detection
Uses the relative change in the dominant singular values of the moving window of measurements as the metric Let mth PMU measurement at ith time step be denoted by yi
measurements be M and the window length for computation be N. Measurement window of interest at kth time step: Y (k) = yk
1
yk−1
1
yk−2
1
. . . yk−N+1
1
. . . . . . . . . . . . . . . yk
M
yk−1
M
yk−2
M
. . . yk−N+1
M
Singular Value Decomposition (SVD) of Y (k) is Y (k) = UΣV T Detection metric: %∆σ(k)
i
= σ(k)
i
−σ(n)
i
σ(n)
i
× 100%
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 15 / 41
SVD Based Detection: Case Study
Window Size = 200 samples, PMU Reporting Rate = 100 Hz, Voltage Magnitude measurements of 4-machine 10-bus System 3 Case Study I: Attack at Bus 9, Replaying Fault at Bus 9 Case Study II: Attack at Bus 9, Replaying Opening of Line 9-10
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 17 / 41
Attack at Bus 9 Replaying Fault at Bus 9
5 10 15 20 25 30 35 40 45 50
σ1
42 46 5 10 15 20 25 30 35 40 45 50
σ2
4
time, s
5 10 15 20 25 30 35 40 45 50
σ3
0.4
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 18 / 41
Attack at Bus 9 Replaying Opening of Line 9-10
time, s 10 20 30 40 50 60 70 80
voltage, pu
0.96 0.98 1
Bus 6 Bus 7 Bus 9 Bus 10
Replay Attack Topology Change 10 20 30 40 50 60 70 80
σ1
44.8 44.9 10 20 30 40 50 60 70 80
σ2
0.1
time, s
10 20 30 40 50 60 70 80
σ3
0.04 Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 19 / 41
Pearson Correlation Based Detection
Uses time correlation in voltage measurements of neighboring buses Unless arrested by voltage control devices- voltage dip from fault propagate across network x and y be two time series representation of two measurements, then the Pearson Correlation coefficient r for an window of length N is, r =
N
(xi − ¯ x)(yi − ¯ y)
(xi − ¯ x)2
N
(yi − ¯ y)2 Range: −1 ≤ r ≤ 1 (r = ± 1 = ⇒ high correlation = ⇒ Ambient/Fault Condition, r = 0 = ⇒ no correlation = ⇒ Replay)
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 21 / 41
Case Study: Typical r Values
V6, pu 0.9825 0.9835 V9, pu 0.973 0.976 Window of Pre-fault Ambient Data
V6, pu 0.9 0.95 1 1.05
V9, pu 0.9 0.95 1 Window of Post-fault Data r = 0.9894 r = 0.9851
V6, pu
0.5 1
V9, pu
0.94 0.96 Window of Attack
V6, pu
0.5 1
V9, pu
0.5 1 Window of Pre-fault & Fault Data r = 0.9985 r = 0.0085
Figure: Scatter plot for voltage magnitudes of buses 6 & 9. Fault at bus 6. Window length = 2500 samples.
Kaustav Chatterjee M.Tech Presentation EE, IIT Bombay 22 / 41