Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9960983
George Torres, Sharad Shrestha, S. Misra
With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.
{"title":"iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid","authors":"George Torres, Sharad Shrestha, S. Misra","doi":"10.1109/SmartGridComm52983.2022.9960983","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960983","url":null,"abstract":"With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961000
S. Köhler, S. Birnbach, Richard Baker, I. Martinovic
The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Power Transfer (WPT). Instead of charging an EV via a charging cable, the battery is charged wirelessly. For safety and efficiency reasons, the vehicle and the charging station continuously exchange critical information about the charging process. This includes, e.g., the maximum voltage and current, battery temperature, and State of Charge (SoC). Since there is no physical connection between the vehicle and the charging station, this necessary control communication has to be implemented as a wireless connection. However, if the communication is interrupted, the charging process is aborted for safety reasons. In this paper, we analyze the attack surface of EV charging standards that use such a wireless control communication. More specifically, we discuss potential wireless attacks that can violate the availability and analyze the implemented security features of a real-world wireless charging station that has already been deployed. We found that the tested charging station does not implement even simple security measures, such as IEEE 802.11w, that can protect the communication from denial-of-service attacks. Finally, we discuss potential countermeasures, and give recommendations to improve the security and increase the resilience of wireless charging.
{"title":"On the Security of the Wireless Electric Vehicle Charging Communication","authors":"S. Köhler, S. Birnbach, Richard Baker, I. Martinovic","doi":"10.1109/SmartGridComm52983.2022.9961000","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961000","url":null,"abstract":"The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Power Transfer (WPT). Instead of charging an EV via a charging cable, the battery is charged wirelessly. For safety and efficiency reasons, the vehicle and the charging station continuously exchange critical information about the charging process. This includes, e.g., the maximum voltage and current, battery temperature, and State of Charge (SoC). Since there is no physical connection between the vehicle and the charging station, this necessary control communication has to be implemented as a wireless connection. However, if the communication is interrupted, the charging process is aborted for safety reasons. In this paper, we analyze the attack surface of EV charging standards that use such a wireless control communication. More specifically, we discuss potential wireless attacks that can violate the availability and analyze the implemented security features of a real-world wireless charging station that has already been deployed. We found that the tested charging station does not implement even simple security measures, such as IEEE 802.11w, that can protect the communication from denial-of-service attacks. Finally, we discuss potential countermeasures, and give recommendations to improve the security and increase the resilience of wireless charging.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of information and communications technology (ICT) in DC microgrids (DCmGs), the threat of false data injection attacks (FDIAs) is becoming more and more serious. However, the existing literature mainly focuses on the detection and identification of FDIAs in DCmGs, while the data recovery after the perception of FDIAs has never been thor-oughly investigated yet. In this paper, we propose a distributed data recovery scheme to eliminate the adverse impact caused by FDIAs in DCmGs. Firstly, by observing the point of common coupling (PCC) voltage under FDIAs, the injected constant bias can be roughly estimated. In order to obtain the precise constant bias, the mean filter (MF) is adopted to handle the measurement noises and small oscillations. Then, the estimated precise constant bias is compensated for the communicated signal to eliminate the attack impact. Furthermore, our proposed data recovery scheme, which only needs local information, is fully distributed. Finally, the accuracy and effectiveness of the distributed data recovery scheme are evaluated through systematical hardware-in-the-loop (HIL) experiments.
{"title":"Distributed Data Recovery Against False Data Injection Attacks in DC Microgrids","authors":"Zexuan Jin, Mengxiang Liu, Ruilong Deng, Peng Cheng","doi":"10.1109/SmartGridComm52983.2022.9960968","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960968","url":null,"abstract":"With the development of information and communications technology (ICT) in DC microgrids (DCmGs), the threat of false data injection attacks (FDIAs) is becoming more and more serious. However, the existing literature mainly focuses on the detection and identification of FDIAs in DCmGs, while the data recovery after the perception of FDIAs has never been thor-oughly investigated yet. In this paper, we propose a distributed data recovery scheme to eliminate the adverse impact caused by FDIAs in DCmGs. Firstly, by observing the point of common coupling (PCC) voltage under FDIAs, the injected constant bias can be roughly estimated. In order to obtain the precise constant bias, the mean filter (MF) is adopted to handle the measurement noises and small oscillations. Then, the estimated precise constant bias is compensated for the communicated signal to eliminate the attack impact. Furthermore, our proposed data recovery scheme, which only needs local information, is fully distributed. Finally, the accuracy and effectiveness of the distributed data recovery scheme are evaluated through systematical hardware-in-the-loop (HIL) experiments.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115786480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961044
Zhoubing Li, Meng Zhang, Lin Li, Xiaohong Guan
Fault diagnosis is an important guarantee for the stable and safe operation of microgrids, which consists of fault detection and fault localization. However, most current researches separately deal with these two issues, which cannot obtain completed fault diagnosis results. This paper proposes a solution based on deep learning, namely branch convolution neural network (CNN) with a majority voting (B-CNN-MV) model, to simultaneously realize fault detection and fault localization through two branches. One of the branches realizes fault detection and the other performs fault localization. Firstly, in each branch, the CNN module extracts the two-dimensional image features of each sample in the spatial dimension and outputs primary classification results. Then, the classification results from the CNN module within one period of data constitute the temporal dimension input for the following majority voting module. Finally, the majority voting modules after each branch employ these temporal dimension inputs to calculate the final fault type and location results. Through this new design, the information on accurate fault type and fault location can be obtained simultaneously. Moreover, the test results show the proposed B-CNN-MV model can also achieve a high accuracy even in the case of insufficient data.
{"title":"Fault Diagnosis of Microgrids Using Branch Convolution Neural Network and Majority Voting","authors":"Zhoubing Li, Meng Zhang, Lin Li, Xiaohong Guan","doi":"10.1109/SmartGridComm52983.2022.9961044","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961044","url":null,"abstract":"Fault diagnosis is an important guarantee for the stable and safe operation of microgrids, which consists of fault detection and fault localization. However, most current researches separately deal with these two issues, which cannot obtain completed fault diagnosis results. This paper proposes a solution based on deep learning, namely branch convolution neural network (CNN) with a majority voting (B-CNN-MV) model, to simultaneously realize fault detection and fault localization through two branches. One of the branches realizes fault detection and the other performs fault localization. Firstly, in each branch, the CNN module extracts the two-dimensional image features of each sample in the spatial dimension and outputs primary classification results. Then, the classification results from the CNN module within one period of data constitute the temporal dimension input for the following majority voting module. Finally, the majority voting modules after each branch employ these temporal dimension inputs to calculate the final fault type and location results. Through this new design, the information on accurate fault type and fault location can be obtained simultaneously. Moreover, the test results show the proposed B-CNN-MV model can also achieve a high accuracy even in the case of insufficient data.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961040
Thanasis G. Papaioannou, G. Stamoulis
Energy flexibility management can significantly support the smoother and more cost-effective green transformation of the energy mix. However, effective management of the flexibility of residential loads can only be achieved if users are successfully engaged into the process. In this paper, we propose an optimization framework that incorporates provision of different forms of monetary and non-monetary incentives to prosumers, i.e., rewards, lotteries, peer-pressure, for providing flexibility at specific time slots. Economic rewards are offered according to a simple, yet very powerful, linear incentives' function. Dynamic tariffs per time slot for purchasing and selling electricity are accommodated in this framework as well. The optimization problem of the DR aggregator is modeled as a cost-minimization one; its solution as a Stackelberg game is outlined for the case of full information on user-utility functions by the DR aggregator. Moreover, a distributed iterative algorithm is developed for solving the flexibility-management problem in the case where user-utility functions are not known to the aggregator. Numerical results show that this optimization framework is able to elicit the required flexibility from users at a minimum incentive cost, especially when monetary rewards are combined with peer pressure.
{"title":"An Optimization Framework for Effective Flexibility Management for Prosumers","authors":"Thanasis G. Papaioannou, G. Stamoulis","doi":"10.1109/SmartGridComm52983.2022.9961040","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961040","url":null,"abstract":"Energy flexibility management can significantly support the smoother and more cost-effective green transformation of the energy mix. However, effective management of the flexibility of residential loads can only be achieved if users are successfully engaged into the process. In this paper, we propose an optimization framework that incorporates provision of different forms of monetary and non-monetary incentives to prosumers, i.e., rewards, lotteries, peer-pressure, for providing flexibility at specific time slots. Economic rewards are offered according to a simple, yet very powerful, linear incentives' function. Dynamic tariffs per time slot for purchasing and selling electricity are accommodated in this framework as well. The optimization problem of the DR aggregator is modeled as a cost-minimization one; its solution as a Stackelberg game is outlined for the case of full information on user-utility functions by the DR aggregator. Moreover, a distributed iterative algorithm is developed for solving the flexibility-management problem in the case where user-utility functions are not known to the aggregator. Numerical results show that this optimization framework is able to elicit the required flexibility from users at a minimum incentive cost, especially when monetary rewards are combined with peer pressure.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9960992
H. Malik, A. Pouttu
Existing ICT networks are characterized by high level of energy consumption. In order to power up 5G base station sites, rising energy cost and high carbon emissions are major concerns that need to be dealt with. To achieve carbon neutrality, ICT sector needs to transform base station sites in a self-sustainable manner using renewable energy sources, local batteries and energy conservation techniques, even in adverse weather conditions and unexpected power outages. In this paper, short term-forecasting models are studied for accurate energy consumption and production forecast. The proposed architecture provides adaptive energy conservation technique using time series data analysis and Long Short-Term Memory for 5GNR base station site which is independent of traditional power sources and is completely powered by green energy. The accuracy analysis of this study was performed by the Mean Square Error (MSE) and Root Mean Square Error (RMSE). The results show high accuracy levels of LSTM model in guiding short-term energy forecasting for green ICT networks.
{"title":"Integration of LSTM based Model to guide short-term energy forecasting for green ICT networks in smart grids","authors":"H. Malik, A. Pouttu","doi":"10.1109/SmartGridComm52983.2022.9960992","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960992","url":null,"abstract":"Existing ICT networks are characterized by high level of energy consumption. In order to power up 5G base station sites, rising energy cost and high carbon emissions are major concerns that need to be dealt with. To achieve carbon neutrality, ICT sector needs to transform base station sites in a self-sustainable manner using renewable energy sources, local batteries and energy conservation techniques, even in adverse weather conditions and unexpected power outages. In this paper, short term-forecasting models are studied for accurate energy consumption and production forecast. The proposed architecture provides adaptive energy conservation technique using time series data analysis and Long Short-Term Memory for 5GNR base station site which is independent of traditional power sources and is completely powered by green energy. The accuracy analysis of this study was performed by the Mean Square Error (MSE) and Root Mean Square Error (RMSE). The results show high accuracy levels of LSTM model in guiding short-term energy forecasting for green ICT networks.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961035
Reuben Samson Raj, Dong Jin
Phasor Measurement Units (PMU), due to their capability for providing highly precise and time-synchronized measurements of synchrophasors, have now become indispensable in wide area monitoring of power-grid systems. Successful and reliable delivery of synchrophasor packets from the PMUs to the Phasor Data Concentrators (PDCs) and beyond, requires a backbone communication network that is robust and resilient to failures. These networks are vulnerable to a range of failures that include cyber-attacks, system or device level outages and link failures. In this paper, we present a framework to evaluate the resilience of a PMU network in the context of link failures. We model the PMU network as a connected graph and link failures as edges being removed from the graph. Our approach, inspired by model checking methods, involves exhaustively checking the reachability of PMU nodes to PDC nodes, for all possible combinations of link failures, given an expected number of links fail simultaneously. Using the IEEE 14-bus system, we illustrate the construction of the graph model and the solution design. Finally, a comparative evaluation on how adding redundant links to the network improves the Power System Observability, is performed on the IEEE 118 bus-system.
{"title":"A Framework to Evaluate PMU Networks for Resiliency Under Network Failure Conditions","authors":"Reuben Samson Raj, Dong Jin","doi":"10.1109/SmartGridComm52983.2022.9961035","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961035","url":null,"abstract":"Phasor Measurement Units (PMU), due to their capability for providing highly precise and time-synchronized measurements of synchrophasors, have now become indispensable in wide area monitoring of power-grid systems. Successful and reliable delivery of synchrophasor packets from the PMUs to the Phasor Data Concentrators (PDCs) and beyond, requires a backbone communication network that is robust and resilient to failures. These networks are vulnerable to a range of failures that include cyber-attacks, system or device level outages and link failures. In this paper, we present a framework to evaluate the resilience of a PMU network in the context of link failures. We model the PMU network as a connected graph and link failures as edges being removed from the graph. Our approach, inspired by model checking methods, involves exhaustively checking the reachability of PMU nodes to PDC nodes, for all possible combinations of link failures, given an expected number of links fail simultaneously. Using the IEEE 14-bus system, we illustrate the construction of the graph model and the solution design. Finally, a comparative evaluation on how adding redundant links to the network improves the Power System Observability, is performed on the IEEE 118 bus-system.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132802342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961046
Seerin Ahmad, Bohyun Ahn, Taesic Kim, Jinchun Choi, Myungsuk Chae, Dongjun Han, D. Won
Distributed energy resource management system (DERMS) is a supervision system managing distributed energy resources (DERs) in a distribution system. However, the centralized DERMS has a potential risk of a single point of failure posed by cyber-attacks (e.g., denial of service attacks and ransomware attacks). This will cause visibility and control losses of the DER system. In this paper, blockchain (BC) technology is leveraged to enhance the resilience of DERMS by recovering the operation of a DER system during the DERMS outage. The proposed BC system is a governance platform for the DER system proving security and resilient control services on behalf of the DERMS until the availability of the DERMS is recovered. The feasibility of the proposed BC-integrated DERMS system toward a resilient DER system is validated by using a cyber-physical co-simulation testbed.
{"title":"Blockchain-Integrated Resilient Distributed Energy Resources Management System","authors":"Seerin Ahmad, Bohyun Ahn, Taesic Kim, Jinchun Choi, Myungsuk Chae, Dongjun Han, D. Won","doi":"10.1109/SmartGridComm52983.2022.9961046","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961046","url":null,"abstract":"Distributed energy resource management system (DERMS) is a supervision system managing distributed energy resources (DERs) in a distribution system. However, the centralized DERMS has a potential risk of a single point of failure posed by cyber-attacks (e.g., denial of service attacks and ransomware attacks). This will cause visibility and control losses of the DER system. In this paper, blockchain (BC) technology is leveraged to enhance the resilience of DERMS by recovering the operation of a DER system during the DERMS outage. The proposed BC system is a governance platform for the DER system proving security and resilient control services on behalf of the DERMS until the availability of the DERMS is recovered. The feasibility of the proposed BC-integrated DERMS system toward a resilient DER system is validated by using a cyber-physical co-simulation testbed.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961050
D. Nicol
We describe a method where a utility can anonymize network device configurations and upload them to a remote service provider who analyzes connectivity (oblivious to the anonymization) and returns the results in anonymized coordinates to the utility, where they are de-anonymized. The approach has application for sharing problematic configurations with vendors, for cloud-based services that analyze connectivity and detect problems, and for connectivity of the sort regulated by NERC-CIP requirements.
{"title":"Connectivity Preserving Anonymization of Smart Grid Network Configurations","authors":"D. Nicol","doi":"10.1109/SmartGridComm52983.2022.9961050","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961050","url":null,"abstract":"We describe a method where a utility can anonymize network device configurations and upload them to a remote service provider who analyzes connectivity (oblivious to the anonymization) and returns the results in anonymized coordinates to the utility, where they are de-anonymized. The approach has application for sharing problematic configurations with vendors, for cloud-based services that analyze connectivity and detect problems, and for connectivity of the sort regulated by NERC-CIP requirements.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-25DOI: 10.1109/SmartGridComm52983.2022.9961061
Ömer Sen, Florian Schmidtke, F. Carere, F. Santori, Andreas Ulbig, A. Monti
While the increasing penetration of information and communication technology into distribution grid brings numerous benefits, it also opens up a new threat landscape, particularly through cyberattacks. To provide a basis for countermeasures against such threats, this paper addresses the investigation of the impact and manifestations of cyberattacks on smart grids by replicating the power grid in a secure, isolated, and controlled laboratory environment as a cyber-physical twin. Currently, detecting intrusions by unauthorized third parties into the central monitoring and control system of grid operators, especially attacks within the grid perimeter, is a major challenge. The development and validation of methods to detect and prevent coordinated and timed attacks on electric power systems depends not only on the availability and quality of data from such attack scenarios, but also on suitable realistic investigation environments. However, to create a comprehensive investigation environment, a realistic representation of the study object is required to thoroughly investigate critical cyberattacks on grid operations and evaluate their impact on the power grid using real data. In this paper, we demonstrate our cyber-physical twin approach using a microgrid in the context of a cyberattack case study.
{"title":"Investigating the Cybersecurity of Smart Grids Based on Cyber-Physical Twin Approach","authors":"Ömer Sen, Florian Schmidtke, F. Carere, F. Santori, Andreas Ulbig, A. Monti","doi":"10.1109/SmartGridComm52983.2022.9961061","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961061","url":null,"abstract":"While the increasing penetration of information and communication technology into distribution grid brings numerous benefits, it also opens up a new threat landscape, particularly through cyberattacks. To provide a basis for countermeasures against such threats, this paper addresses the investigation of the impact and manifestations of cyberattacks on smart grids by replicating the power grid in a secure, isolated, and controlled laboratory environment as a cyber-physical twin. Currently, detecting intrusions by unauthorized third parties into the central monitoring and control system of grid operators, especially attacks within the grid perimeter, is a major challenge. The development and validation of methods to detect and prevent coordinated and timed attacks on electric power systems depends not only on the availability and quality of data from such attack scenarios, but also on suitable realistic investigation environments. However, to create a comprehensive investigation environment, a realistic representation of the study object is required to thoroughly investigate critical cyberattacks on grid operations and evaluate their impact on the power grid using real data. In this paper, we demonstrate our cyber-physical twin approach using a microgrid in the context of a cyberattack case study.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}