{"title":"针对网络攻击的简单鲁棒线路电流差动保护","authors":"Mohamed E. Kotb, A. M. Saber, T. Boghdady","doi":"10.1109/MEPCON55441.2022.10021802","DOIUrl":null,"url":null,"abstract":"Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.","PeriodicalId":174878,"journal":{"name":"2022 23rd International Middle East Power Systems Conference (MEPCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Simple Robust Line Current Differential Protection Against Cyberattacks\",\"authors\":\"Mohamed E. Kotb, A. M. Saber, T. Boghdady\",\"doi\":\"10.1109/MEPCON55441.2022.10021802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.\",\"PeriodicalId\":174878,\"journal\":{\"name\":\"2022 23rd International Middle East Power Systems Conference (MEPCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 23rd International Middle East Power Systems Conference (MEPCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MEPCON55441.2022.10021802\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 23rd International Middle East Power Systems Conference (MEPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MEPCON55441.2022.10021802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Simple Robust Line Current Differential Protection Against Cyberattacks
Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.