Faris Alotaibi, Hasan Ibrahim, Jaewon Kim, P. Enjeti
{"title":"一种检测光伏逆变器后电网中人攻击(MiTM)的方法","authors":"Faris Alotaibi, Hasan Ibrahim, Jaewon Kim, P. Enjeti","doi":"10.1109/COMPEL52896.2023.10221187","DOIUrl":null,"url":null,"abstract":"In this paper, a method to detect a man-in-the-middle attack (MiTM) on a grid following PV inverter is discussed. The control objective of the grid following inverter is to utilize the measurement data from the smart meter to supply the maximum available solar power at any given point to a residential load, while simultaneously preventing any reverse power flow to the grid. Now, a false data injection (FDI) attack is envisioned on the smart meter data (P and Q) communicated to the inverter by malicious actors. In such cases, the FDI can result in the inverter producing more power than the feeder load demand, resulting in reverse power flow into the grid, causing the system to disconnect. The proposed method superimposes a small randomly varying voltage with a unique signature termed as “watermark” into the input inverter DC link voltage and then checks the measurement data returned from the smart meter to contain the appropriate transformation of the secret watermark to detect any possible acts of FDI. A unique characteristic of our method is its ability to inject the watermark signal into the DC link, which is external to the PV inverter. This broadens its applicability to any commercial inverter setup. Communication protocols such as Modbus that could serve as attack points are reviewed. A Hardware-in-the-Loop (HIL) implementation reveals that the method effectively identifies FDI and unobservable FDI such as replay attacks. An experimental 3.5kW PV inverter is currently under test, with outcomes to be disclosed at a subsequent stage.","PeriodicalId":55233,"journal":{"name":"Compel-The International Journal for Computation and Mathematics in Electrical and Electronic Engineering","volume":"34 1","pages":"1-6"},"PeriodicalIF":1.0000,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Method to Detect Man in the Middle Attack (MiTM) on a Grid Following PV Inverter\",\"authors\":\"Faris Alotaibi, Hasan Ibrahim, Jaewon Kim, P. Enjeti\",\"doi\":\"10.1109/COMPEL52896.2023.10221187\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a method to detect a man-in-the-middle attack (MiTM) on a grid following PV inverter is discussed. The control objective of the grid following inverter is to utilize the measurement data from the smart meter to supply the maximum available solar power at any given point to a residential load, while simultaneously preventing any reverse power flow to the grid. Now, a false data injection (FDI) attack is envisioned on the smart meter data (P and Q) communicated to the inverter by malicious actors. In such cases, the FDI can result in the inverter producing more power than the feeder load demand, resulting in reverse power flow into the grid, causing the system to disconnect. The proposed method superimposes a small randomly varying voltage with a unique signature termed as “watermark” into the input inverter DC link voltage and then checks the measurement data returned from the smart meter to contain the appropriate transformation of the secret watermark to detect any possible acts of FDI. A unique characteristic of our method is its ability to inject the watermark signal into the DC link, which is external to the PV inverter. This broadens its applicability to any commercial inverter setup. Communication protocols such as Modbus that could serve as attack points are reviewed. A Hardware-in-the-Loop (HIL) implementation reveals that the method effectively identifies FDI and unobservable FDI such as replay attacks. An experimental 3.5kW PV inverter is currently under test, with outcomes to be disclosed at a subsequent stage.\",\"PeriodicalId\":55233,\"journal\":{\"name\":\"Compel-The International Journal for Computation and Mathematics in Electrical and Electronic Engineering\",\"volume\":\"34 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":1.0000,\"publicationDate\":\"2023-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Compel-The International Journal for Computation and Mathematics in Electrical and Electronic Engineering\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPEL52896.2023.10221187\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Compel-The International Journal for Computation and Mathematics in Electrical and Electronic Engineering","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1109/COMPEL52896.2023.10221187","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
A Method to Detect Man in the Middle Attack (MiTM) on a Grid Following PV Inverter
In this paper, a method to detect a man-in-the-middle attack (MiTM) on a grid following PV inverter is discussed. The control objective of the grid following inverter is to utilize the measurement data from the smart meter to supply the maximum available solar power at any given point to a residential load, while simultaneously preventing any reverse power flow to the grid. Now, a false data injection (FDI) attack is envisioned on the smart meter data (P and Q) communicated to the inverter by malicious actors. In such cases, the FDI can result in the inverter producing more power than the feeder load demand, resulting in reverse power flow into the grid, causing the system to disconnect. The proposed method superimposes a small randomly varying voltage with a unique signature termed as “watermark” into the input inverter DC link voltage and then checks the measurement data returned from the smart meter to contain the appropriate transformation of the secret watermark to detect any possible acts of FDI. A unique characteristic of our method is its ability to inject the watermark signal into the DC link, which is external to the PV inverter. This broadens its applicability to any commercial inverter setup. Communication protocols such as Modbus that could serve as attack points are reviewed. A Hardware-in-the-Loop (HIL) implementation reveals that the method effectively identifies FDI and unobservable FDI such as replay attacks. An experimental 3.5kW PV inverter is currently under test, with outcomes to be disclosed at a subsequent stage.
期刊介绍:
COMPEL exists for the discussion and dissemination of computational and analytical methods in electrical and electronic engineering. The main emphasis of papers should be on methods and new techniques, or the application of existing techniques in a novel way. Whilst papers with immediate application to particular engineering problems are welcome, so too are papers that form a basis for further development in the area of study. A double-blind review process ensures the content''s validity and relevance.