Impact of Cyber-Security Issues On Smart Grid
Impact of Cyber-Security Issues On Smart Grid
From published cyber-security incidents, it is apparent that compromise the Smart Grid are as follows:
the electric power industry has been and is susceptible to 1) DoS/DDoS: DoS or DDoS attacks attempt to delay,
potential cyber-security threats. Therefore, timely research on obstruct or damage information transmission and exchange
cyber-security issues for the Smart Grid is highly relevant, between nodes in a Smart Grid. These malicious attacks can
immediate and a particularly significant engineering task. decrease the availability of systems. The Smart Grid will
partly, if not fully, utilize IP-based protocols (e.g., IEC 61850
C. Outline
has already use TCP/IP as a part of its protocol stacks) and
The remaining parts of this paper are organized as follows: TCP/IP is vulnerable to DoS/DDoS attacks, so highly
Section II introduces general aspects of Smart Grid cyber- developed countermeasures to these attacks are indispensable
security including cyber-security requirements, typical cyber to the Smart Grid.
attacks and countermeasures. Section III is related work for 2) Malicious Software: Malicious software is also referred
several critical aspects of Smart Grid cyber-security, such as to generally as malware. General types of malware contain
vulnerability, interdependency, simulation, and standards. viruses, worms, Trojan horses, logic bombs, and backdoors or
Section IV describes a preliminary study on the impact of a trapdoors [7]. Malware attacks may directly or indirectly
cyber attack on load management in real power system. decrease or compromise the availability, integrity or
Finally, future work is proposed at the end of the paper confidentiality of cyber infrastructure. Logic bombs and
focusing on developing intrusion detection approaches to backdoors or trapdoors in particular are deliberately embedded
mitigate cyber-security issues in the Smart Grid. into programs by program developers which may be utilized to
launch attacks later.
II. GENERAL ASPECTS OF SMART GRID CYBER-SECURITY 3) Identity Spoofing: Identity spoofing attacks allow
A. Cyber-Security Requirements attackers to impersonate an authorized user without using the
The US National Institute of Standards and Technology user’s passwords. Common identity spoofing attacks consist
(NIST) propose three main cyber-security requirements for the of man-in-the-middle attacks, message replays, network
Smart Grid in [6]: availability, integrity and confidentiality. spoofing (for example IP spoofing), and software exploitation
1) Availability: This requirement refers to ensuring timely attacks [7].
and reliable access to or use of information to authorized users. 4) Password Pilfering: Password pilfering attacks refer to a
In terms of the Smart Grid, this relates to all cyber systems, violation of confidentiality. The common methods for
for example SCADA, distributed control centres and pilfering user passwords contain guessing, social engineering,
distribution management system (DMS), as well as the dictionary attacks, and password sniffing. Social engineering
communication networks between these systems and external in particular is a method of attacking or penetrating a system
networks. A loss of availability, such as denial-of-service using social skills (for example psychological measures),
(DoS) and distributed DoS (DDoS), may not only lead to rather than by technical attacks [7].
economic losses but also result in security problems, for 5) Eavesdropping: The aim of the attacker is to
example blackout or brownout, as operators may lose the compromise the confidentiality of the communication in the
ability to monitor and control the systems. Thus, availability is Smart Grid, typically sniffing IP packets on the local area
generally considered as the most significant cyber security network (LAN) or intercepting wireless transmissions on the
requirement in the Smart Grid. home area network (HAN) in the Smart Grid [8].
2) Integrity: This requirement refers to guarding against 6) Intrusion: Intrusion means that an illegitimate user gets
undetected information modification or destruction by access to a cyber system and obtains the ability to control
unauthorized persons or systems including ensuring data non- aspects of the behaviour of the system at will, including the
repudiation and authenticity. Integrity for Smart Grids applies ability to violate confidentiality and integrity requirements [8].
to information such as sensor values and control commands. A IP scans and port scans are common hacking tools to realize
lack of integrity leads to deception which may cause safety intrusion attacks [7].
issues, for example during a potential situation operator 7) Side-Channel Attacks: A side-channel attack exploits
judgment may be compromised by unreliable data. information gained from the implementation of a cryptosystem
3) Confidentiality: This requirement refers to preventing in order to infer the cryptographic key [9]. Common side-
disclosure of secret information to unauthorized users. From a channel attacks include power analysis attacks [10],
Smart Grid perspective, this refers to privacy of customer electromagnetic analysis attacks [11] and timing attacks [12].
information, electric market data and critical enterprises Smart Grid equipment in the field, such as substation devices,
information. Violation of confidentiality results from pole-top equipment, smart meters and in-house devices, are
disclosure of private information. With the increasing vulnerable to side-channel attacks which could result in
accessibility of customer information on the internet, compromise of customer privacy, usage information and
confidentiality is becoming more and more significant. passwords, and even allow attackers to potentially obtain
administrative access to Smart Grid systems [6].
B. Typical Cyber Attacks
C. Countermeasures and Management
An intentional violation of a cyber-security requirement is
called an attack. Some typical cyber attacks which may In response to the aforementioned cyber-security
requirements and typical cyber attacks, the International
3
Electro-technical Council (IEC) TC57 WG15 [31] have situation, for example the US Idaho National Lab SCADA test
proposed a set of appropriate countermeasures. bed [21].
Technical solutions include encryption, access control, In addition, the European 6th Framework Program (FP6)
antivirus or spyware, firewall, virtual private network (VPN), project ‘Critical Utility Infrastructure Resilience’ (CRUTIAL)
intrusion detection system (IDS), application of security [22] set up a tele-control and micro-grid test beds to collect
standards (IEC 62351 in particular), etc. data statistics and evaluate malicious attacks in grid tele-
From a security management viewpoint, solutions include operation and micro grid control scenarios.
key management, risk assessment of assets, during-attack Furthermore, researchers from the University of Arizona in
coping and post-attack recovery, security policy exchange, US [23] develop a test bed to analyse the security of SCADA
security incident and vulnerability reporting, etc. control systems (TASSCA) which consists of three software
tools: i) The OPNET tool simulating the communication
III. RELATED WORK network; ii) The PowerWorld tool, which simulates electrical
Increasingly, academic and industrial related organisations power grid operation; and iii) An Autonomic Software
are focusing on cyber-security issues in the Smart Grid. Protection System (ASPS) which detects cyber attacks in
However, cross-disciplinary research connecting SCADA systems. The test bed adopted a TCP, Modbus and
developments in power systems and IT is still at an early distributed network protocol (DNP3) protocol analyser to
stage. In this section, relevant published literature in the detect SCADA attack anomalies, for example protocol state
critical areas required by Smart Grid cyber-security is transition analysis.
surveyed and summarized. Other researchers have tried to exploit the coupled power
grid communication network simulator based on software
A. Vulnerability and Risk Assessment agents or application program interface (API) methods [24]-
According to a European research roadmap of cyber- [26] using commercial-off-the-shelf (COTS) simulation tools,
security for critical infrastructures, including Smart Grids, the such as MATLAB, PSCAD/EMTDC, OpenDSS (EPRI),
initial step in assessment is vulnerability evaluation and risk PSSTMNETOMAC (SIEMENS), NS2/3, OPNET and
evaluation, especially for the next 3-5 years. A number of OMNET++.
academic related organisations are targeting this particular From published work and the above examples it is known
topic. For instance, Chen-Ching Liu et al have applied attack that authentic simulation and accurate test beds are effective
trees and Petri nets to quantify vulnerability assessment in tools for Smart Grid cyber-security research. However,
terms of SCADA systems in the electric industry and comprehensive and well-developed tools require significant
developed several software tools for cyber-security effort to fully develop but are often propriety, hence limited
vulnerabilities like PENET [13]-[16]. However, it is a open simulation and test bed resources are available to the
complex progress due to interdependencies between cyber wider research community. Thus the formulation of an open
networks and power systems. In addition, there is a lack of cyber-security framework for Smart Grid technologies is one
practical statistical and historical data. particular focus of this work.
B. Interdependency and Interaction D. Standards, Regulations and Protocols
A better understanding of interdependency and interaction Recently, many institutions have paid much attention to
between the cyber and physical infrastructure is highly Smart Grid cyber-security such as NIST, the North American
beneficial for cross-disciplinary research, particularly for Electric Reliability Corporation-Critical Infrastructure
cyber-security issues in the Smart Grid. Protection (NERC-CIP) and the IEEE. Some guidelines,
At present there are many modelling and simulation roadmaps, technological requirements and standards have
methods [17]-[19] for assessment of interdependency and been developed. For instance, the NIST has identified five
interaction of critical infrastructures such as cyber foundation Smart Grid standards: IEC 61968, IEC61970, IEC
infrastructures and power systems. 61850, IEC 60870-6 and IEC 62351; the IEC also
In terms of modelling and simulation of complex recommends five similar standards as a core requirement for
infrastructures, there are mainly microscopic and macroscopic the Smart Grid using IEC 62357 instead of IEC 60870-6. The
approaches. At a microscopic level, small sections of the standard IEC 62351 is specially designed for cyber-security in
infrastructure are modelled, though low-level models may fail Smart Grid with the purpose of undertaking the development
to see the larger picture; at a macroscopic level, a holistic of standards for security of communication protocols defined
system is modelled using high level abstractions, however it by IEC TC 57; specifically IEC 60870-5, IEC 60870-6, IEC
may sometimes result in certain improper abstractions [20]. In 61850, IEC 61970, and IEC 61968.
practice, a bottom-up modelling approach is a preferable Additionally, there are mainly three regulations focusing on
approach to model cyber-security issues in the Smart Grid Smart Grid cyber-security:
combining both microscopic and macroscopic approaches. 1) NERC CIPs: The NERC-CIP cyber security standards
[27] cover cyber-security protection of the most critical
C. Simulation and Test Bed
electrical generation and transmission assets that control or
One approach to attain practical data is to build a affect the reliability of North America’s bulk electric systems
comparatively simple simulation which can approximate a real (BES).
4
control centre can send a control signal to a corresponding Fig.3. System frequency with the biases of -0.4MW and 0.2MW
circuit breaker to realise load management as a technical part
of demand side management (DSM) in the Smart Grid. To frequency: 50HZ; Synchronous machine G: PN=1.0MW,
avoid single generator power system instability, breaker B2 VN=11kV, Xd=1.305, Xd’=0.296, Xd”=0.252, Xq=0.474,
and B3 can drop the load at required times when an individual Xq”=0.243, Xl=0.18, Td’=1.01s, Td”=0.053s, Tq0”=0.1s, H=3.2s;
or combined load demand exceeds generation capability. All Three-phrase transformer T: PN=1.0MW, V1=11kV,
sensor signals will be uploaded to the control centre for V2=0.4kV; Three-phase series RL branch (L1-L3):
decision-making. If some of the sensor signals are affected by r1=r2=r3=0.001Ω and l1=l2=l3=0.000027H; Two three-phase
cyber attacks, data integrity has been breached and the system series RLC loads Z1 and Z2: VN=0.4kV, P1=0.8MW,
is therefore vulnerable and insecure for the reliable control of P2=0.5MW.
the power distribution system. Detailed simulation parameters In this example, sensor S2 is biased for cyber tampering.
are as follows: Here, the cyber model is: S2(t)=P2(t)+§2(t), where S2(t) is the
Simulation time: 0-10s; Simulation solver: discrete (fixed- attacked sensor information, P2(t) is the true power of sensor
step); Sample time: 0.00001s; Single generator system S2 and §2(t) is a bias representing a cyber attack.
5
loosely based on the approach in Fig. 4 will involve a hybrid [11] K. Gandolfi, C. Mourtel, and F. Olivier, “Electromagnetic analysis:
Concrete results,” in Proc. 2001 the Third International Workshop on
intrusion detection scheme including policy-based detection to Cryptographic Hardware and Embedded Systems, pp. 251-261.
render greater Smart Grid security. A simulation test bed will [12] P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA,
be constructed as part of this work to evaluate and validate DSS, and other systems,” in Proc. Crypto, 1996, pp. 104-113.
[13] T. Chee-Wooi, L. Chen-Ching, and M. Govindarasu, "Vulnerability
each of the proposed solutions. Assessment of Cybersecurity for SCADA Systems Using Attack Trees,"
in Proc. 2007 IEEE Power Engineering Society General Meeting, pp.1-8.
VI. CONCLUSION [14] Chee-Wooi, T., L. Chen-Ching, and G. Manimaran, "Vulnerability
Assessment of Cybersecurity for SCADA Systems." IEEE Trans. Power
With the development and deployment of new Smart Grid Systems, vol. 23, pp.1836-1846, Nov. 2008.
technology it is apparent that greater investment in state-of- [15] Srdjan Pudar, G. Manimaran and Chen-Ching Liu, "PENET: A practical
the-art IT technologies will be a direct consequence. method and tool for integrated modeling of security attacks and
countermeasures," Computers & Security, vol. 28, pp. 754-771, May
According to reported cyber-security incidents and published 2009.
literature, it is clear that a large number of potential cyber- [16] T. Chee-Wooi, G. Manimaran, and L. Chen-Ching, "Cybersecurity for
security issues are increasingly probable on systems as Critical Infrastructures: Attack and Defense Modeling," IEEE Trans.
Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 40,
complex and diverse as the emerging Smart Grid. This paper pp. 853-865, Jul. 2010.
has provided an overview of prevalent issues in the Smart [17] D. Kundur, X. Feng, S. Liu, T. Zourntos, and K. L. Butler-Purry,
Grid. The paper has also presented a preliminary study case "Towards a Framework for Cyber Attack Impact Analysis of the Electric
Smart Grid," in Proc. 2010 First IEEE International Conf. on Smart
that illustrates the influence of a simple cyber attack which Grid Communication, pp. 244-249.
compromised the integrity of power supply data. From the [18] D. Kundur, X. F., S. Mashayekh, S. Liu, T. Zourntos, K.L. Butler-Purry,
simulation results, it is inferred that cyber-security issues can "Towards modelling the impact of cyber attacks on a smart grid,"
International Journal of Security and Networks, vol. 6, pp. 2-13, Apr.
influence and compromise secure and steady operation of the 2011.
Smart Grid. Therefore, cyber-security issues in the Smart Grid [19] B. Rozel, M. Viziteu, R. Caire, N. Hadjsaid, and J. P. Rognon, "Towards
are of immediate and significant interest, therefore robust and a common model for studying critical infrastructure interdependencies,"
in Proc. 2008 IEEE Power and Energy Society General Meeting -
timely technical solutions are of pertinent value to the relevant
Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1-
research communities. One critical aspect of Smart Grid 6.
cyber-security research is ensuring sufficient cross- [20] T. Rigole and G. Deconinck, "A survey on modeling and simulation of
disciplinary engagement to formulate optimum approaches interdependent critical infrastructures," in Proc. 3rd IEEE Benelux
Young Researchers Symposium in Electrical Power Engineering, 2006,
and methods. The research reported in this paper is ongoing pp. 27-28.
and forms one part of a broader portfolio of work by the [21] W. Dong, L. Yan, M. Jafari, P. Skare, and K. Rohde, "An integrated
authors. security system of protecting Smart Grid against cyber attacks," in Proc.
2010 Innovative Smart Grid Technologies (ISGT), pp. 1-7.
[22] G. Dondossola, G. Garrone, J. Szanto, G. Deconinck, T. Loix, and H.
VII. REFERENCES Beitollahi, "ICT resilience of power control systems: experimental
results from the CRUTIAL testbeds," in Proc. 2009 IEEE/IFIP
[1] Don Von Dollen. (2009, Jun.). Report to NIST on Smart Grid
International Conf. on Dependable Systems & Networks, pp. 554-559.
Interoperability Standards Roadmap, Electric Power Research Institute
[23] M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, "A
(EPRI), Palo Alto, CA. [Online]. Available:
testbed for analyzing security of SCADA control systems (TASSCS),"
http://www.smartgridnews.com/artman/uploads/1/InterimSmartGridRoa
in Proc. 2011 IEEE/PES Innovative Smart Grid Technologies (ISGT),
dmapNISTRestructure.pdf
pp. 1-7.
[2] K. Poulsen. (2003, Aug.) Slammer worm crashed Ohio nuke plant net.
[24] J. Bergmann, C. Glomb, J. Gotz, J. Heuer, R. Kuntschke, and M. Winter,
[Online]. Available: http://www.securityfocus.com/news/6767.
"Scalability of Smart Grid Protocols: Protocols and Their Simulative
[3] U.S. Nuclear Regulatory Commission. (2003) NRC Information Notice
Evaluation for Massively Distributed DERs," in Proc. 2010 First IEEE
2003-14. [Online]. Available: http://www.nrc.gov/reading-rm/doc-
International Conf. on Smart Grid Communication, pp. 131-136.
collections/gen-comm/infonotices/2003/in200 314.pdf
[25] T. Godfrey, S. Mullen, D. W. Griffith, N. Golmie, R. C. Dugan, and C.
[4] Brian Krebs. (2008, Jun.) Cyber Incident Blamed for Nuclear Power
Rodine, "Modeling Smart Grid Applications with Co-Simulation," in
Plant Shutdown [Online]. Available: http://www.washingtonpost.com
Proc. 2010 First IEEE International Conf. on Smart Grid
/wp-dyn/content/article/2008/06/05/AR2008060501958.html.
Communication, pp. 291-296.
[5] Antiy CERT. (2010, Sep.). Report on the Worm Stuxnet's Attack. Antiy
[26] K. Hopkinson, X. Wang, R. Giovanini, J. Thorp, K. Birman, and D.
Corp., Harbin, China. [Online]. Available:
Coury, "EPOCHS: a platform for agent-based electric power and
http://www.antiy.net/en/analysts/Report_On_the_Attacking_of_Worm_
communication simulation built from commercial off-the-shelf
Struxnet_by_antiy_labs.pdf
components," IEEE Trans. Power Systems, vol. 21, pp. 548-558, May.
[6] The Smart Grid Interoperability Panel–Cyber Security Working Group.
2006.
(2010, Oct.). Guidelines for Smart Grid Cyber Security. NIST,
[27] NERC CIP Cyber Security Standards, NERC Reliability Standards: CIP,
Gaithersburg, MD. [Online]. Available:
Feb. 2011.
http://csrc.nist.gov/publications/PubsNISTIRs.html
[28] NIST. (2009, Aug.). NIST Special Publication 800-53 Revision 3:
[7] Jie Wang, Computer Network Security. Beijing: Higher Education Press
Recommended Security Controls for Federal Information Systems and
and New York: Springer Berlin Heidelberg, 2009, p. 3-24.
Organizations. NIST, Gaithersburg, MD. [Online]. Available:
[8] D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for
http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-
Industrial Communication Systems," Proceedings of the IEEE, vol. 93,
final.pdf
pp. 1152-1177, Jun. 2005.
[29] NERC. (2011, May). 2012 NERC Business Plan and Budget - DRAFT 1.
[9] N. R. Potlapally, A. Raghunathan, S. Ravi, Niraj K. Jha, and Ruby B.
NERC, Princeton, NJ. [Online]. Available: http://www.nerc.com/
Lee, “Aiding Side-Channel Attacks on Cryptographic Software With
filez/business_plan_2012.html
Satisfiability-Based Analysis,” IEEE Trans. Very Large Scale [30] S. Rohjans, M. Uslar, R. Bleiker, J. Gonzalez, M. Specht, T. Suding, and
Integration (VLSI) Systems, vol. 15, pp. 465-470, Apr. 2007.
T. Weidelt, "Survey of Smart Grid Standardization Studies and
[10] T. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart-card
Recommendations," in Proc. 2010 First IEEE International Conf. on
security under the threat of power analysis attacks,” IEEE Trans. Smart Grid Communication, pp. 583-588.
Computer, vol. 51, pp. 541-552, May 2002.
7
[31] F. Cleveland, "IEC TC57 Security Standards for the Power System's
Information Infrastructure - Beyond Simple Encryption," in Proc.
2005/2006 IEEE PES Transmission and Distribution Conf. and Exhibit.,
pp. 1079-1087.
[32] Joseph Weiss, Protecting industrial control systems from electronic
threats. New York: Momentum Press, 2010, p. 29-41.
[33] Ali A. Ghorbani, Wei Lu, and Mahbod Tavallaee, Network Intrusion
Detection and Prevention: concepts and techniques. London: Springer,
2010, p. 27-49.
[34] R. Berthier, W. H. Sanders, and H. Khurana, "Intrusion Detection for
Advanced Metering Infrastructures: Requirements and Architectural
Directions," in Proc. 2010 First IEEE International Conf. on Smart Grid
Communication, pp. 350-355.
[35] J. Verba and M. Milvich, "Idaho National Laboratory Supervisory
Control and Data Acquisition Intrusion Detection System (SCADA
IDS)," in Proc. 2008 IEEE Conf. on Technologies for Homeland
Security, pp. 469-473.
[36] I. N. Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta, and M.
Masera, "Modbus/DNP3 State-Based Intrusion Detection System," in
Proc. 2010 24th IEEE International Conf. on Advanced Information
Networking and Applications (AINA), pp. 729-736.
[37] A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A.
Trombetta, "A Multidimensional Critical State Analysis for Detecting
Intrusions in SCADA Systems," IEEE Trans. Industrial Informatics, vol.
7, pp. 179-186, May. 2011.
[38] S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A.
Valdes, "Using model-based intrusion detection for SCADA networks,"
in Proc. 2007 the SCADA Security Scientific Symposium, pp. 127–134.
[39] U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh, and T. Jian-
Cheng, "An Intrusion Detection System for IEC61850 Automated
Substations," IEEE Trans Power Delivery, vol. 25, pp. 2376-2383, Oct.
2010.
[40] O. Linda, T. Vollmer, and M. Manic, "Neural Network based Intrusion
Detection System for critical infrastructures," in Proc. 2009
International Joint Conf. on Neural Networks (IJCNN), pp. 1827-1834.
[41] M. P. Coutinho, G. Lambert-Torres, L. E. B. da Silva, H. G. Martins, H.
Lazarek, and J. C. Neto, "Anomaly detection in power system control
center critical infrastructures using rough classification algorithm," in
Proc. 2009 3rd IEEE International Conf. on Digital Ecosystems and
Technologies, pp. 733-738.
[42] J. Zimmermann, L. Me, and C. Bidan, "An improved reference flow
control model for policy-based intrusion detection," in Proc. Computer
Security, ESORICS 2003, pp. 291-308.