Vulnerabilities Threats and Impacts of False Data Injection Attacks in Smart Grids An Overview
Vulnerabilities Threats and Impacts of False Data Injection Attacks in Smart Grids An Overview
[email protected]
Abstract—The wide range of vulnerabilities and impacts of have not considered providing an in-depth analysis of these
False data injection attack (FDIA) makes it the most challenging impacts and their causing vulnerabilities and threats. This
cyber-physical security threat in smart grids. This paper
manuscript provides an in-depth analysis of the FDIA in
provides a detailed analysis of the various vulnerabilities,
threats, and impacts of FDIA in smart grids. Our work smart grid. It starts by analysing the different vulnerabilities
considers the different layers and systems in the smart grids and access points in the smart grid systems, it illustrates the
ranging from the local to the wide area monitoring and control possible threats, and it provides an investigational analysis of
applications. This work supplies a good insight of FDIA which possible scenarios, and quantifications of the impacts of
inspires the research and development of defense mechanisms.
FDIA including real-time simulations and financial risks.
Index Terms—Cyber-physical security, false data injection The rest of this manuscript is organized as follows:
attacks (FDIA), smart grids. section 2 introduces a smart grid model with its different
vulnerabilities, section 3 discusses the threats of the FDIA
I. INTRODUCTION with the different access points, section 4 provides a full
Smart Grids’ security has been compromised massively analysis of the FDIA’s impacts at different systems, and the
with the broad incorporation of the information and concluding remarks are drawn in section 5.
communication technologies (ICT). Cyber-physical attacks
resulted in 362 power interruption between 2011 and 2014 as II. SMART GRIDS’ VULNERABILITIES TOWARDS FDIA
reported by the US Department of Energy [1]. Hackers took Smart grids represent a complicated connection of many
down 200MW of the grid capacity of Kiev in 2016 [2]. The systems that work together in harmonious manner. Figure 1
substantial impacts of these events steered the worldwide illustrates an overview of smart grids with its various
governments to acknowledge these evolving threats. The operations, control, measurements, communication, and
National Institute of Standards and Technology (NIST) security systems. These systems could be divided according
released a three-volume report to outline the fundamental to the different layers such as the generation, transmission,
regulations for the smart grids’ cyber security in 2014 [3]. distribution, consumption, centralized monitoring and
Even though cyber-physical attacks differ massively, control, and markets operations. The applications along these
False Data Injection Attack (FDIA) do pose great challenge different layers vary in their nature greatly. While protection
for its wide impacts and its complexity to identify as and automatic voltage control have a response rate of
instructed by NIST [3]. This kind of attacks is relevant to the milliseconds to few seconds, some centralized and markets
various types of layers and systems in smart grids resulting in operations have an update rate of minuets, hours, and more
different risks associated with these attacks which could be than days. However, all these applications do complement
conceptualized as ܴ݅ ݇ݏൌ ܸݐܿܽ݉ܫ כ ݐܽ݁ݎ݄ܶ כ ݕݐ݈ܾ݅݅ܽݎ݈݁݊ݑ. each other via their interdependencies upon each other.
Thus, in order to evaluate the risks of FDIA in smart grids, These interdependencies are the reason for having many
we must first analyse the vulnerabilities, threats, and impacts communication links between the different layers. These are
associated with the FDIA applied at the different systems in realized via optical fibers, serial links, cellular, satellite,
smart grids. Zigbee, Wi-Fi, etc… [7]. To govern the regulations for
To further realize and understand the effect of FDIA in utilizing these different communication links in smart grids,
smart grids, numerous research endeavours have been made. several standards have been developed for defining the
An advanced review of the recent cyber-physical security communication protocols such as IEC 61850 for electrical
concerns in smart grids was presented in [4]. In a similar substations, IEC 61968 for distribution management [8],
generalized point of view, authors of [5] and [6] provided IEEE 1888.4 for home and residential quarters [9], IEC
summarized reviews of the FDIA types and detection 60870 for telecontrol messages [10], IEEE Std C37.118-2™-
approaches in smart grids with predicted futuristic challenges 2011 for phasor measurement units [11], IEEE 802.15.4g for
to be encountered in this field. Despite these studies provided smart metering utility networks [12], and IEC 62746 for
an interesting analysis of FDIA’s impacts in smart grids, they
This paper is partially supported by UNSW Digital Grid Futures Institute
Seed Grant.
78
Authorized licensed use limited to: University of New South Wales. Downloaded on June 05,2024 at 05:10:58 UTC from IEEE Xplore. Restrictions apply.
7 8 9
FDIAs in Smart Grids Area 1
3
Area 2
1 5 6 10 11
79
Authorized licensed use limited to: University of New South Wales. Downloaded on June 05,2024 at 05:10:58 UTC from IEEE Xplore. Restrictions apply.
1.1
0.8
0.7
0.8
0.6
0.4
80
Authorized licensed use limited to: University of New South Wales. Downloaded on June 05,2024 at 05:10:58 UTC from IEEE Xplore. Restrictions apply.
38
V. CONCLUSION
36 FDIA from 13:00 to 14:00 Different types of vulnerabilities, threats, and impacts
34
have been analysed in this manuscript including centralized
32
operations and control systems, control systems, protection
30
28
systems, and market operations. A common result of
26
deregulating the grid stability is noted along with serious
Ahead LMP Bus#7 Real-Time LMP Bus#7
24 Ahead LMP Bus#9 Real-Time LMP Bus#9 economic losses. It must be noted that the impacts in this
00:00 05:00 10:00 15:00 20:00 manuscript are merely samples of the different infinite
Time (Hours)
Figure 7. Locational Marginal Pricing at buses 7 and 9 (ahead and real-time) possibilities of FDIA in smart grid. This shall trigger the
alarm to researching innovative detection techniques to
economic losses for sure, yet they are not planned for pure overcome these different threats.
economic purposes. The truth is that the majority of FDIA are
being applied for economic agenda as money matters the REFERENCES
most. In deregulated electrical energy markets, nodal pricing
(also known as the Locational Marginal Pricing (LMP)) of [1] S. Toppa, “The National Power Grid Is Under Almost Continuous
the electric energy in the grid is determined by the Regional Attack, Report Says,” Time.com, 25 March 2015. [Online]. Available:
https://bit.ly/1FH246I. [Accessed 29 March 2019].
Transmission Organizations (RTO) such the Independent
[2] J. Condliffe, “Ukraine's Power Grid Gets Hacked Again, a Worrying
System Operators (ISO) New England in UK, and the
Sign for Infrastructure Attacks,” MIT Technology Review, 2016.
Australian Energy Market Operator (AEMO) in Australia.
[3] “Guidelines for Smart Grid Cybersecurity,” National Institute of
LMP at a node in the network is the marginal cost to the RTO Standards and Technology, 2014.
of delivering an additional unit of energy to that node. LMP- [4] C.-C. Suna, A. Hahna and C.-C. Liu, “Cyber security of a power grid:
based electricity trading involves two main steps: 1) State-of-the-art,” International Journal of Electrical Power & Energy
finalizing of the bidding and the financial settlement based on Systems, vol. 99, pp. 45-56, 2018.
the forecasted LMP, and 2) real time LMP based trading. The [5] Z. ElMrabet, N. Kaabouch, H. ElGhazi and H. ElGhazi, “Cyber-
revenue resulted from this trading is calculated as security in smart grid: Survey and challenges,” Computers &
Electrical Engineering, vol. 67, pp. 469-482, 2018.
ܴ݁݁ݑ݊݁ݒሺ̈́ሻ ൌ ܲܯܮሺ̈́Ȁ݄ܹܯሻ ݕ݃ݎ݁݊ܧ כሺ݄ܹܯሻ. While the
[6] A. S. Musleh, G. Chen and Z. Y. Dong, “A Survey on the Detection
forecasted and real-time supplies and demands are closely
Algorithms for False Data Injection Attacks in Smart Grids,” IEEE
equal, still some variations do exist (especially with Transactions on Smart Grid, vol. 11, no. 3, pp. 2218 - 2234, 2020.
renewable energy resources). However, these small [7] M. Faheem, S. B. H. Shah, R. A. Butt, B. Raza, M. Anwar, M. Ashraf,
variations mean lots of profits/losses for the wholesale M. Njadi and V. C. Gungor, “Smart grid communication and
retailers. While the market operations are performed via the information technologies in the perspective of Industry 4.0:
Market Management System (MMS), all the supporting grid Opportunities and challenges,” Computer Science Review, vol. 30, pp.
1-30, 2018.
measurements are being supplied via the Energy
[8] “Core IEC Standards for Smart Grids,” International Electrotechnical
Management System (EMS). FDIA applied on the power Commission (IEC), 2019. [Online]. Available:
flow data supplied to the MMS represents a real threat [20]. https://www.iec.ch/smartgrid/standards/. [Accessed 3 June 2019].
The main reasons for the LMP differences in the grid are [9] “IEEE 1888.4-2016 - IEEE Standard for Green Smart Home and
the transmission congestion and the generation cost between Residential Quarter Control Network Protocol,” IEEE Standards
and at the different nodes. Thus, with no transmission Association, 16 June 2017. [Online]. Available:
https://standards.ieee.org/standard/1888_4-2016.html. [Accessed 3
congestion and generation cost differences, LMP shall be the June 2019].
same at all the nodes in the grid. In Figure 7, it is assumed
[10] “IEC 60870-5:2018 SER,” International Electrotechnical
that the ahead bidding of LMP at buses 7 and 9 are 30$/MWh Commission, 20 February 2018. [Online]. Available:
and 33$/MWh, respectively during the peak period. This https://webstore.iec.ch/publication/3755. [Accessed 2 June 2019].
change is assumed to be from the energy transmitted from [11] “C37.118.2-2011 - IEEE Standard for Synchrophasor Data Transfer
area 1 to area 2. Under normal conditions, the real time LMP for Power Systems,” IEEE Standards Association, 2011.
would be the same or very close to the forecasted LMP. FDIA [12] “IEEE 802.15.4g-2012 - IEEE Standard for Smart Metering Utility
on the power flow measurements used for the real time LMP Networks,” IEEE Standards Association , 29 March 2012. [Online].
Available: https://standards.ieee.org/standard/802_15_4g-2012.html.
resulting in increasing the LMP price at bus 9 to be slightly [Accessed 3 June 2019].
above 36$/MWh from 13:00 to 14:00. Thus, the attacker buys [13] “IEC 62746-10-1:2018,” International Electrotechnical Commission,
with the forecasted LMP price of 33$/MWh to sell later with 19 November 2018. [Online]. Available:
the real time LMP price of 36$/MWh. Given a bidding https://webstore.iec.ch/publication/26267. [Accessed 3 June 2019].
interval of 1 hour with a total energy demand of 2000MWh [14] “IEEE Standards Activities in the Smart Grid Space (ICT,” IEEE
during this period, this FDIA results in a total economic loss Standards Association, 2018.
of $6,000 in a single hour. The same scenario is applicable [15] “P2900 - Standard for Smart Home Security: Overview and
Architecture,” IEEE Standards Association, 15 June 2017. [Online].
when ahead LMP is manipulated to reduce the price when the
Available: https://standards.ieee.org/project/2900.html. [Accessed 2
attacker is buying or increase it when the attacker is selling. June 2019].
81
Authorized licensed use limited to: University of New South Wales. Downloaded on June 05,2024 at 05:10:58 UTC from IEEE Xplore. Restrictions apply.
[16] C. Konstantinou and M. Maniatakos, “Hardware-Layer Intelligence
Collection for Smart Grid Embedded Systems,” Journal of Hardware
and Systems Security, vol. 3, no. 2, p. 132–146, 2019.
[17] P. Kundur, Power system stability and control, McGraw-hill, 1994.
[18] H. Miller, J. Burger, N. Fischer and B. Kasztenny, “Modern line
current differential protection solutions,” in 63rd Annual Conference
for Protective Relay Engineers, 2010.
[19] A. Derviškadiü, Y. Zuo, G. Frigo and M. Paolone, “Under Frequency
Load Shedding based on PMU Estimates of Frequency and ROCOF,”
in IEEE PES Innovative Smart Grid Technologies Conference Europe
(ISGT-Europe), 2018.
[20] G. Liang, S. R. Weller, F. Luo, J. Zhao and Z. Y. Dong, “Generalized
FDIA-Based Cyber Topology Attack With Application to the
Australian Electricity Market Trading Mechanism,” IEEE
Transactions on Smart Grid, vol. 9, no. 4, pp. 3820 - 3829, 2018.
[21] A. S. Musleh, A. Al-Durra and M. A. Khousa, “Measurement and
Sensing Devices for Smart Grid,” in Communication, Control and
Security Challenges for the Smart Grid, IET, 2017, pp. 93-126.
[22] “NIST Framework and Roadmap for Smart Grid Interoperability
Standards, Release 3.0,” National Institute of Standards and
Technology, 2014.
[23] M. Paparo, “Roadmap for Standards and Grid Cyber Security,”
Energy Networks Australia, 2018.
82
Authorized licensed use limited to: University of New South Wales. Downloaded on June 05,2024 at 05:10:58 UTC from IEEE Xplore. Restrictions apply.