ABSTRACT
The increasing penetration level of distributed energy resources (DERs) substantially expands the attack surface of the modern power grid. By compromising DERs, adversaries are capable of destabilizing the grid and potentially causing large-area blackouts. Due to the limited administrative control over DERs, constrained computational capabilities, and possible physical accesses to DERs, current device level defenses are insufficient to defend against malicious attacks on DERs. To compensate the shortcomings of device level defenses, in this paper, we develop a system-level risk-aware DER management framework (RADM) to mitigate the attack impacts. We propose a metric, trust score, to dynamically evaluate the trustworthiness of DERs. The trust scores are initialized with offline trust scores derived from static information and then regularly updated with online trust scores derived from a physics-guided Gaussian Process Regressor using real-time data. The trust scores are integrated into the grid control decision making process by balancing the grid performance and the security risks. Extensive simulations are conducted to justify the effectiveness of the proposed method.
- 2015. IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems. IEEE Std C37.240-2014 (2015), 1--38. Google ScholarCross Ref
- 2018. IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces. IEEE Std 1547-2018 (Revision of IEEE Std 1547-2003) (2018), 1--138. Google ScholarCross Ref
- Olugbenga Moses Anubi and Charalambos Konstantinou. 2019. Enhanced resilient state estimation using data-driven auxiliary models. IEEE Transactions on Industrial Informatics 16, 1 (2019), 639--647.Google ScholarCross Ref
- Anomadarshi Barua and Mohammad Abdullah Al Faruque. 2020. Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1273--1290.Google Scholar
- Rojan Bhattarai, Sheikh Jakir Hossain, Junjian Qi, Jianhui Wang, and Sukumar Kamalasadan. 2018. Sustained system oscillation by malicious cyber attacks on distributed energy resources. In 2018 IEEE Power & Energy Society General Meeting (PESGM). IEEE, 1--5.Google ScholarCross Ref
- Partha P Biswas, Ponnuthurai N Suganthan, Rammohan Mallipeddi, and Gehan AJ Amaratunga. 2018. Optimal power flow solutions using differential evolution algorithm integrated with effective constraint handling techniques. Engineering Applications of Artificial Intelligence 68 (2018), 81--100.Google ScholarDigital Library
- Cedric Carter, Ifeoma Onunkwo, Patricia Cordeiro, and Jay Johnson. 2017. Cyber security assessment of distributed energy resources. In 2017 IEEE 44th Photovoltaic Specialist Conference (PVSC). IEEE, 2135--2140.Google ScholarCross Ref
- Critical Infrastructure Cybersecurity. 2014. Framework for Improving Critical Infrastructure Cybersecurity. Framework 1, 11 (2014).Google Scholar
- Ricardo Siqueira de Carvalho and Danish Saleem. 2019. Recommended functionalities for improving cybersecurity of distributed energy resources. In 2019 Resilience Week (RWS), Vol. 1. IEEE, 226--231.Google ScholarCross Ref
- Kalyanmoy Deb. 2000. An efficient constraint handling method for genetic algorithms. Computer methods in applied mechanics and engineering 186, 2-4 (2000), 311--338.Google Scholar
- Simulink Documentation. 2020. Simulation and Model-Based Design. https://www.mathworks.com/products/simulink.htmlGoogle Scholar
- Sasan Gholami, Sajeeb Saha, and Mohammad Aldeen. 2017. A cyber attack resilient control for distributed energy resources. In 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 1--6.Google ScholarCross Ref
- William Hupp, Adarsh Hasandka, Ricardo Siqueira de Carvalho, and Danish Saleem. 2020. Module-OT: A Hardware Security Module for Operational Technology. In 2020 IEEE Texas Power and Energy Conference (TPEC). IEEE, 1--6.Google Scholar
- Samuel Koebrich, Thomas Bowen, and Austen Sharpe. 2018. 2018 Renewable Energy Data Book. U.S. Department of Energy (DOE), Office of Energy Efficiency & Renewable Energy (EERE) (2018).Google Scholar
- Christine Lai, Patricia Cordeiro, Adarsh Hasandka, Nicholas Jacobs, Shamina Hossain-McKenzie, Deepu Jose, Danish Saleem, and Maurice Martin. 2019. Cryptography considerations for distributed energy resource systems. In 2019 IEEE Power and Energy Conference at Illinois (PECI). IEEE, 1--7.Google ScholarCross Ref
- Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, and Jie Hu. 2016. VulPecker: an automated vulnerability detection system based on code similarity analysis. In Proceedings of the 32nd Annual Conference on Computer Security Applications. 201--213.Google ScholarDigital Library
- Bin Liu, Zhen Li, Xi Chen, Yuehui Huang, and Xiangdong Liu. 2017. Recognition and vulnerability analysis of key nodes in power grid based on complex network centrality. IEEE Transactions on Circuits and Systems II: Express Briefs 65, 3 (2017), 346--350.Google ScholarCross Ref
- James M Lucas and Michael S Saccucci. 1990. Exponentially weighted moving average control schemes: properties and enhancements. Technometrics 32, 1 (1990), 1--12.Google ScholarCross Ref
- Michael Mylrea and Sri Nikhil Gupta Gourisetti. 2017. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In 2017 Resilience Week (RWS). IEEE, 18--23.Google Scholar
- James Obert, Patricia Cordeiro, Jay Johnson, Gordon Lum, Tom Tansy, Max Pala, and Ronald Ih. 2019. Recommendations for trust and encryption in DER interoperability standards. In Tech. Report, Sandia National Laboratories. SAND2019--1490.Google Scholar
- D Jonathan Sebastian, Utkarsh Agrawal, Ali Tamimi, and Adam Hahn. 2019. DERTEE: Secure distributed energy resource operations through trusted execution environments. IEEE Internet of Things Journal 6, 4 (2019), 6476--6486.Google ScholarCross Ref
- Manajit Sengupta, Yu Xie, Anthony Lopez, Aron Habte, Galen Maclaurin, and James Shelby. 2018. The national solar radiation database (NSRDB). Renewable and Sustainable Energy Reviews 89 (2018), 51--60.Google ScholarCross Ref
- Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 15--32.Google Scholar
- Pirathayini Srikantha and Deepa Kundur. 2015. A DER attack-mitigation differential game for smart grid security analysis. IEEE Transactions on Smart Grid 7, 3 (2015), 1476--1485.Google ScholarCross Ref
- Rainer Storn and Kenneth Price. 1997. Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. Journal of global optimization 11, 4 (1997), 341--359.Google ScholarDigital Library
- Hongmei Tian, Fernando Mancilla-David, Kevin Ellis, Eduard Muljadi, and Peter Jenkins. 2012. Detailed performance model for photovoltaic systems. Technical Report. National Renewable Energy Lab.(NREL), Golden, CO (United States).Google Scholar
- Durgadevi Velusamy and Ganesh Kumar Pugalendhi. 2019. Fuzzy integrated Bayesian Dempster-Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid. Information Sciences 479 (2019), 542--566.Google ScholarCross Ref
- Zhifang Wang, Anna Scaglione, and Robert J Thomas. 2010. Electrical centrality measures for electric power grid vulnerability analysis. In 49th IEEE conference on decision and control (CDC). IEEE, 5792--5797.Google ScholarCross Ref
- RD Zimmerman and CE Murillo-Sánchez. 2020. Matpower [Software].Google Scholar
- Ioannis Zografopoulos and Charalambos Konstantinou. 2020. DERauth: A Battery-based Authentication Scheme for Distributed Energy Resources. In 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 560--567.Google Scholar
Index Terms
- RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation
Recommendations
Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures
ICECCS '14: Proceedings of the 2014 19th International Conference on Engineering of Complex Computer SystemsSmart grid, the future power grid, is expected to provide better energy efficiency, more customer choices and improved reliability and security. As the smart grid is an integrated system that consists of multiple subsystems, understanding it as a whole ...
Design and Analysis of a Sophisticated Malware Attack Against Smart Grid
ISC 2013: Proceedings of the 16th International Conference on Information Security - Volume 7807In this paper, we propose a realistic malware attack against the smart grid. The paper first briefs the architecture of the smart grid in general. And then we explain our proposed attack that is specifically tailored for the smart grid infrastructures. ...
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids
The modern electric power grid, known as the Smart Grid, has fast transformed the isolated and centrally controlled power system to a fast and massively connected cyber-physical system that benefits from the revolutions happening in communications (such ...
Comments