Skip to main content

Physical Attestation of Cyber Processes in the Smart Grid

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8328))

Abstract

Cyber-physical system security must consider events in both the cyber and physical layers. This paper proves that a cyber process in the smart grid can lie about its physical behavior and remain undetected by its peers. To avoid this scenario, physical attestation is introduced as a distributed mechanism to validate the behavior of a cyber process using physical measurements. A physical attestation protocol is developed for the smart grid, and the protocol is proven to expose malicious cyber behavior. Through the use of physical attestation, the behavior of cyber processes in cyber-physical systems can be verified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akella, R., Meng, F., Ditch, D., McMillin, B., Crow, M.: Distributed power balancing for the FREEDM system. In: First IEEE International Conference on Smart Grid Communications, SmartGridComm, pp. 7–12 (October 2010)

    Google Scholar 

  2. Falliere, N., Murchu, L., Chien, E.: W32.stuxnet dossier (February 2011), http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf (accessed April 19, 2013)

  3. Gamage, T., McMillin, B.: Nondeducibility-based analysis of cyber-physical systems. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. IFIP AICT, vol. 311, pp. 169–183. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, New York, NY, USA, pp. 21–32 (2009), http://doi.acm.org/10.1145/1653662.1653666

  5. Mallela, S., Masson, G.: Diagnosable systems for intermittent faults. IEEE Transactions on Computers C-27(6), 560–566 (1978)

    Article  MathSciNet  Google Scholar 

  6. McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy theft in the advanced metering infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In: 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), pp. 2195–2201 (December 2011)

    Google Scholar 

  8. Preparata, F.P., Metze, G., Chien, R.T.: On the connection assignment problem of diagnosable systems. IEEE Transactions on Electronic Computers EC-16(6), 848–854 (1967)

    Article  Google Scholar 

  9. Qin, Z., Li, Q., Chuah, M.C.: Unidentifiable attacks in electric power systems. In: Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, ICCPS 2012, Washington, DC, USA, pp. 193–202 (2012), http://dx.doi.org/10.1109/ICCPS.2012.27

  10. Roth, T., McMillin, B.: Breaking nondeducible attacks on the smart grid. In: Seventh CRITIS Conference on Critical Information Infrastructures Security. Springer, Lillehammer (2012)

    Google Scholar 

  11. Sutherland, D.: A model of information. In: Proceedings of the 9th National Computer Security Conference, pp. 175–183 (September 1986)

    Google Scholar 

  12. Van Cutsem, T., Ribbens-Pavella, M., Mili, L.: Bad data identification methods in power system state estimation-a comparative study. IEEE Transactions on Power Apparatus and Systems PAS-104(11), 3037–3049 (1985)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Roth, T., McMillin, B. (2013). Physical Attestation of Cyber Processes in the Smart Grid. In: Luiijf, E., Hartel, P. (eds) Critical Information Infrastructures Security. CRITIS 2013. Lecture Notes in Computer Science, vol 8328. Springer, Cham. https://doi.org/10.1007/978-3-319-03964-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03964-0_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03963-3

  • Online ISBN: 978-3-319-03964-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics