Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-9988-9545
Swiss Fed Inst Technol Lausanne EPFL, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland..
Swiss Fed Inst Technol Lausanne EPFL, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland.;Cisco Syst, Core Software Grp, CH-1015 Lausanne, Switzerland..
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-4876-0223
Vise andre og tillknytning
2020 (engelsk)Inngår i: IEEE Transactions on Instrumentation and Measurement, ISSN 0018-9456, E-ISSN 1557-9662, Vol. 69, nr 6, s. 3412-3427Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The emerging measurement technology of phasor measurement units (PMUs) makes it possible to estimate the state of electrical grids in real time, thus opening the way to new protection and control applications. PMUs rely on precise time synchronization; therefore, they are vulnerable to time-synchronization attacks (TSAs), which alter the measured voltage and current phases. In particular, undetectable TSAs pose a significant threat as they lead to an incorrect but credible estimate of the system state. Prior work has shown that such attacks exist against pairs of PMUs, but they do not take into consideration the clock adjustment performed by the clock servo, which can modify the attack angles and make the attacks detectable. This cannot be easily addressed with the existing attacks, as the undetectable angle values form a discrete set and cannot be continuously adjusted as would be required to address the problems posed to the attacker by the clock servo. Going beyond prior work, this article first shows how to perform undetectable attacks against more than two PMUs, so that the set of undetectable attacks forms a continuum and supports small adjustments. Second, it shows how an attacker can anticipate the operation of the clock servo while achieving her attack goal and remaining undetectable. Third, this article shows how to identify vulnerable sets of PMUs. Numerical results on the 39-bus IEEE benchmark system illustrate the feasibility of the proposed attack strategies.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE) , 2020. Vol. 69, nr 6, s. 3412-3427
Emneord [en]
Clock servo, cyber-security, false data injection attack, phasor measurement unit (PMU), power system state estimation, time synchronization attack (TSA)
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-278778DOI: 10.1109/TIM.2019.2939942ISI: 000546623300015Scopus ID: 2-s2.0-85084928264OAI: oai:DiVA.org:kth-278778DiVA, id: diva2:1455850
Merknad

QC 20200729

Tilgjengelig fra: 2020-07-29 Laget: 2020-07-29 Sist oppdatert: 2022-06-26bibliografisk kontrollert
Inngår i avhandling
1. Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures
Åpne denne publikasjonen i ny fane eller vindu >>Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures
2021 (engelsk)Doktoravhandling, med artikler (Annet vitenskapelig)
Abstract [en]

Phasor Measurement Units (PMUs) constitute an emerging technology that is essential for various smart grid applications such as phase angle monitoring, power oscillation damping, fault localization, and linear state estimation. To obtain precise PMU measurements of voltage and current phasors, time synchronization in the order of 1 microsecond is typically required. Nevertheless, time synchronization sources for PMUs, such as GPS satellites and Precision Time Protocol (PTP), are vulnerable to Time Synchronization Attacks (TSAs). A TSA can disrupt time synchronization, resulting in malicious phase angle measurements, potentially leading to serious consequences to the stability of the power grid. Moreover, sophisticated attackers may be able to develop undetectable TSAs that would lead to incorrect but credible estimates of the system state, which will bypass traditional Bad Data Detection (BDD) algorithms employed in the grid. Therefore, the detection and mitigation of such undetectable TSAs is of utmost importance for power system operators.​

The first part of this thesis explores the threat of undetectable TSAs by investigating their practical feasibility. We provide necessary and sufficient conditions for a set of PMUs to be vulnerable to undetectable TSAs and provide an efficient algorithm to compute attacks against any number of vulnerable PMUs. Furthermore, we show that the set of undetectable TSAs forms a continuum if at least three vulnerable PMUs are targeted by the attack. This fact can be exploited by an attacker to develop low-rate attacks that would adapt to the clock servo that controls the PMU clock, and would bypass typical change detection-based security solutions. The feasibility of computing undetectable TSAs was demonstrated using realistic PMU data and a widely-used clock servo implementation.

The second part of this thesis considers the detection of TSAs. To this end, we proposed three detection approaches focusing on various aspects of PMU and power grid operations. The first proposed approach is decentralized, and attempts to detect TSAs at every PMU individually by leveraging the dependence between the PMU clock state and the measured phasor. The approach is based on the observation that a TSA changes the correlation between the PMU clock frequency adjustments and the change in the measured phase angle. We proposed model-based and data-driven machine learning-based TSA detectors exploiting the change in correlation. Using extensive simulations and realistic PMU clock models, the proposed detectors were shown to perform well even for relatively low-rate attacks. The second proposed approach is centralized and is based on performing state estimation using the complete three-phase model instead of the simpler and more widely-used direct-sequence equivalent model. Our analytical results and extensive simulations showed that three-phase state estimators are significantly more resilient to TSAs compared to single-phase state estimators in unbalanced three phase systems. The third proposed approach is based on the framework of Graph Signal Processing (GSP) in power systems. We showed that by regarding the system state as a graph signal, the low-dimensional structure of the PMU measurements and the system state can be exploited for TSA detection. Based on GSP, we proposed a high-pass graph filter as well as machine learning classifiers utilizing GSP features, both showing superior performance not only in detecting the presence of a TSA, but also in localizing the attacked PMUs.

The third and final part of the thesis considers the mitigation of TSAs, with special focus on PTP networks. In this regard, we investigated recently standardized authentication schemes in PTPv2.1 and their effect on both the synchronization accuracy and network latency in an experimental testbed. The results showed that the authentication schemes pose no significant overhead on the synchronization accuracy or the network latency. Moreover, the cost considerations of PTP authentication were investigated by considering the partial application of the authentication schemes to a PTP network only in the parts that are vulnerable to undetectable TSAs, thus combining TSA mitigation and detection. We showed that the problem of mitigating undetectable TSAs at minimum cost is NP-hard. We formulated the problem as an integer linear program and proposed two approximation algorithms based on linear relaxation and a greedy heuristic. Through extensive simulations on both synthetic graphs and realistic IEEE benchmark power system graphs, we showed that our proposed algorithms, combining both state estimation and PTP authentication, can dramatically reduce the cost of mitigating TSAs.

The TSA detection and mitigation approaches presented in this thesis constitute a step towards secure and reliable time synchronization for PMU applications and a more resilient smart grid infrastructure.

sted, utgiver, år, opplag, sider
Stockholm, Sweden: KTH Royal Institute of Technology, 2021. s. 237
Serie
TRITA-EECS-AVL ; 2021:66
Emneord
Phasor measurements unit, Time synchronization, Power system state estimation, Network Security, Time synchronization attacks, Precision time protocol, Machine learning
HSV kategori
Forskningsprogram
Elektro- och systemteknik
Identifikatorer
urn:nbn:se:kth:diva-304272 (URN)978-91-8040-035-0 (ISBN)
Disputas
2021-11-29, Kollegiesalen Zoom link: https://kth-se.zoom.us/j/66718887877?pwd=Vk93U0FiQjMvbzBWaVVsN3kyRTd0dz09, Brinellvägen 8, Stockholm, Sweden, 14:00 (engelsk)
Opponent
Veileder
Merknad

QC 20211101

Tilgjengelig fra: 2021-11-01 Laget: 2021-10-29 Sist oppdatert: 2022-06-25bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Person

Shereen, EzzeldinDán, György

Søk i DiVA

Av forfatter/redaktør
Shereen, EzzeldinDán, György
Av organisasjonen
I samme tidsskrift
IEEE Transactions on Instrumentation and Measurement

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 203 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf