kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9988-9545
2021 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Phasor Measurement Units (PMUs) constitute an emerging technology that is essential for various smart grid applications such as phase angle monitoring, power oscillation damping, fault localization, and linear state estimation. To obtain precise PMU measurements of voltage and current phasors, time synchronization in the order of 1 microsecond is typically required. Nevertheless, time synchronization sources for PMUs, such as GPS satellites and Precision Time Protocol (PTP), are vulnerable to Time Synchronization Attacks (TSAs). A TSA can disrupt time synchronization, resulting in malicious phase angle measurements, potentially leading to serious consequences to the stability of the power grid. Moreover, sophisticated attackers may be able to develop undetectable TSAs that would lead to incorrect but credible estimates of the system state, which will bypass traditional Bad Data Detection (BDD) algorithms employed in the grid. Therefore, the detection and mitigation of such undetectable TSAs is of utmost importance for power system operators.​

The first part of this thesis explores the threat of undetectable TSAs by investigating their practical feasibility. We provide necessary and sufficient conditions for a set of PMUs to be vulnerable to undetectable TSAs and provide an efficient algorithm to compute attacks against any number of vulnerable PMUs. Furthermore, we show that the set of undetectable TSAs forms a continuum if at least three vulnerable PMUs are targeted by the attack. This fact can be exploited by an attacker to develop low-rate attacks that would adapt to the clock servo that controls the PMU clock, and would bypass typical change detection-based security solutions. The feasibility of computing undetectable TSAs was demonstrated using realistic PMU data and a widely-used clock servo implementation.

The second part of this thesis considers the detection of TSAs. To this end, we proposed three detection approaches focusing on various aspects of PMU and power grid operations. The first proposed approach is decentralized, and attempts to detect TSAs at every PMU individually by leveraging the dependence between the PMU clock state and the measured phasor. The approach is based on the observation that a TSA changes the correlation between the PMU clock frequency adjustments and the change in the measured phase angle. We proposed model-based and data-driven machine learning-based TSA detectors exploiting the change in correlation. Using extensive simulations and realistic PMU clock models, the proposed detectors were shown to perform well even for relatively low-rate attacks. The second proposed approach is centralized and is based on performing state estimation using the complete three-phase model instead of the simpler and more widely-used direct-sequence equivalent model. Our analytical results and extensive simulations showed that three-phase state estimators are significantly more resilient to TSAs compared to single-phase state estimators in unbalanced three phase systems. The third proposed approach is based on the framework of Graph Signal Processing (GSP) in power systems. We showed that by regarding the system state as a graph signal, the low-dimensional structure of the PMU measurements and the system state can be exploited for TSA detection. Based on GSP, we proposed a high-pass graph filter as well as machine learning classifiers utilizing GSP features, both showing superior performance not only in detecting the presence of a TSA, but also in localizing the attacked PMUs.

The third and final part of the thesis considers the mitigation of TSAs, with special focus on PTP networks. In this regard, we investigated recently standardized authentication schemes in PTPv2.1 and their effect on both the synchronization accuracy and network latency in an experimental testbed. The results showed that the authentication schemes pose no significant overhead on the synchronization accuracy or the network latency. Moreover, the cost considerations of PTP authentication were investigated by considering the partial application of the authentication schemes to a PTP network only in the parts that are vulnerable to undetectable TSAs, thus combining TSA mitigation and detection. We showed that the problem of mitigating undetectable TSAs at minimum cost is NP-hard. We formulated the problem as an integer linear program and proposed two approximation algorithms based on linear relaxation and a greedy heuristic. Through extensive simulations on both synthetic graphs and realistic IEEE benchmark power system graphs, we showed that our proposed algorithms, combining both state estimation and PTP authentication, can dramatically reduce the cost of mitigating TSAs.

The TSA detection and mitigation approaches presented in this thesis constitute a step towards secure and reliable time synchronization for PMU applications and a more resilient smart grid infrastructure.

Place, publisher, year, edition, pages
Stockholm, Sweden: KTH Royal Institute of Technology, 2021. , p. 237
Series
TRITA-EECS-AVL ; 2021:66
Keywords [en]
Phasor measurements unit, Time synchronization, Power system state estimation, Network Security, Time synchronization attacks, Precision time protocol, Machine learning
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electrical Engineering
Identifiers
URN: urn:nbn:se:kth:diva-304272ISBN: 978-91-8040-035-0 (print)OAI: oai:DiVA.org:kth-304272DiVA, id: diva2:1607196
Public defence
2021-11-29, Kollegiesalen Zoom link: https://kth-se.zoom.us/j/66718887877?pwd=Vk93U0FiQjMvbzBWaVVsN3kyRTd0dz09, Brinellvägen 8, Stockholm, Sweden, 14:00 (English)
Opponent
Supervisors
Note

QC 20211101

Available from: 2021-11-01 Created: 2021-10-29 Last updated: 2022-06-25Bibliographically approved
List of papers
1. Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation
Open this publication in new window or tab >>Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation
Show others...
2020 (English)In: IEEE Transactions on Instrumentation and Measurement, ISSN 0018-9456, E-ISSN 1557-9662, Vol. 69, no 6, p. 3412-3427Article in journal (Refereed) Published
Abstract [en]

The emerging measurement technology of phasor measurement units (PMUs) makes it possible to estimate the state of electrical grids in real time, thus opening the way to new protection and control applications. PMUs rely on precise time synchronization; therefore, they are vulnerable to time-synchronization attacks (TSAs), which alter the measured voltage and current phases. In particular, undetectable TSAs pose a significant threat as they lead to an incorrect but credible estimate of the system state. Prior work has shown that such attacks exist against pairs of PMUs, but they do not take into consideration the clock adjustment performed by the clock servo, which can modify the attack angles and make the attacks detectable. This cannot be easily addressed with the existing attacks, as the undetectable angle values form a discrete set and cannot be continuously adjusted as would be required to address the problems posed to the attacker by the clock servo. Going beyond prior work, this article first shows how to perform undetectable attacks against more than two PMUs, so that the set of undetectable attacks forms a continuum and supports small adjustments. Second, it shows how an attacker can anticipate the operation of the clock servo while achieving her attack goal and remaining undetectable. Third, this article shows how to identify vulnerable sets of PMUs. Numerical results on the 39-bus IEEE benchmark system illustrate the feasibility of the proposed attack strategies.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Keywords
Clock servo, cyber-security, false data injection attack, phasor measurement unit (PMU), power system state estimation, time synchronization attack (TSA)
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-278778 (URN)10.1109/TIM.2019.2939942 (DOI)000546623300015 ()2-s2.0-85084928264 (Scopus ID)
Note

QC 20200729

Available from: 2020-07-29 Created: 2020-07-29 Last updated: 2022-06-26Bibliographically approved
2. Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs
Open this publication in new window or tab >>Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs
2020 (English)In: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 38, no 1, p. 169-179Article in journal (Refereed) Published
Abstract [en]

Precise time synchronization of Phasor Measurement Units (PMUs) is critical for monitoring and control of smart grids. Thus, time synchronization attacks (TSAs) against PMUs pose a severe threat to smart grid security. In this paper we present an approach for detecting TSAs based on the interaction between the time synchronization system and the power system. We develop a phasor measurement model and use it to derive an accurate closed form expression for the correlation between the frequency adjustments made by the PMU clock and the resulting change in the measured phase angle, without an attack. We then propose one model-based and three data-driven TSA detectors that exploit the change in correlation due to a TSA. Using extensive simulations, we evaluate the proposed detectors under different strategies for implementing TSAs, and show that the proposed detectors are superior to state-of-the-art clock frequency anomaly detection, especially for unstable clocks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Keywords
Clocks, Phasor measurement units, Synchronization, Detectors, Phase measurement, Frequency measurement, Power system stability, PMU, time synchronization attacks, phasor measurements, security, cyber-physical systems, correlation, clock synchronization, data-driven detection, machine learning
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-268779 (URN)10.1109/JSAC.2019.2952017 (DOI)000510714300015 ()2-s2.0-85074856246 (Scopus ID)
Note

QC 20200225

Available from: 2020-02-25 Created: 2020-02-25 Last updated: 2022-06-26Bibliographically approved
3. Time-Synchronization Attack Detection in Unbalanced Three-Phase Systems
Open this publication in new window or tab >>Time-Synchronization Attack Detection in Unbalanced Three-Phase Systems
Show others...
2021 (English)In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 12, no 5, p. 4460-4470Article in journal (Refereed) Published
Abstract [en]

Phasor measurement units (PMU) rely on an accurate time-synchronization to phase-align the phasors and timestamp the voltage and current phasor measurements. Among the symmetrical components computed from the phasors in three-phase systems, the standard practice only uses the direct-sequence component for state estimation and bad data detection (BDD). Time-synchronization attacks (TSAs) can compromise the measured phasors and can, thus, significantly alter the state estimate in a manner that is undetectable by widely used power-system BDD algorithms. In this paper we investigate the potential of utilizing the three-phase model instead of the direct-sequence model for mitigating the vulnerability of state estimation to undetectable TSAs. We show analytically that if the power system is unbalanced then the use of the three-phase model as input to BDD algorithms enables to detect attacks that would be undetectable if only the direct-sequence model was used. Simulations performed on the IEEE 39-bus benchmark using real load profiles recorded on the grid of the city of Lausanne confirm our analytical results. Our results provide a new argument for the adoption of three-phase models for BDD, as their use is a simple, yet effective measure for reducing the vulnerability of PMU measurements to TSAs.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2021
Keywords
Phasor measurement units, Transmission line measurements, State estimation, Synchronization, Power systems, Phase measurement, Measurement uncertainty, Phasor measurement unit (PMU), power system state estimation, threephase state estimation, time synchronization attack, cyber-security, false data injection attack, bad data detection (BDD)
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-300820 (URN)10.1109/TSG.2021.3078104 (DOI)000686785700070 ()2-s2.0-85105880322 (Scopus ID)
Note

QC 20210929

Available from: 2021-09-29 Created: 2021-09-29 Last updated: 2022-06-25Bibliographically approved
4. Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing
Open this publication in new window or tab >>Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Time Synchronization Attacks (TSAs) against Phasor Measurement Units (PMUs) constitute a major threat to modern smart grid applications. By compromising the time reference of a set of PMUs, an attacker can change the phase angle of their measured phasors, with potentially detrimental impact on grid operation and control. Going beyond traditional residual-based techniques in detecting TSAs, in this paper we propose the use of Graph Signal Processing (GSP) to model the power grid so as to facilitate the detection and localization of TSAs. We analytically show that modeling the state of the power system as a low-pass graph signal can significantly improve the resilience of the grid against TSAs. We propose TSA detection and localization methods based on GSP, leveraging state-of-the-art machine learning algorithms. We provide empirical evidence for the efficiency of the proposed methods based on extensive simulations on two IEEE benchmark systems. In fact, our methods can detect at least 77% more TSAs of significant impact and identify an additional 13% of the attacked PMUs compared to state-of-the-art techniques.

Keywords
Phasor measurement unit, Time synchronization attack, Graph signal processing
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-304269 (URN)
Note

QC 20211130

Available from: 2021-10-29 Created: 2021-10-29 Last updated: 2022-06-25Bibliographically approved
5. Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1
Open this publication in new window or tab >>Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1
Show others...
2019 (English)In: Proceedings of 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, IEEE Computer Society, 2019, article id 8886641Conference paper, Published paper (Refereed)
Abstract [en]

The lack of integrated support for security has been a major shortcoming of Precision Time Protocol version 2 (PTPv2) for a long time. The upcoming PTPv2.1 aims at addressing this shortcoming in a variety of ways, including the introduction of lightweight message authentication. In this paper we provide an overview of the planned security features, and report results based on an implementation of the proposed integrated security mechanism based on the open source Linux PTP, including support for hardware timestamping. Our implementation includes an extension of Linux PTP to support transparent clocks. We provide results from an experimental testbed including a transparent clock, which illustrate that the extensions can be implemented in software at a low computational overhead, while supporting hardware timestamping. We also provide a discussion of the remaining vulnerabilities of PTP time synchronization, propose countermeasures, and discuss options for key management, which is not covered by the standard.

Place, publisher, year, edition, pages
IEEE Computer Society, 2019
Series
IEEE International Symposium on Precision Clock Synchronization for Meaurement Control and Communication, ISSN 1949-0305
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-263969 (URN)10.1109/ISPCS.2019.8886641 (DOI)000790754700008 ()2-s2.0-85074978634 (Scopus ID)
Conference
13th International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS 2019; Portland; United States; 22 September 2019 through 27 September 2019
Projects
CERCES
Note

QC 20220922

Part of proceedings: ISBN 978-1-5386-7606-6

Available from: 2019-11-19 Created: 2019-11-19 Last updated: 2024-03-15Bibliographically approved
6. Network Topology-aware Mitigation of Undetectable PMU Time Synchronization Attacks
Open this publication in new window or tab >>Network Topology-aware Mitigation of Undetectable PMU Time Synchronization Attacks
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Time Synchronization attacks constitute a major threat to PMU-based smart grid applications, their cost-efficient detection and mitigation is thus of utmost importance. In this paper we propose a mitigation approach based on authenticated network-based time synchronization. Our approach relies on the observation that a time synchronization attack can be undetectable if and only if it targets at least three time references in the power system, and such attacks need to be mitigated through appropriate security controls. We first provide a formal proof of this result, including a characterization of the degrees of freedom of the attacker in constructing an attack. We then formulate the problem of mitigating undetectable attacks at minimum costas an integer linear program, and prove that it is NP-hard. To solve the problem, we propose two approximation algorithms based on (1) computing shortest paths, and (2) solving a linear relaxation of the problem. Extensive simulations suggest the superiority of the proposed algorithms on IEEE benchmark power system graphs compared to baseline solutions. We report mitigation cost savings of at least 76% compared to a naive approach for mitigation and at least 30% compared the state-of-the-art.

Keywords
Phasor measurement unit, Time synchronization attack, Precision time protocol, Integer linear programming
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-304271 (URN)
Note

QC 20211130

Available from: 2021-10-29 Created: 2021-10-29 Last updated: 2022-06-25Bibliographically approved

Open Access in DiVA

fulltext(1075 kB)1444 downloads
File information
File name FULLTEXT01.pdfFile size 1075 kBChecksum SHA-512
0afcea90d14c661954234faebc79fea2d30bd7ac8ca52e97735f51876bce9003fd683123c876f6fb96862756d2e6ecdf2ddd9d26ccdc591e08751bcb3b39535b
Type fulltextMimetype application/pdf

Authority records

Shereen, Ezzeldin

Search in DiVA

By author/editor
Shereen, Ezzeldin
By organisation
Network and Systems Engineering
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 1444 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1356 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf