Excellence in Research and Innovation for Humanity

International Science Index


Select areas to restrict search in scientific publication database:
10008905
A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid
Abstract:
In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.
Digital Article Identifier (DAI):

References:

[1] Wadhawan, Y., & Neuman, C. (2016, October). Evaluating Resilience of Gas Pipeline Systems under Cyber-Physical Attacks: A Function-Based Methodology. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (pp. 71-80). ACM.
[2] Wadhawan, Y., Neuman, C & AlMajali, A. (2017, April). Analyzing Cyber Physical Attacks on Smart Grid System. In Proceedings of the 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems. IEEE.
[3] Pan, K., Teixeira, A. M., Cvetkovic, M., & Palensky, P. (2016, November). Combined data integrity and availability attacks on state estimation in cyber-physical power grids. In Smart Grid Communications (SmartGridComm), 2016 IEEE International Conference on (pp. 271-277). IEEE.
[4] Neuman, C., and Tan, K., Mediating cyber and physical threat propagation in secure smart grid architectures. InSmart Grid Communications (SmartGridComm), IEEE International Conference on (pp. 238-243). (2011).
[5] Srikantha, Pirathayini, and Deepa Kundur, "A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis."IEEE Transactions on Smart Grid 7, no. 3 (2016): 1476-1485.
[6] AlMajali, A., Rice, E., Viswanathan, A., Tan, K., & Neuman, C, A systems approach to analysing cyber-physical threats in the Smart Grid. In 2013 IEEE International Conference on Smart Grid Communications.
[7] AlMajali, A., & Dweik, W. (2016, December). Modeling worm propagation in the advanced metering infrastructure. In Electronic Devices, Systems and Applications (ICEDSA), 2016 5th International Conference on (pp. 1-4). IEEE.
[8] Wu, Baichao, Aiping Tang, and Jie Wu, "Modeling cascading failures in interdependent infrastructures under terrorist attacks." Reliability Engineering & System Safety 147 (2016): 1-8.
[9] Erdener, Burcin Cakir, Kwabena A. Pambour, Ricardo Bolado Lavin, and Berna Dengiz, "An integrated simulation model for analysing electricity and gas systems." International Journal of Electrical Power & Energy Systems 61 (2014): 410-420.
[10] Manshadi, Saeed D., and Mohammad E. Khodayar. "Resilient operation of multiple energy carrier microgrids." IEEE Transactions on Smart Grid 6, no. 5 (2015): 2283-2292.
[11] Chen, T. M., & Abu-Nimeh, S. (2011). "Lessons from stuxnet." Computer, 44(4), 91-93.
[12] Generic Solar Photovoltaic System Dynamic Simulation Model Specification. https://www.powerworld.com/files/WECC-Solar-PV- Dynamic-Model-Specification-September-2012.pdf.
[13] Tripwire Study: Cyber Attackers Successfully Targeting Oil and Gas Industry, (2016) http://www.tripwire.com/company/news/press- release/tripwire-study-cyber-attackers-successfully-targeting- oil-and- gas-industry/.
[14] Analysis of the Cyber Attack on the Ukrainian Power Grid, March2016. http://www.nerc.com/pa/CI/ESISAC/Documents/E- ISAC_SANS_Ukraine_DUC_18Mar2016.pdf.
[15] Solar Energy Grid Integration System (SEGIS) 2007. https://www1.eere.energy.gov/solar/pdfs/segis_concept_paper.pdf.
[16] Pipeline Pressure Limits. http://www.hse.gov.uk/pipelines/resources/pipelinepressure.htm.
[17] Analysis of the Cyber Attack on the Ukrainian Power Grid, March 2016. http://www.nerc.com/pa/CI/ESISAC/Documents/E- ISAC_SANS_Ukraine_DUC_18Mar2016.pdf.
[18] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing,” Tech. Rep., 2003.
[19] Panteli, M., Mancarella, P., Trakas, D., Kyriakides, E., & Hatziargyriou, N. (2017). Metrics and Quantification of Operational and Infrastructure Resilience in Power Systems. IEEE Transactions on Power Systems.
[20] Communications Module for Electricity Meters. (2013) http://www.silverspringnet.com/pdfs/SilverSpring-Datasheet-Communications-Modules.pdf.
[21] Radio Propagation Model used in Ns-2 http://kom.aau.dk/group/05gr1120/ref/Channel.pdf.
[22] Ryutov, T., AlMajali, A., & Neuman, C. (2015, April). Modeling security policies for mitigating the risk of load altering attacks on smart grid systems. In Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), 2015 Workshop on (pp. 1-6). IEEE.
[23] AlMajali, A., Viswanathan, A., & Neuman, C. (2016). Resilience Evaluation of Demand Response as Spinning Reserve under Cyber-Physical Threats. Electronics, 6(1), 2.
[24] The Map That Shows Why a Pipeline Explosion in Turkey Matters to the U.S. http://www.bloomberg.com/news/2014- 12-10/the-map-that-shows-why-a-pipeline-explosion-inturkey- matters-to-the-u-s-.html.
Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007