Analysis of Cyber Attack and Defense in Process Bus of Digital Substation by Game Theory

Authors

Department of Electrical Engineering, Science and Research branch, Islamic Azad University, Tehran, Iran

Abstract

The use of smart substations based on digital technology is increasing in the power system. In these substations, according to the data transmission from different levels to intelligent devices of process bus, makes them susceptible to the cyber-attacks. In this paper, cyber attacks are made to the sensors of process bus in three hardware equipment including switches, merging units and intelligent control units. Analysis of the attacks by attackers and created defense through defenders has been assessed with game theory. Regarding to the Nash Equilibrium point for the suggested game, the best attack and defense strategy is determined. According to the proposed method, the damage to the process bus sensors of digital substation can be specified. Optimal defense budget is estimated for cyber security through assessment of cyber defense strategy.

Keywords


[1] M. Panteli and D. S. Kirschen, “Assessing the effect of failures in the information and communication infrastructure on power system reliability,” Power Systems Conference and Exposition (PSCE) , pp. 1-7, 2011.
[2] D. Kirschen and F. Bouffard, “Keeping the lights on and the information flowing,” IEEE Power and Energy magazine, vol. 7, no. 1, 2009.
[3] Y. W. Law, T. Alpcan, and M. Palaniswami, “Security games for voltage control in smart grid,” Communication, Control, and Computing (Allerton), , pp. 212-219, 2012.
[4] W. Saad, Z. Han, H. V. Poor, and T. Basar, “Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications,” IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 86-105, 2012.
[5] معصومه جوادی, سیدمازیار میرحسینی مقدم، موسی مرزبند، «مدیریت بهینه انرژی ریزشبکه‌ها در بازار خرده‌فروشی بر پایه روش تئوری بازی غیر همکارانه با در نظر گرفتن عدم قطعیت»، مجله مهندسی برق دانشگاه تبریز, دوره 46، شماره 1، صفحه 74-63 بهار 1395.
[6] X. Liang and Y. Xiao, “Game theory for network security, ” IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 472-486, 2013.
[7] A. K. Farraj, E. M. Hammad, A. Al Daoud, and D. Kundur, “A game-theoretic control approach to mitigate cyber switching attacks in smart grid systems, ” IEEE International Conference on Smart Grid Communications   (SmartGridComm), pp. 958-963, 2014.
[8] R. Hewett, S. Rudrapattana, and P. Kijsanayothin, “Smart Grid security: Deriving informed decisions from cyber attack game analysis,” IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 946-951, 2014.
[9] Z. Ismail, J. Leneutre, D. Bateman, and L. Chen, “A game-theoretical model for security risk management of interdependent ict and electrical infrastructures, ” IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), pp. 101-109, 2015.
[10] M. Sheng-Wei and Z. Jian-Quan, “Mathematical and control scientific issues of smart grid and its prospects,” Acta Automatica Sinica, vol. 39, no. 2, pp. 119-131, 2013.
[11] A. A. Cardenas, T. Roosta, and S. Sastry, “Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems,” Ad Hoc Networks, vol. 7, no. 8, pp. 1434-1447, 2009.
[12] C. Wang, C-W. Ten, Y. Hou, and A. Ginter, “Cyber Inference System for Substation Anomalies Against Alter-and-Hide Attacks,” IEEE Transactions on Power Systems, vol. 32, pp. 896-909, 2016.
[13] M. Marzband, F. Azarinejadian, M. Savaghebi, and J. M. Guerrero, “An optimal energy management system for islanded microgrids based on multiperiod artificial bee colony combined with Markov chain,” IEEE Systems Journal, vol. 11, pp. 1712-1722, 2015.
[14] M. Marzband, S. S. Ghazimirsaeid, H. Uppal, and T. Fernando, “A real-time evaluation of energy management systems for smart hybrid home Microgrids,” Electric Power Systems Research, vol. 143, pp. 624-633, 2017.
[15] S. Mousavian, J. Valenzuela, and J. Wang, “A probabilistic risk mitigation model for cyber-attacks to PMU networks,” IEEE Transactions on Power Systems, vol. 30, no. 1, pp. 156-165, 2015.
[16] M. T. A. Rashid, S. Yussof, and Y. Yusoff, “Trust System Architecture for Securing GOOSE Communication in IEC 61850 Substation Network,” International Journal of Security and Its Applications, vol. 10, no. 4, pp. 289-302, 2016.
[17] T. A. Youssef, M. El Hariri, N. Bugay, and O. Mohammed, “IEC 61850: Technology Standards and Cyber-Security Threats,” in Proceedings of the 16th IEEE International Conference on Environment and Electrical Engineering (EEEIC), Florence, Italy, vol. 710, pp. 1-6, 2016.
[18] R. Macwan et al., “Collaborative defense against data injection attack in IEC61850 based smart substations,” IEEE Power and Energy Society General Meeting (PESGM), pp. 1-5, 2016.
[19] J. Yue and K. Zhang, “Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation,” IEEE Seventh International Symposium on Computational Intelligence and Design (ISCID), vol. 2, pp. 513-516, 2014.
[20] N. Liu, J. Zhang, H. Zhang, and W. Liu, “Vulnerability assessment for communication network of substation automation systems to cyber attack,” PSCE'09. IEEE/PES Power Systems Conference and Exposition, pp. 1-7, 2009.
[21] C. Taylor, P. W. Oman, and A. W. Krings, “Assessing Power Substation Network Security and Survivability: A Work in Progress Report,” Security and Management, pp. 281-287, 2003.
[22] Y. Xiang, L. Wang, and Y. Zhang, “Power system adequacy assessment with probabilistic cyber attacks against breakers,” IEEE Conference & Exposition in PES General Meeting, pp. 1-5, 2014.
[23] Y. Zhang, L. Wang, and Y. Xiang, “Power system reliability analysis with intrusion tolerance in SCADA systems,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 669-683, 2016.
[24] M. Wei and Z. Chen, “Reliability analysis of cyber security in an electrical power system associated WAN,” IEEE Meeting in Power and Energy Society General, pp. 1-6, 2012.
[25] A. Patrascu and E. Simion, “Applied cybersecurity using game theory elements,” 10th International Conference on Communications (COMM), pp. 1-4, 2014.
[26] Q. Zhu, Game-theoretic methods for security and resilience in cyber-physical systems, Ph.D. Thesis, University of Illinois, Urbana, Illinois, 2013.
[27] M. Adamiak, D. Baigent, and R. Mackiewicz, “IEC 61850 Communication Networks and Systems In Substations,” The Protection & Control Jurnal-Smart Grid, pp. 61-68, 2010.
[28] M. Humphreys and J. J. Heon, Research Topics in Game Theory, Political ScienceW4210 , 2004.
[29] L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power grid protection against coordinated cyber-physical attacks,” IEEE Transactions on Smart Grid, vol. PP, pp. 1-11, 2016.
[30] M. Marzband, M. Javadi, J. L. Domínguez-García, and M. M. Moghaddam, “Non-cooperative game theory based energy management systems for energy district in the retail market considering DER uncertainties,” IET Generation, Transmission & Distribution, vol. 10, no. 12, pp. 2999-3009, 2016.
[31] T. Alpcan and T. Başar, Network security: A decision and game-theoretic approach, Cambridge University Press, 2010.
[32] Y. Yang et al., “Cybersecurity test-bed for IEC 61850 based smart substations,” IEEE in Power & Energy Society General Meeting, pp. 1-5,2015.
[33] P. Wood , Symantec internet security threat report 2016, Symantec Corp., Mountain View, CA, USA, Tech. Rep, 2016.
[34] J. Hong, C.-C. Liu, and M. Govindarasu, “Detection of cyber intrusions using network-based multicast messages for substation automation,” IEEE PES in Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5, 2014.
[35] P. Maynard, K. McLaughlin, and B. Haberler, “Towards understanding man-in-the-middle attacks on iec 60870-5-104 scada networks,” in Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research, pp. 30-42, 2014.
[36] رضا رافع، فرشته خدادادی, "ارائه یک الگوریتم شناسایی گره‌های کپی در شبکه‌های حسگر بی‌سیم به کمک انتشارات محلی و کانال‌های کرم‌چاله قانونی," مجله مهندسی برق دانشگاه تبریز, دوره 44، شماره  4، صفحه 33-22 زمستان 1393.
[37] S. Jeba and B. Paramasivan, “False data injection attack and its countermeasures in wireless sensor networks,” European Journal of Scientific Research, vol. 82, no. 2, pp. 248-257, 2012.
[38] E. Fabrizio et al., “Monitoring of a micro-smart grid: Power consumption data of some machineries of an agro-industrial test site,” Data Brief, vol. 10, pp. 564-568, 2017.
[39] I. Syamsuddin and J. Hwang, “The application of AHP to evaluate information security policy decision making,” International Journal of Simulation, Systems, Science and Technology, vol. 10, no. 4, pp. 46-50, 2009.
[40] F. P. DRAFT, “Recommended security controls for federal information systems and organizations,” NIST Special Publication, vol. 800, p. 53, 2009.
[41] L. Evans, Standards for Security Categorization of Federal Information and Information Systems, FIPS PUB 199, 2004
[42] J. Ratliff. Extensive-Form Solution Concepts, 1994, http://virtualperfection.com/gametheory.