Abstract
Load Tap Changing (LTC) Transformers are widely used in a Power Distribution System to regulate the voltage level within standard operational limit. In a SCADA connected network, the performance of LTC transformers can be improved by utilizing a closed loop monitoring and control mechanism. The widely used SCADA communication protocols, including Modbus and DNP3, have been proven vulnerable under cyber attack. In this paper, we conduct a vulnerability analysis of LTC transformers under malicious modification of measurement data. Here, we define two different attack strategies, (i)attack targeting energy system efficiency, and (ii) attack targeting energy system stability. With theoretical background and simulation results, we demonstrate that the attack strategies can significantly affect the power distribution system operations in terms of energy efficiency and stability. The experiments are performed considering IEEE benchmark 123 node test distribution system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Roy, N.K., Pota, H.R., Anwar, A.: A new approach for wind and solar type DG placement in power distribution networks to enhance systems stability. In: 2012 IEEE International Power Engineering and Optimization Conference (PEOCO), Melaka, Malaysia, 6–7 June 2012, pp. 296–301 (2012)
Johansson, S., Sjogren, F.: Voltage collapse in power systems, Ph.D. thesis, Chalmers University of Technology (1995)
Dzafic, I., Jabr, R.A., Halilovic, E., Pal, B.C.: A sensitivity approach to model local voltage controllers in distribution networks. IEEE Trans. Power Syst. 29(3), 1419–1428 (2014)
Uluski, R.W.: VVC in the smart grid era. IEEE Power Energy Soc. Gen. Meet. 2010, 25–29 (2010)
Parthasarathy, S.; Kundur, D.: Bloom filter based intrusion detection for smart grid SCADA. In: 25th IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), pp. 1–6 (2012)
Queiroz, C., Mahmood, A., Tari, Z.: SCADASim - a framework for building SCADA simulations. IEEE Trans. Smart Grid 2(4), 589–597 (2011)
Fovino, I.N., Coletta, A., Carcano, A., Masera, M.: Critical state-based filtering system for securing SCADA network protocols. IEEE Trans. Ind. Electron. 59(10), 3943–3950 (2012)
Wang, Wenye, Zhuo, Lu: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57, 1344–1371 (2013)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 21–32. ACM (2009)
Ozay, M., Esnaola, I., Vural, F., Kulkarni, S., Poor, H.: Sparse attack construction and state estimation in the smart grid: centralized and distributed models. IEEE J. Sel. Areas Commun. 31, 1306–1318 (2013)
Hug, G., Giampapa, J.: Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3, 1362–1370 (2012)
Qin, Z., Li, Q., Chuah, M.-C.: Defending against unidentifiable attacks in electric power grids. IEEE Trans. Parallel Distrib. Syst. 24, 1961–1971 (2013)
Valenzuela, J., Wang, J., Bissinger, N.: Real-time intrusion detection in power system operations. IEEE Trans. Power Syst. 28, 1052–1062 (2013)
Mousavian, S., Valenzuela, J., Wang, J.: Real-time data reassurance in electrical power systems based on artificial neural networks. Electr. Power Syst. Res. 96, 285–295 (2013)
Grochocki, D.; Huh, J.H.; Berthier, R.; Bobba, R.; Sanders, W.H.; Cardenas, A.A.; Jetcheva, J.G.: AMI threats, intrusion detection requirements and deployment recommendations. In: IEEE Third International Conference on Smart Grid Communications (SmartGridComm), 5–8 November 2012, pp. 395–400 (2012)
Xiao, Z., Xiao, Y., Du, D.H.: Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans. Smart Grid 4(1), 214–226 (2013)
Lo, C.-H., Ansari, N.: CONSUMER: a novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans. Emerg. Top. Comput. 1(1), 33–44 (2013)
Esfahani, P.M., Vrakopoulou, M., Margellos, K., Lygeros, J., Andersson, G.: A robust policy for automatic generation control cyber attack in two area power network. In: 49th IEEE Conference on Decision and Control (CDC) (2010)
Sridhar, S., Govindarasu, M.: Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580–591 (2014)
Anwar, A.; Mahmood, A.: Cyber security of smart grid infrastructure. In: The State of the Art in Intrusion Prevention and Detection, CRC Press, USA, 2014, CRC Press, Taylor & Francis Group, pp. 139–154
Anwar, A., Mahmood, A.: Vulnerabilities of smart grid state estimation against false data injection attack. In: Hossain, J., Mahmud, A. (eds.) Renewable Energy Integration. Green Energy and Technology, pp. 411–428. Springer, Singapore (2014)
Yorino, N., Sasaki, H., Masuda, Y., Tamura, Y., Kitagawa, M., Oshimo, A.: An investigation of voltage instability problems. IEEE Trans. Power Syst. 7, 600–611 (1992)
Kundur, P., Paserba, J., Ajjarapu, V., Andersson, G., Bose, A., Canizares, C., Hatziargyriou, N., Hill, D., Stankovic, A., Taylor, C., Van Cutsem, T., Vittal, V.: Definition and classification of power system stability - IEEE/CIGRE joint task force on stability terms and definitions. IEEE Trans. Power Syst. 19, 1387–1401 (2004)
Distribution System Analysis Subcommittee Radial Test Feeders. http://ewh.ieee.org/soc/pes/dsacom/testfeeders/index.html
Kersting, W.: Distribution System Modeling and Analysis. CRC Press, Boca Raton (2002)
Smart Grid Resource Center, Simulation Tool OpenDSS. http://www.smartgrid.epri.com/SimulationTool.aspx
Liu, C.-C., Stefanov, A., Hong, J., Panciatici, P.: Intruders in the grid. IEEE Power Energy Mag. 10(1), 58–66 (2012)
Xie, Y., Yu, S.-Z.: A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans. Netw. 17(1), 54–65 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Anwar, A., Mahmood, A.N., Ahmed, M. (2015). False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-23802-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23801-2
Online ISBN: 978-3-319-23802-9
eBook Packages: Computer ScienceComputer Science (R0)