Nothing Special   »   [go: up one dir, main page]

Skip to main content

Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study

  • Conference paper
  • First Online:
Computer Security. ESORICS 2022 International Workshops (ESORICS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13785))

Included in the following conference series:

Abstract

Communication network dependencies for microgrid’s operations increases cybersecurity risks, where vulnerabilities found in communication protocols can be exploited for malicious intent. In this paper, we enumerate important attack techniques on multiple communication protocols and investigate their impacts on the microgrid dispatch function. We also show that an attacker can leverage multiple protocols to launch coordinated attacks that offers longer-term, stealthier, and larger adversarial impact, an advanced persistent threat. Our main contribution in this work is a detailed case study carried out on Electrical Power and Intelligent Control (EPIC) testbed located in Singapore. Through a series of experiments, we demonstrated individual protocols’ vulnerability, verified their negative impacts on several microgrid’s dispatch functions, and also illustrated the practicality of coordinated attacks through the manipulation of multiple protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shahidehpour, M., et al.: Transforming a national historic landmark into a green nanogrid: the case of crown hall. IEEE Electrification Mag. 8(4), 20–35 (2020)

    Article  Google Scholar 

  2. Nurdiana, E., Riza, R., Ifanda, I., Basharah, A.A.: Performance of 10 kWp PV rooftop system based on smart grid in energy building PUSPIPTEK. In: International Conference on Sustainable Energy Engineering and Application (ICSEEA) 2019, pp. 193–200 (2019)

    Google Scholar 

  3. Song, Q., et al.: Smart substation integration technology and its application in distribution power grid. CSEE J. Power Energy Syst. 2(4), 31–36 (2016)

    Article  Google Scholar 

  4. Yu, X., Xue, Y.: Smart grids: a cyber-physical systems perspective. Proc. IEEE 104(5), 1058–1070 (2016)

    Article  Google Scholar 

  5. IEEE approved draft recommended practice for implementing an IEC 61850 based substation communications, protection, monitoring and control system. In: IEEE P2030.100/D12, March 2017, pp. 1–70, 1 January 2017

    Google Scholar 

  6. Brand, K.P., Ostertag, M., Wimmer, W.: Safety related, distributed functions in substations and the standard IEC 61850. In: 2003 IEEE Bologna Power Tech Conference Proceedings, vol. 2, 5 p. (2003)

    Google Scholar 

  7. IEEE standard for the specification of microgrid controllers. In: IEEE Std 2030.7-2017, pp. 1–43, 23 April 2018

    Google Scholar 

  8. Biswas, P.P., Li, Y., Tan, H.C., Mashima, D., Chen, B.: An attack-trace generating toolchain for cybersecurity study of iec61850 based substations. In: 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–7 (2020)

    Google Scholar 

  9. Khodabakhsh, A., Yayilgan, S.Y., Houmb, S.H., Hurzuk, N., Foros, J., Istad, M.: Cyber-security gaps in a digital substation: from sensors to SCADA. In: 2020 9th Mediterranean Conference on Embedded Computing (MECO), pp. 1–4 (2020)

    Google Scholar 

  10. Case, Defense Use: Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), pp. 1–29 (2016)

    Google Scholar 

  11. Slowik, J.: Crashoverride: reassessing the 2016 Ukraine electric power event as a protection-focused attack. Dragos Inc. (2019)

    Google Scholar 

  12. Tan, H.C., Cheh, C., Chen, B., Mashima, D.: Tabulating cybersecurity solutions for substations: towards pragmatic design and planning. IEEE Innov. Smart Grid Technol. Asia (ISGT Asia) 2019, 1018–1023 (2019)

    Google Scholar 

  13. Vu, T.V., Nguyen, B.L.H., Cheng, Z., Chow, M.-Y., Zhang, B.: Cyber-physical microgrids: toward future resilient communities. IEEE Ind. Electron. Mag. 14(3), 4–17 (2020)

    Article  Google Scholar 

  14. Anderson, D., Zhao, C., Hauser, C., Venkatasubramanian, V., Bakken, D., Bose, A.: “Intelligent design” real-time simulation for smart grid control and communications design. IEEE Power Energy Mag. 10(1), 49–57 (2012)

    Google Scholar 

  15. IEEE recommended practice for network communication in electric power substations. In: IEEE Std 1615-2019 (Revision of IEEE Std 1615-2007, pp. 1–140, 8 November 2019

    Google Scholar 

  16. Ustun, T.S., Hussain, S.M.S.: IEC 62351-4 security implementations for IEC 61850 MMS messages. IEEE Access 8, 123979–123985 (2020)

    Article  Google Scholar 

  17. Amoah, R., Camtepe, S., Foo, E.: Securing DNP3 broadcast communications in SCADA systems. IEEE Trans. Industr. Inf. 12(4), 1474–1485 (2016)

    Article  Google Scholar 

  18. Todeschini, M.G., Dondossola, G.: Securing IEC 60870-5-104 communications following IEC 62351 standard: lab tests and results. In: AEIT International Annual Conference (AEIT) 2020, pp. 1–6 (2020)

    Google Scholar 

  19. IEEE standard for the specification of microgrid controllers. In: IEEE Std 2030.7-2017, pp. 1–43, 23 April 2018. https://doi.org/10.1109/IEEESTD.2018.8340204

  20. Siaterlis, C., Genge, B., Hohenadel, M.: EPIC: a testbed for scientifically rigorous cyber-physical security experimentation. IEEE Trans. Emerg. Top. Comput. 1(2), 319–330 (2013). https://doi.org/10.1109/TETC.2013.2287188

    Article  Google Scholar 

  21. Tan, H.C., Cheh, C., Chen, B.: CoToRu: automatic generation of network intrusion detection rules from code. In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, pp. 720–729 (2022). https://doi.org/10.1109/INFOCOM48880.2022.9796697

Download references

Acknowledgment

This research is supported in part by the National Research Foundation, Singapore, under its National Satellite of Excellence Programme “Design Science and Technology for Secure Critical Infrastructure” (Award Number: NSoE_DeST-SCI2019-0008 and NSoE_DeST-SCI2021TG-0003), and in part by the National Research Foundation, Prime Minister’s Office, Singapore under its Campus for Research Excellence and Technological Enterprise (CREATE) programme, and in part by the SUTD Start-up Research Grant (SRG Award No: SRG ISTD 2020 157). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not reflect the views of National Research Foundation, Singapore.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lin Wei , Heng Chuan Tan or Binbin Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saifuddin, M.R., Wei, L., Tan, H.C., Chen, B. (2023). Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study. In: Katsikas, S., et al. Computer Security. ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science, vol 13785. Springer, Cham. https://doi.org/10.1007/978-3-031-25460-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25460-4_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25459-8

  • Online ISBN: 978-3-031-25460-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics