publication . Preprint . 2016

Smart Grid Security: Threats, Challenges, and Solutions

Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj;
Open Access English
  • Published: 22 Jun 2016
Abstract
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quantify their effects, and c) devise appropriate security solutions. In this paper, the key threats targeting the smart grid are first exposed while assessing their effects on th...
Subjects
free text keywords: Computer Science - Information Theory, Computer Science - Computer Science and Game Theory
Download from

[1] D. Kushner, “The real story of stuxnet,” IEEE Spectrum, vol. 50, no. 3, pp. 48-53, March 2013.

[2] T. C. Robert M. Lee, Michael J. Assante, “Analysis of the cyber attack on the Ukranian power grid. defense use case.” SANS ICS, March 2016. [Online]. Available: http://www.nerc.com/pa/CI/ESISAC/ Documents/E-ISAC SANS Ukraine DUC 18Mar2016.pdf

[3] J. G. Kassakian, R. Schmalensee, G. Desgroseilliers, T. D. Heidel, K. Afridi, A. Farid, J. Grochow, W. Hogan, H. Jacoby, J. Kirtley et al., “The future of the electric grid,” Massachusetts Institute of Technology, Tech. Rep, pp. 197-234, 2011.

[4] Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1-33, May 2011.

[5] A. Sanjab and W. Saad, “Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective,” IEEE Transactions on Smart Grid, vol. to appear, 2016. [OpenAIRE]

[6] A. Sanjab and W. Saad, “On bounded rationality in cyber-physical systems security: Game-theoretic analysis and application to smart grid protection,” in IEEE/ACM CPS Week, Workshop on Cyber-Physical Security and Resilience in Smart Grids, April 2016. [OpenAIRE]

[7] Z. Zhang, S. Gong, A. Dimitrovski, and H. Li, “Time synchronization attack in smart grid: Impact and analysis,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87-98, March 2013.

[8] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in 47th Annual Allerton Conference on Communication, Control, and Computing, Sept. 2009, pp. 911-918. [OpenAIRE]

[9] F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, Nov 2013. [OpenAIRE]

[10] J. Pagliery, “Sniper attack on california power grid may have been an insider, dhs says,” CNN. com.

[11] W. Niemira, R. Bobba, P. Sauer, and W. Sanders, “Malicious data detection in state estimation leveraging system losses and estimation of perturbed parameters,” in IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2013, pp. 402-407.

[12] Z. Zhang, M. Trinkle, A. D. Dimitrovski, and H. Li, “Combating time synchronization attack: A cross layer defense mechanism,” in ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), April 2013, pp. 141-149.

[13] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results in networked control systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.

[14] S. Bi and Y. J. Zhang, “Graphical methods for defense against false-data injection attacks on power system state estimation,” IEEE Transactions on Smart Grid, vol. 5, no. 3, pp. 1216-1227, May 2014.

[15] T. Alpcan and T. Bas¸ar, Network security: a decision and game-theoretic approach. New York: Cambridge University Press, 2011.

Any information missing or wrong?Report an Issue