Cyber-security in Smart Grid Communication and Control, PhD Thesis

Abstract

Society is increasingly dependent on the reliable operation of power systems. Power systems, at the same time, heavily rely on information technologies to achieve efficient and reliable operation. Recent initiatives to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation and demand response. Thus for the reliable operation of smart grids, it is essential that its information infrastructure is secure and reliable in the face of both failures and attacks. This thesis contributes to improving the security of power systems against attacks on their information infrastructures. The contributions lie in three areas: data integrity, data confidentiality, and data availability of power system applications.

We analyze how characteristics of power system applications can be leveraged for detection and mitigation of data integrity attacks. We consider single and multi-area power system state estimation. For single-area state estimation, we look at the integrity of measurement data delivered over a wide area communication network. We define security metrics that quantify the importance of particular components of the communication network, and that allow us to optimize the deployment of network, transport and application layer security solutions. For multi-area state estimation, we look at the integrity of data exchanged between the control centers of neighboring areas in face of a targeted trojan that compromises an endpoint of the secure communication tunnel. We define multiple attack strategies and show that they can significantly disturb the state estimation. Moreover, we propose schemes that could be used for detection, localization, and mitigation of data integrity attacks.

We investigate how to provide data confidentiality for power system applications when they utilize cloud computing. We focus on contingency analysis and propose an approach to obfuscate information regarding power flows and the presence of a contingency violation while allowing the operator to analyze contingencies with the needed accuracy in the cloud. Our empirical evaluation shows that the errors introduced into power flows due to the proposed obfuscation are small, and that the RMS errors introduced grow linearly with the magnitude of obfuscation.

We study how to improve data availability in face of gray hole attacks combined with traffic analysis. We consider two cases: SCADA substation to control center communication using DNP3, and inter-control center communication. In the first case, we propose a support vector machine-based traffic analysis algorithm that uses only the information on timing and direction of three consecutive messages, and show that a gray hole attack can be effectively performed even if the traffic is sent through an encrypted tunnel. We discuss possible mitigation schemes, and show that a minor modification of message timing could help mitigate the attack. In the second case, we study how anonymity networks can be used to improve availability at the price of increased communication overhead and delay. We show that surprisingly availability is not always improved with more overhead and delay. Moreover, we show that it is better to overestimate than to underestimate the attacker's capabilities when configuring anonymity networks.

PhD Thesis Defense

  • Thesis: "Cyber-security in Smart Grid Communication and Control" [PDF]

  • Opponent: Prof. Deepa Kundur, University of Toronto

  • Grading Committee:

    • Prof. Stephen Wolthusen, University of London, the UK, and Gjøvik University College, Norway

    • Dr. Jorge Cuellar, Siemens AG, Germany

    • Prof. Mikael Johansson, KTH, Sweden

  • Date: Tuesday October 7th, 2014

  • Time: 10.00

  • Place: Hörsal F3, Lindstedtsvägen 26, KTH, Stockholm, Sweden

List of papers included in the Thesis

  1. Ognjen Vuković, Kin Cheong Sou, György Dán, and Henrik Sandberg, "Network-aware Mitigation of Data Integrity Attacks on Power System State Estimation,"
    in IEEE Journal on Selected Areas in Communications (JSAC), vol. 30, no. 6, July 2012. [PDF] [IEEEXplore]

  2. Ognjen Vuković and György Dán, "On the Security of Distributed Power System State Estimation under Targeted Attacks",
    in Proc. of ACM Symposium on Applied Computing (SAC), March 2013. [PDF][ACM DL]

  3. Ognjen Vuković and György Dán, "Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks,"
    in IEEE Journal on Selected Areas in Communications (JSAC), vol. 32, no. 7, July 2014. [PDF]

  4. Ognjen Vuković, György Dán, and Rakesh B. Bobba, "Confidentiality-preserving Obfuscation for Cloud-based Power System Contingency Analysis",
    in Proc. of IEEE SmartGridComm, October 2013. [PDF] [IEEEXplore]

  5. Ognjen Vuković, György Dán, and Gunnar Karlsson, "Mitigating Denial of Service Attacks using Anonymity Networks: Relationship Anonymity-Communication Overhead Trade-off",Submitted to IEEE Transactions on Parallel and Distributed Systems.

  6. Nunzio Marco Torrisi, Ognjen Vuković, György Dán, and Stefan Hagdahl, "Peekaboo: A Gray Hole Attack on Encrypted SCADA Communication using Traffic Analysis",in Proc. of IEEE SmartGridComm, November 2014. [PDF]

List of papers not included in the Thesis

  1. Ognjen Vuković and György Dán, "Detection and Localization of Targeted Attacks on Fully Distributed Power System State Estimation",
    in Proc. of IEEE SmartGridComm, October 2013. [PDF] [IEEEXplore]

  2. György Dán and Ognjen Vuković, "Utility-based PMU Data Rate Allocation under End-to-end Delay Constraints",
    IEEE COMSOC MMTC E-Letter, vol.7, no.8, November 2012. [PDF] [MMTC E-Letter]

  3. Ognjen Vuković, Kin Cheong Sou, György Dán, and Henrik Sandberg, "Network-layer Protection Schemes against Stealth Attacks on State Estimators in Power Systems",
    in Proc. of IEEE SmartGridComm, October 2011. [PDF] [IEEEXplore]

  4. Ognjen Vuković, György Dán, and Gunnar Karlsson, "Traffic Analysis Attacks in Anonymity Networks: Relationship Anonymity-Overhead Trade-off",
    in Proc. of 7th Swedish National Computer Networking Workshop (SNCNW), Jun 2011. [PDF]

  5. Ognjen Vuković, György Dán, and Gunnar Karlsson, "On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks",
    in Proc. of IEEE International Conference on Communications (ICC), Jun 2011. [PDF] [IEEEXplore]

  6. Ognjen Vuković, György Dán, and Gunnar Karlsson, "Minstrels: Improving Communications Availability via Increased Relationship Anonymity",
    Euro-NF Workshop on Traffic Engineering and Dependability in the Network of the Future, April 2010. [PDF]