Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
20 views22 pages

7 Security

Smart grids are vulnerable to cyberattacks due to increased connectivity, reliance on legacy systems, and the complexity of their ecosystems. The lack of standardized security protocols and human factors, such as insider threats, further exacerbate these vulnerabilities. Additionally, emerging technologies and evolving threats, along with regulatory challenges, pose significant risks to the security of smart grids.

Uploaded by

JATIN KHATRI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views22 pages

7 Security

Smart grids are vulnerable to cyberattacks due to increased connectivity, reliance on legacy systems, and the complexity of their ecosystems. The lack of standardized security protocols and human factors, such as insider threats, further exacerbate these vulnerabilities. Additionally, emerging technologies and evolving threats, along with regulatory challenges, pose significant risks to the security of smart grids.

Uploaded by

JATIN KHATRI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Why Smart Grids Are Susceptible to Cyberattacks?

1. Increased Connectivity and Interdependence


• Interconnected Systems: Smart grids rely on a vast network of interconnected devices, such as
smart meters, sensors, controllers and communication systems.
• Internet of Things (IoT) Devices: The integration of IoT devices into smart grids introduces
vulnerabilities, as many of these devices lack robust security features and are often designed with
functionality prioritized over security.
• Remote Access: Smart grids often allow remote monitoring and control, which increases the
attack surface. Attackers can exploit weak remote access protocols to gain unauthorized entry.
Why Smart Grids Are Susceptible to Cyberattacks?

2. Legacy Systems and Outdated Infrastructure


• Aging Infrastructure: Many smart grids are built on top of legacy systems that were not designed
with cybersecurity in mind. These systems often lack modern security features, making them easy
targets for attackers.
• Incompatibility: Legacy systems may not be compatible with modern security solutions, leaving
gaps in the grid's defenses.
• Lack of Updates: Older systems may no longer receive software updates or patches, leaving known
vulnerabilities unaddressed.
Why Smart Grids Are Susceptible to Cyberattacks?

3. Complexity of the Smart Grid Ecosystem


• Diverse Components: Smart grids consist of a wide range of components, including hardware,
software, communication networks, and control systems. The complexity of managing and securing
all these components increases the likelihood of vulnerabilities.
• Multiple Stakeholders: Smart grids involve multiple stakeholders, including utility companies,
technology providers, and consumers. Coordinating security measures across these stakeholders can
be challenging, leading to potential gaps in security.
Why Smart Grids Are Susceptible to Cyberattacks?

4. Lack of Standardized Security Protocols


• Inconsistent Standards: The lack of universally adopted cybersecurity standards for smart grids
can lead to inconsistent security practices across different components and systems.
• Proprietary Systems: Some smart grid components use proprietary protocols that may not be
thoroughly tested for security vulnerabilities, making them susceptible to exploitation.

5. Human Factors and Insider Threats


• Human Error: Employees or contractors may inadvertently introduce vulnerabilities through
misconfigurations, weak passwords, or falling victim to phishing attacks.
• Insider Threats: Malicious insiders with access to smart grid systems can intentionally cause harm,
either for personal gain or as part of a larger attack.
Why Smart Grids Are Susceptible to Cyberattacks?

6. Supply Chain Vulnerabilities


• Third-Party Risks: Smart grids rely on components and software from various suppliers.
Vulnerabilities in these third-party products can be exploited by attackers to compromise the grid.
• Lack of Oversight: Ensuring the security of all components in the supply chain is challenging,
especially when dealing with international suppliers or complex software dependencies.
7. Emerging Technologies and Evolving Threats
• IoT and Edge Computing: The integration of IoT devices and edge computing into smart grids
introduces new vulnerabilities, as these technologies often lack robust security features.
• AI and Machine Learning: While AI and machine learning can enhance grid operations, they can
also be exploited by attackers to develop more sophisticated attacks.
• Zero-Day Vulnerabilities: Attackers can exploit previously unknown vulnerabilities (zero-days) in
smart grid systems before they are patched.
Why Smart Grids Are Susceptible to Cyberattacks?

8. Regulatory and Compliance Challenges

Cybersecurity regulations for smart grids are still evolving and may not always keep pace with emerging threats
Key Cyberattacks on Energy Sector
Cyber Attacks around the World over the Past 10 Year
Instances of Cyber Attacks on Indian Energy Sector

• November 2017 malware attack on THDC Ltd’s Tehri dam in Uttarakhand


• May 2017 ransomware attack on West Bengal State Electricity Distribution Co. Ltd (WBSEDCL)
• February 2018 attack on a Rajasthan DISCOM website
• March 2018 attack on Haryana DISCOM iscoms in which the commercial billing software of the highest paying industrial
customers was hacked
• The National Critical Information Infrastructure Protection Centre also reported several vulnerabilities in the power
utilities of states in May 2018.
• On October 12, 2020, India’s financial capital, Mumbai, was hit by a massive power outage
• 7th April 2022, unsuccessful cyber attack by Chinese hackers was reported targeting the seven ‘Load Dispatch Centres’ in
northern India which are responsible for carrying out operations for grid control and power distribution in the areas near
Ladakh.
• October 2022, Tata Power Company Limited had a cyber attack on its IT infrastructure impacting some of its IT systems
more
Targets of Cyber Attacks

M : Monitor, P : Protection and C : Control


Various Types of Cyber Attacks
 Data spoofing
 IP Spoofing
 DNS Spoofing

 Man-in-the-middle attack Spoofing


 Integral attack
Cryptanal Jamming
 Cipher-text attack -ysis Attack
 Dictionary attack
Attack on network
communication
Denial of Communication interception
 Viruses Malwares 
Service
 Data sniffing
 Trojans Cyber Attacks  Flood services
 Ransom-ware
 Spyware  Failure services
 Botnets  Jamming/disrupting wireless
 Adware Eaves- communication environments
Phishing  Distorting the communication
-dropping
channels/messages
 Replay attack
Forging
 Fake alerts Sensors/ Hacking  Cloud systems
 False data injection data hacking
 Data breaches  Sensors hacking
 Forgery of identity
False Data Injection Attack : Taxonomy

• False data attack models: There are various threat models of FDI to corrupt the cyber–physical
infrastructure of the Smart Grid. While some adversarial models require complete information on network
data and topological configurations, others require limited resources. Data-driven approaches are also
employed to construct the stealthy FDI attacks
• False data attack targets: Coordinated cyberattackers try to target various elements of the Smart Grid. The
vulnerable components include, but not limited to, power generators, transmission lines, substation networks,
renewable energy sources, monitoring and control centers, smart electronic devices, network and
communication systems
• Impact of false data attacks: The growing threat of cyberattacks against the critical Smart Grid
infrastructure have devastating impacts on the stability, reliability, economy, customer data privacy, and
social welfare.
False Data Injection Attack : Taxonomy

MMS : Market management system


GT : Grid Topology
FDIA:-
Definition:-A False Data Injection Attack (FDIA) is a type of cyberattack in which an
attacker manipulates sensor or measurement data in a power system to mislead control
decisions, cause system instability, or hide malicious activities.

Types of FDIA and parameters:-


FDIA TYPE Attack Signal Parameter
Step Attack 𝑓 =𝛼 𝛼 is a constant.
Ramp Attack 𝑓 = 𝛼 .𝑡 𝛼 is a slope.

Sine Attack 𝑓 =𝛼 . sin(𝛼 .t) 𝛼 is a amplitude.


𝛼 is a frequency.
Pulse Attack 𝑓 =𝛼 , t ∈ 𝑇 𝑇 is a time period
Scalling Attack 𝑓 =𝛼 . 𝑦 𝛼 is the scaling gain. [1]

14
• Load redistribution attack is a specified type of FDIA.
Detection Techniques
1. Chi Square Technique.
2. Weighted least Square.
3. Kullback leibler.
4. Kalman Filter[1],[2].
5. KF + RSC(Recurssive Systematic Convolution)[1],[2].
6. Short term state prediction.
7. Normalized residue test.
8. Greedy Algorithmn[3].
9. SARIMAX Model(Seasonal Autoregressive integrated Moving Average with exogeneous
regressors)[4].
Mitigation strategies of LR Attack
1. PST Based Mitigation Strategy[5],[6].
2. Dynamic Line rating Based mitigation strategy[7].
3. Column and constraints Based Mitigation Strategy[5].
4. Approximate Solution based Mitigation strategy[5].
5. Mixed defence strategy[5].
15
Types of Load Altering Attack:-
1. Static Load Altering Attack (SLAA)
Definition:- A Static Load Altering Attack (SLAA) is a cyberattack where an adversary
alters the load demand in a power grid in a sudden and sustained manner. This attack
disrupts the grid’s stability by permanently increasing or decreasing the load.
Characteristics:-
• The load change is sudden and remains constant.
• It leads to a steady-state shift in grid operations.
• Can cause frequency deviations and potential grid instability.
• Easier to detect due to its abrupt nature.
Example:- An attacker remotely compromises smart meters and forces multiple devices to turn
on/off simultaneously, leading to sudden demand fluctuations that stress the grid.

16
2. Dynamic Load Altering Attack (DLAA)
Definition:-A Dynamic Load Altering Attack (DLAA) is a cyberattack where an adversary
continuously manipulates the load demand in a time-varying manner. The attacker
dynamically adjusts the load to exploit grid dynamics and cause oscillations.
Characteristics:-
• The load change is time-varying and follows a specific pattern.
• Harder to detect as fluctuations appear like normal variations.
• Can induce oscillatory instability in the power system.
• More dangerous as it can exploit grid frequency response mechanisms.
Example:-An attacker programs a botnet of compromised IoT devices to continuously and
subtly vary power consumption in a pattern that resonates with the grid’s natural frequency,
causing unstable oscillations and potential system failure.

17
Difference in SLAA and DLAA:-
Feature Static LAA (SLAA) Dynamic LAA (DLAA)
Time-Varying &
Load Change Type Sudden & Constant
Oscillatory
Detectability Easier Harder
Effect on Grid Frequency Deviation Oscillatory Instability
Attack Complexity Lower Higher
Potential Damage Moderate Severe
Mostly Used for Detection Technique:-
Technique SLAA DLAA
Chi Square Technique. 
Weighted least Square. 
Kullback leibler.  
Kalman Filter 
Greedy Algorithmn 
Short term state prediction 
SARIMAX Model 
Normalized residue test   18
Load Redistribution Attack : Mathematical Modelling

A Load Redistribution (LR) Attack is a type of false data injection attack (FDI) in smart grids where an adversary
manipulates load measurements to mislead the system operator into redistributing power flows in a way that can
cause overloads, line failures, or even blackouts.
Load Redistribution Attack : Mathematical Modelling

Upper Level : Attacker


Load Redistribution Attack : Mathematical Modelling

Lower Level : System Operator


REFERENCES:-
1. Xiahou, Kaishun, Yang Liu, and Q. H. Wu. "Decentralized detection and mitigation of multiple false data injection
attacks in multiarea power systems." IEEE Journal of Emerging and Selected Topics in Industrial Electronics 3.1
(2021): 101-112.
2. Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack
in smart grid using Kalman filter. IEEE transactions on control of network systems, 1(4), 370-379.
3. Kaviani, R., & Hedman, K. W. (2020). A detection mechanism against load-redistribution attacks in smart grids. IEEE
Transactions on Smart Grid, 12(1), 704-714.
4. Deng, W., Xiang, Z., Huang, K., Liu, J., Yang, C., & Gui, W. (2023). Detecting intelligent load redistribution attack
based on power load pattern learning in cyber-physical power systems. IEEE Transactions on Industrial
Electronics, 71(6), 6285-6293.
5. Liu, C., Zhu, H., Zhou, M., Deng, R., Tang, Y., & Du, W. (2024). Phase shifting transformer-based mitigation strategy
for load redistribution attacks in power system optimal power flow. IEEE Transactions on Smart Grid.
6. H. Zhu, C. Liu, M. Zhou, Y. Tang and W. Du, "Load redistribution attack in optimal power flow with phase shifting
transformers", Proc. IEEE 6th Int. Conf. Ind. Cyber Phys. Syst. (ICPS), pp. 1-6, 2023.
7. M. Zhou, J. Wu, C. Long, C. Liu and D. Kundur, "Dynamic-Line-Rating-Based Robust Corrective Dispatch Against Load
Redistribution Attacks With Unknown Objectives," in IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17756-17766, 15
Sept.15, 2022.

22

You might also like