Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping

Size: px
Start display at page:

Download "Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping"

Transcription

1 Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping Muhammad Naveed Aman, Kashif Javed, Biplab Sikdar, and Kee Chaing Chua Department of Electrical & Computer Engineering National University of Singapore Singapore Department of Electrical Engineering National University of Computer & Emerging Sciences Pakistan Abstract Phasor Measurement Units (PMUs) and Wide Area Measurement Systems (WAMS) have emerged as the enabling technologies for the real time monitoring, control, and operation of future smart grids. However, this cyber-infrastructure is vulnerable to a wide range of cyber security threats. Among these, one of the major threats is data tampering or data modification attacks. In these attacks, the adversary can modify/change the data of PMU packets to cause significant damage to the grid s operation and equipment. To address this problem, this paper presents a method for detecting data tampering in synchrophasor networks. The proposed protocol uses a random time hopping sequence to detect data tampering. The PMU and phasor data concentrator (PDC) share a secret seed to generate a random time hopping sequence, while a hash value of the packets combined with a secret key is used to validate the integrity of PMU packets. Security analysis of the proposed protocol shows that it can detect data tampering attacks such as data modification, data injection, and replay attacks. Our performance analysis shows that the scheme has the efficiency and robustness required for real time applications in a smart grid. I. INTRODUCTION The IEEE C standard defines a synchrophasor as a representation of the complex phasor of an alternating current (AC) power system at the nominal system frequency synchronized to UTC (coordinated universal time) [1]. PMUs are devices which measure synchrophasors for the voltage and current with high accuracy at different buses of the electric power grid. The PMUs have an accuracy better than 1% and receive time for synchronization from a highly reliable source such as the Global Positioning System (GPS) [1]. Submultiples of the power-line frequency can be used as the sampling rates for PMUs. The reporting rates of a PMU can be 10, 25 or 50 samples per second for 50Hz systems. PMUs send their data to a PDC over a communication network, whereas, the PDC after aggregating the data from multiple PMUs forwards it to a control center. The control center may use the PMU data for various power system applications such as system state estimation, fault event monitoring, postdisturbance analysis, system stability, security-dependability, and real time monitoring and control of a power system. Reliability is a critical requirement of a power grid due to the dependence of a nation s industry and population on the /16/$31.00 c 2016 IEEE smooth and uninterrupted supply of electricity. With the progressive move towards widespread deployment of smart grids, PMUs will play an important role in the real time monitoring, operation, and control of future power grids. Moreover, the reliance on measurement data for making critical decisions by system operators is on the rise. Increasingly, PMUs are being deployed at a diverse range of locations in the power system such as substations, control centers, transmission lines, and power generators to support such decision making. The fact that PMU data travels over legacy data networks and given the geographic disparity of their locations, makes PMUs vulnerable to a number of cyber attacks. The focus of this paper is on data tampering attacks. In such attacks, an adversary tries to modify the data of PMU packets, which in turn leads to an incorrect or biased estimate of the state of the power system. As a result, such attacks may mislead the system operators into making incorrect decisions. The consequences of such attacks are discussed in [2]. These include, but are not limited to, sub-optimal economic dispatch, increased robustness/resiliency losses, and blackouts resulting from cascading failures. To safeguard synchrophasor networks against such attacks, this paper presents a method to detect data tampering by attackers in a synchrophasor network. The proposed methodology is based on implementing a two-step, randomized strategy for sending validation information. The rest of the paper is organized as follows. In Section II we discuss the related work. Section III discusses the network model, assumptions and the threat model considered in this paper. Section IV presents the proposed protocol for detecting data tampering in synchrophasor networks. Section V discusses the effect of various attacks on the proposed protocol while Section VI presents a performance analysis of the proposed protocol. Finally Section VII concludes the paper. II. RELATED WORK Malicious data modifications may be viewed as bad data, a term which has traditionally been used to denote measurements from faulty equipment. Power system state estimators use bad data detection techniques based on a statistical analysis of the measurement residuals. An L 2 -norm or the Largest

2 2 Normalized Residual (LNR) of the measurements is used to detect outliers/bad measurements [3], [4], [5]. However, these techniques assume that the bad data is due to measurement errors or communication errors. Thus, most bad data detection techniques assume the measurement residuals to be independent. This independence assumption can be exploited by an adversary by introducing structured interactions among the bad data and causing the bad data detector to fail against data tampering attacks. The authors of [6] were the first to describe a method to to carry out a data injection attack on power system state estimation. They showed that by using the knowledge of the configuration of a power system, an adversary can introduce arbitrary errors into the state variables by fooling a bad data detector. The authors of [7] show the minimum number of measurements an adversary needs to modify in order to affect the state model. In [8] the authors introduce security indices for state estimators. They show that these indices can be used to quantify the effort needed to succeed in a data modification attack. In another work by [9], the authors investigate the problem of defending against data tampering attacks from the perspective of an operator. They show a minimum size set of measurements which needs to be protected, to ensure observability of the system. The authors of [2], developed metrics to assess the economic impact of data integrity attacks on electric power grids. They showed that data integrity attacks can lead to specious decisions by the operators, causing significant economic and physical damage. In [10], the authors show that by protecting a small subset of measurements a power system may defend itself against data injection attacks. They show that the problem of selecting such subsets is a complex combinatorial problem and can be solved using a greedy approach. Most of the existing work on data tampering attacks is based on the assumption that a subset of PMUs can be protected and made completely safe. However, this assumption is not feasible given the large number of PMUs and the diversity of the location. Thus, this paper addresses the problem of securing synchrophasor networks without making such strong assumptions. III. NETWORK MODEL, ASSUMPTIONS, AND THREAT A. Network Model MODEL Figure 1 describes our network model. In this model we have PMUs, routers, the Internet, and a PDC. Each PMU is connected to the GPS satellites to obtain synchronized clock information. Moreover, the PMUs connect to the network through a router and the data is carried over the Internet to the PDC. B. Assumptions We make the following assumptions regarding the network model and proposed protocol: Fig. 1. Network Model a. PMU packet format is according to the IEEE std C [1]. The various fields and their sizes for a typical PMU packet are shown in Table I. TABLE I DATA PACKET FORMAT FOR A PMU [1] No. Field Size (bytes) 1 SYNC 2 2 FRAMESIZE 2 3 IDCODE 2 4 SOC 4 5 FRASEC 4 6 STAT 2 7 PHASORS 4/8 per phasor 8 FREQ 2/4 9 DFREQ 2/4 10 ANALOG 2/4 per value 11 DIGITAL 2 per value 12 CHK 2 b. PMUs use the UDP-only method for communication. In this method the PMU send all their data using UDP. Moreover, it is assumed that each PMU sends its data to only one PDC i.e., a unicast address. c. Each PMU packet is inserted into the payload of a UDP packet, and the resulting UDP segment is further encapsulated using the normal TCP/IP protocol suite. d. The hash function used in the proposed protocol is public. e. The adversary can listen to all the traffic going through the network, maliciously inject packets into the network, repeat previous messages, and imitate another node. f. The PDC is secure. However, the PMUs and other network entities such as routers and communication links may be compromised. g. The PMU data may or may not be encrypted. However, the adversary is capable of breaking the encryption. h. The first sixteen bytes of the ANALOG field of the PMU packet are reserved for data validation. If a PMU needs to send some extra data in this field, it can do so by skipping the first sixteen bytes.

3 3 TABLE II NOTATIONS Notation ID i H(X) [Ex] Mem [Ex] Rec F [a : b] Description IDCODE of a PMU stream XOR operation Hash of X Concatenation operator Expression Ex is evaluated using the device s memory Expression Ex is evaluated using the values from the received message Bytes a to b of the F field in a PMU packet C. Threat Model PMUs send the measured synchrophasors to the PDC using a communication network. The PMUs use UDP/IP to send data over the Internet to a PDC, and the PMU data may traverse multiple network routers and communication links. An adversary is assumed to have compromised one or more of these network entities or the PMU itself to launch a data tampering attack. The objective of the adversary is to manipulate the PMU data in such a way as to cause maximum damage. However, he/she wants to achieve this objective without being detected. The adversary wishes to induce inaccuracies in the state estimation, which may results in power outages, equipment damage, and other undesirable consequences. The objective of this paper is develop a mechanism to detect data tampering in synchrophasor networks. IV. PROPOSED SECURE DATA TRANSFER PROTOCOL FOR PMUS Fig. 2. Protocol Flow In this section we describe the proposed mechanism for detecting data tampering in synchrophasor networks. The set of notations used to describe the protocol are given in Table II. We assume that there is a secure way of establishing a symmetric key between the PDC and PMU before the proposed protocol begins its operation and that the key is refreshed on a regular basis to avoid replay attacks. The PMU saves in its memory the hash of the IDCODE H(ID i ) and a shared key k i for each of its data streams, while, the PDC saves a pair of k i and H(ID i ) for all PMU streams. Figure 2 shows a top level flow of the protocol. Figure 2 shows that the proposed protocol checks the validity of the PMU data by using packets at random points in time to carry the validation information. In other words, the PMU puts in the validation check in random packets and the PDC validates all the previous PMU data by checking this validation information. The proposed protocol can be divided into two phases: an initial seed sharing phase and a data transfer phase. A. Seed Sharing The seed sharing phase is shown in Figure 3. This is a two way protocol to share a seed between the PMU and PDC. This seed is used in the data transfer phase to generate the random Fig. 3. Seed Sharing Phase time hopping sequence. The seed sharing protocol works as follows: 1) The PMU initially sends the following four pieces of information to the server H(ID i ) (1) H(H(ID i ) k i ) (2) k i R A (3) H(H(ID i ) R A k i ) (4) where k i is the symmetric key shared between the PDC and PMU, and R A is a random number generated by the PMU. 2) The PDC searches its memory for H(ID i ) of the current PMU stream. If the search fails, the PDC rejects the seed sharing request. Otherwise, the PDC checks the following: [H(H(ID i ) k i )] Mem. = [H(H(IDi ) k i )] Rec (5)

4 4 i.e., the PDC constructs H(H(ID i ) k i ) using the parameters from its memory and compares it to the same expression received in the seed sharing message. If Equation (5) does not hold, the PDC rejects the message. Otherwise, the PDC calculates the random number generated by the PMU using the following: R A = k i [k i R A ] Rec. (6) The PDC then verifies the following: [H(H(ID i ) R A k i )] Mem. = [H(H(IDi ) R A k i )] Rec. (7) If Equation (7) fails verification, the PDC stops here. Otherwise, the PDC generates a random number R B and sends the following to the PMU: k i R B (8) H(H(ID i ) R A R B k i ). (9) 3) The PMU calculates the PDC s random number using the following R B = k i [k i R B ] Rec. (10) The PMU then verifies [H(H(ID i ) R A R B k i )] Mem. = [H(H(ID i ) R A R B k i )] Rec. (11) If Equation (11) does not hold the PMU cancels the seed sharing request. Otherwise, the secret seed to be used for the random sequence generator at the PMU and PDC is established as follows S i = H(R A ) H(R B ). (12) We denote this seed as S i. Moreover, to hide the validation information during the data phase, the PMU and PDC generate another secret key, which we call the time hopping key K T H. K T H is established using R A and R B as follows K T H = H(R A R B ). (13) To ensure freshness of the seed and time hopping key, the PMU and PDC may repeat the seed sharing after regular intervals of time. B. Data Transfer Once the seed sharing is complete, the PMU and PDC share three secrets, namely: two symmetric keys k i and K T H, and a secret seed S i. The proposed protocol for the data transfer phase is shown in Figure 4. The PMU and PDC generate a random time hopping sequence using the shared secret seed. It is desirable to use a technique which produces random sequences with good hamming correlation characteristics. Well known techniques for providing such sets of sequences may be adopted [11]. Let us assume that the PMU and PDC generate the follow- Fig. 4. ing time hopping sequence Data Transfer Phase T H Sequence = T 1, T 2, T 3 (14) The idea behind using this random sequence is that the adversary should not be able to infer the timing of the validation packets. Moreover, the adversary should not be able to differentiate between the normal and validation packets. To hide the validation information in the packets, we use the ANALOG field of a PMU packet. Each PMU will send sixteen bytes in the AN ALOG field. A non-validation packet will have randomly generated dummy values in this field while the validation packets will contain a hash of the previous data packets to be used for validation. The hash value is calculated as follows H CHK = H(P Ti H(P 2 H(P 1 K T H )) ). (15)

5 5 The protocol works as follows in the data transfer phase: 1) The PMU calculates the first hash value as H(P 1 K T H ) for the first packet P 1, and sends P 1 to the PDC. 2) The PDC receives P 1 and calculates the first hash value just like the PMU. 3) The PMU calculates the next hash value as follows: H CHK = H(P 2 H CHK ) (16) = H(P 2 H(P 1 K T H )). 4) This process continues until we reach a validation packet i.e. T 1 in this case. The PMU calculates the new hash value for validation and puts it in the first sixteen bytes of the ANALOG field of the PMU packet. The PMU sends this validation packet to the PDC. 5) The PDC calculates the new validation hash value i.e., H CHK. However, when P kt count reaches the respective time hop in the random time hopping sequence, the PDC reads the first sixteen bytes of the ANALOG field in the PMU packet and verifies the calculated H CHK with the one received in the ANALOG field. The process is as follows [H CHK ] REC = ANALOG[1 : 16] (17) Verify: [H CHK ] MEM. = [HCHK ] REC. (18) If Equation (18) is validated the data transfer continues. Otherwise, the PDC raises an alarm and alerts the operator of suspicious activity. V. SECURITY ANALYSIS In this section we present a security analysis of the proposed protocol, and show that it is not only immune to the data tampering attack but also to other types of attacks. A. Data Tampering Attack Most of the encryption schemes are based on secret keys. However, keys may be broken, stolen or accidentally revealed. If the encryption scheme of a synchrophasor network is broken, an adversary can cause significant damage to the power system in the form of power outages, high voltage surges, and so on. There are three ways an adversary may launch a data tampering attack: (i) through data modification, (ii) through data injection, and (iii) through data replay. Next, we discuss the impact of these attacks on the proposed protocol. 1) Data Modification: An adversary may try to change the values of the phasors or the time stamps being carried in a PMU packet. An adversary can break our scheme only if he/she can put the correct validation information in the correct validation packet. Just by looking at the contents of the AN ALOG field an adversary can not infer any information regarding the location or value of the validation hash function. To get a better understanding, consider Figure 5 Figure 5 shows the ANALOG fields of each PMU packet. As we can see this field contains dummy values except for the packets at the random time hopping sequence. Note that if an adversary starts observing the packets right from the first packet P 1, he/she may be able to take the hash of each packet, update the hash value and compare the resulting with the contents of the AN ALOG field of future packets. However, without having the time hopping key K T H, he/she can not construct the first hash function i.e., H(P 1 K T H ). Thus, the adversary is unable to modify the contents of any PMU packet without being detected. 2) Data Injection: In a data injection attack, an adversary may try to insert malicious packets into the PMU data stream. The adversary tries to construct valid data and send it as a PMU packet posing as coming from a legitimate PMU. To successfully launch this kind of attack the adversary needs the knowledge of the current validation hash value. However, as shown in Section V-A1, an adversary cannot gain information regarding the current validation hash value just by looking at the PMU packets. 3) Replay Attack: An adversary may try to resend older packets. However, due to the random time hopping scheme the validation packet of the older incarnation will not lie at the same place as the current run of the protocol. Thus, our scheme can easily detect this kind of attack. B. Identity Protection PMUs should not reveal information about the location from which the measurements were taken. An adversary can use this information to launch an attack on a specific entity or part of the power system. The proposed protocol uses a hash of the identity of the PMU stream. This ensures that the PMUs identity is hidden from the adversary. C. Comparison with Message Authentication Codes Traditional message authentication codes (MACs) for verifying the integrity of data packets use a hash of the message with a shared secret as the means to identify data tampering. However, an implicit assumption for data tampering or modification attacks is that the attacker has the ability to break encryption schemes. Given this assumption, If MACs are used to verify the integrity of every PMU packet, the adversary can break the MACs. On the other hand, under our scheme the adversary has no information regarding the random time hopping sequence and does not know which packets carry the validation information. Thus, the adversary cannot break the validation scheme. The proposed method to detect data tampering attacks acts as an extra layer of protection to hide information that the adversary may exploit. VI. PERFORMANCE ANALYSIS In this section we analyze the performance of our proposed protocol. One of the important requirements for synchrophasor security protocols is that it should be computationally efficient and have very low verification delays. This is necessary for the paramount requirement of availability in synchrophasor networks i.e., information should always be available at the right time. Thus, a good security protocol for synchrophasor networks should be able to support real time applications.

6 6 Fig. 5. Flow of Data Packets A. Computational Efficiency Let N H, and N denote the number of hash operations, and number of exclusive-or operations, respectively. Table III shows the computational complexity of the proposed protocol. TABLE III COMPUTATIONAL BURDEN OF THE PROPOSED PROTOCOL Task PMU PDC Seed Sharing 5N H + 3N 5N H + 3N K T H Construction Data Packets (Per Packet) Table III shows that the computational burden is very low. On the other hand, signature based schemes are much more computationally complex. For example, the RSA digital signature requires atleast 1500 arithmetic operations for a 1024 bit key. B. Verification Delay Table III shows that once the seed sharing is done, the per packet computational requirement is just one hash operation. This low computational complexity translates into low verification delay. Thus, the proposed protocol has excellent delay characteristics and can support real time applications such as real time modeling of the power system. C. Communication Overhead If we assume the output of the hash function to be 128 bits, the proposed protocol requires 16 bytes of extra overhead to be sent with each PMU packet. However, many encryption based schemes require much more overhead typically in the range of 128 to 256 bytes. Thus, the proposed protocol requires very low communication overhead as compared to other security schemes. D. Storage Requirement The PMU and PDC only store the H(ID i ), k i, K T H, and S i. Assuming each one is 128 bits, we need to store only 512 bits in the PDC as well as the PMU. This shows that the proposed protocol has very low storage requirements. VII. CONCLUSIONS This paper presented a method to detect data tampering in synchrophasor networks. The protocol has two phases, the initial seed sharing phase and a data transfer phase. The seed sharing phase is used to establish a secret seed and a time hopping key using random numbers generated by the PMU and PDC. The data transfer phase uses the secret seed to generate a random time hopping sequence. This time hopping sequence is used by the PMU and PDC to identify the packets which carry validation information. The data packets are validated using a hash function of the packets and the time hopping key. The security analysis of the protocol shows that it is immune to data tampering attacks such as data modification and data injection. We also showed that the proposed protocol is safe against replay attacks and also keeps the identity of PMUs hidden. A performance analysis of the protocol showed that the proposed protocol has low computational complexity, verification delay, communication overhead, and storage requirements. These characteristics make the proposed protocol suitable for real time applications in synchrophasor networks. REFERENCES [1] Synchrophasor Data Transfer for Power Systems, IEEE Standard C , [2] A. Giani, R. Bent, M. Hinrichs, M. McQueen, and K. Poolla, Metrics for assessment of smart grid data integrity attacks, IEEE Power and Energy Society General Meeting, pp.1-8, July [3] E. Handschin, F. Schweppe, J. Kohlas, and A. Fiechter, Bad data analysis for power system state estimation, IEEE Transactions on Power Apparatus and Systems, vol. 94, no.2, pp , March [4] M. Baran, and A. Abur, Power System State Estimation, Wiley Encyclopedia of Electrical and Electronics Engineering, [5] Y. Deng, and S. Shukla. Vulnerabilities and Countermeasures: A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid, J. Cyber Security and Mobility, vol. 1, no. 2, pp , [6] Y. Liu, P. Ning, and M. K. Reiter, False data injection attacks against state estimation in electric power grids, Proceedings of ACM Conference on Computer and Communications Security, pp.21-32, Chicago, IL, November [7] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, Malicious Data Attacks on the smart grid, IEEE Transactions on Smart Grid, vol. 2, no. 4, pp , [8] H. Sandberg, A. Teixeira, and K. Johansson, On Security Indices for State Estimators in Power Networks, First Workshop on Secure Control Systems, Stockholm, Sweden, [9] R. B. Bobba, K. M. Rogers, Q. Wang, and H. Khurana, Detecting false data injection attacks on DC state estimation, Proceedings of the First Workshop on Secure Control Systems, [10] T. T. Kim, and H. V. Poor, Strategic Protection Against Data Injection Attacks on Power Grids, IEEE Transactions on Smart Grid, vol.2, no.2, pp.326,333, June [11] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Communications Handbook,revised ed. New York: McGraw Hill, 1994.

A Survey on False Data Injection Attack and Detection in Smart Grid

A Survey on False Data Injection Attack and Detection in Smart Grid A Survey on False Data Injection Attack and Detection in Smart Grid Presenter: Yessica Saez Submitted in Partial Fulfillment of the Course Requirements for ECEN 689: Cyber Security of the Smart Grid Instructor:

More information

Cyber Security Analysis of State Estimators in Electric Power Systems

Cyber Security Analysis of State Estimators in Electric Power Systems Cyber Security Analysis of State Estimators in Electric Power Systems H. Sandberg, G. Dán, A. Teixeira, K. C. Sou, O. Vukovic, K. H. Johansson ACCESS Linnaeus Center KTH Royal Institute of Technology,

More information

Improved Protection Scheme for Data Attack on Strategic Buses in the Smart Grid

Improved Protection Scheme for Data Attack on Strategic Buses in the Smart Grid Improved Protection Scheme for Data Attack on Strategic Buses in the Smart Grid Charith Wickramaarachchi, Sanmukh R. Kuppannagari, Rajgopal Kannan and Viktor K. Prasanna Department of Computer Science

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

Cyber Security for Smart Grid Devices

Cyber Security for Smart Grid Devices Cyber Security for Smart Grid Devices Annarita Giani Electrical Engineering & Computer Sciences University of California at Berkeley agiani@eecs.berkeley.edu Trustworthy Cyber Infrastructure for the Power

More information

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

IEEE C Synchrophasor Communication Framework

IEEE C Synchrophasor Communication Framework IEEE C37.118-2 Synchrophasor Communication Framework Khan, R., McLaughlin, K., Laverty, D., & Sezer, S. (2016). IEEE C37.118-2 Synchrophasor Communication Framework. In Proceedings of the 2nd International

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis Yuqi Zhou, Jorge Cisneros-Saldana, Le Xie Department of Electrical and Computer Engineering Texas A&M University

More information

A Software Development Toolkit for Real-Time Synchrophasor Applications

A Software Development Toolkit for Real-Time Synchrophasor Applications A Software Development Toolkit for Real-Time Synchrophasor Applications Luigi Vanfretti 1, Vemund H. Aarstrand 2, M. Shoaib Almas 1, Vedran S. Perić 1 and Jan O. Gjerde 2 1 Abstract This article presents

More information

Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures

Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures Authors: O. Kosut, J. Liyan, R. J. Thomas and L. Tong Presenter: Daehyun. Choi Submitted in Partial Fulfillment

More information

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement 1 Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi School of Applied Sciences, Gautam Buddha University, Greater Noida, India sonamdevgan11@gmail.com,

More information

Integrated Smart Grid Performance Testing: NIST Research and SG Testbed

Integrated Smart Grid Performance Testing: NIST Research and SG Testbed Integrated Smart Grid Performance Testing: NIST Research and SG Testbed Jerry FitzPatrick National Institute of Standards and Technology Applied Electrical Metrology Group i-pcgrid March 28, 2018 Energy

More information

9 th Electricity Conference at CMU

9 th Electricity Conference at CMU Power Systems/Communication System Co-Simulation and Experimental Evaluation of Cyber Security of Power Grid Yi Deng, Sandeep Shukla, Hua Lin, James Thorp February 5, 2014 9 th Electricity Conference at

More information

Survey of Cyber Moving Targets. Presented By Sharani Sankaran

Survey of Cyber Moving Targets. Presented By Sharani Sankaran Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of

More information

Detecting Insider Attacks on Databases using Blockchains

Detecting Insider Attacks on Databases using Blockchains Detecting Insider Attacks on Databases using Blockchains Shubham Sharma, Rahul Gupta, Shubham Sahai Srivastava and Sandeep K. Shukla Department of Computer Science and Engineering Indian Institute of Technology,

More information

Application of synchronized monitoring for dynamic performance analysis. Monitoring Power System Dynamic Performance Using Synchronized Sampling

Application of synchronized monitoring for dynamic performance analysis. Monitoring Power System Dynamic Performance Using Synchronized Sampling Application of synchronized monitoring for dynamic performance analysis Monitoring Power System Dynamic Performance Using Synchronized Sampling Mladen Kezunovic, Zheng Ce Texas A&M University College Station,

More information

Performance Assessment of Communication Network in WAMS

Performance Assessment of Communication Network in WAMS Performance Assessment of Communication Network in WAMS Kiran Gajrani 1, Krishan Gopal Sharma 2 and Annapurna Bhargava 3 1 Department of Electrical Engineering, Rajasthan Technical University, Kota, India

More information

Exposing vulnerabilities in electric power grids: An experimental approach

Exposing vulnerabilities in electric power grids: An experimental approach Exposing vulnerabilities in electric power grids: An experimental approach International Journal of Critical Infrastructure Protection Luigi Coppolino, S. D Antonio, and L. Romano (Tropea, 24-26 Settembre

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft When the Lights go out Hacking Cisco EnergyWise Version: 1.0 Date: 7/1/14 Classification: Author(s): Public Ayhan Koca, Matthias Luft TABLE OF CONTENT 1 HANDLING... 5 1.1 DOCUMENT STATUS AND OWNER... 5

More information

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network E±cient Detection Of Compromised Nodes In A Wireless Sensor Network Cheryl V. Hinds University of Idaho cvhinds@vandals.uidaho.edu Keywords: Compromised Nodes, Wireless Sensor Networks Abstract Wireless

More information

Data Integrity Attacks in Smart Grid Wide Area Monitoring

Data Integrity Attacks in Smart Grid Wide Area Monitoring DOI: http://dx.doi.org/10.14236/ewic/ics2016.9 Data Integrity Attacks in Smart Grid Wide Area Monitoring Sarita Paudel and Paul Smith AIT Austrian Institute of Technology Vienna, Austria sarita.paudel,

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

Chapter 2 State Estimation and Visualization

Chapter 2 State Estimation and Visualization Chapter 2 State Estimation and Visualization One obvious application of GPS-synchronized measurements is the dynamic monitoring of the operating conditions of the system or the dynamic state estimation

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Lecture 1: Course Introduction

Lecture 1: Course Introduction Lecture 1: Course Introduction Thomas Johansson T. Johansson (Lund University) 1 / 37 Chapter 9: Symmetric Key Distribution To understand the problems associated with managing and distributing secret keys.

More information

Evolution of Control for the Power Grid

Evolution of Control for the Power Grid Evolution of Control for the Power Grid Anjan Bose Washington State University Pullman, WA, USA PaiFest In Honor of Prof. M. A. Pai Urbana-Champaign, IL October 15, 2015 The Past (before 1960s) Hard

More information

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the

More information

Always an eye to security

Always an eye to security Always an eye to security SIGUARD the perfect supervision of your power system www.siemens.com/siguard Answers for infrastructure and cities. Keeping the overview SIGUARD is a suite of innovative software

More information

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Remote User Authentication Scheme in Multi-server Environment using Smart Card Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Abstract Accurate and synchronized time is crucial in many sensor network applications Time synchronization becomes an attractive target due to its importance

More information

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security An Overview of Standardization in AUTOSAR Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System

A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System International Journal of Network Security, Vol.17, No.2, PP.174-188, Mar. 2015 174 A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System Shengyi Pan,

More information

Sybil Attack Detection in Mobile Adhoc Network

Sybil Attack Detection in Mobile Adhoc Network Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

More information

Development Of Water Meter For Secure Communication In The Advanced Metering Infrastructure

Development Of Water Meter For Secure Communication In The Advanced Metering Infrastructure City University of New York (CUNY) CUNY Academic Works International Conference on Hydroinformatics 8-1-2014 Development Of Water Meter For Secure Communication In The Advanced Metering Infrastructure

More information

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Chandra Sekhar Vorugunti 1, Mrudula Sarvabhatla 2 1 Dhirubhai

More information

Reviewed by CeemanB. Vellaithurai WSU ID:

Reviewed by CeemanB. Vellaithurai WSU ID: Reviewed by CeemanB. Vellaithurai WSU ID: 11253840 Introduction Smart Grid Communication Infrastructure/Communication Architecture Data Assumptions Simulation Assumptions Good contributions Drawbacks Research

More information

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS 1 Sunil Kumar, 2 Er.Vinod Kumar Sharma Abstract-The wireless mesh networks consist of number of number that is connected to

More information

GPS cyber-security work

GPS cyber-security work GPS cyber-security work Ben Abbott Institute Engineer Gerardo Trevino Research Engineer Applied Sensing Department How we ended up at NASPI Distributed Instrumentation GPS timing protection PMU work Atlanta

More information

Digital Transformation of Power Delivery

Digital Transformation of Power Delivery Digital Transformation of Power Delivery Keynote Speech Professor Saifur Rahman, PhD Virginia Tech, USA IEEMA Engineer Infinite Conference, Delhi NCR, India, 14 March 2018 Traditional Electricity Delivery

More information

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer Department of Electrical

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

The Research on PGP Private Key Ring Cracking and Its Application

The Research on PGP Private Key Ring Cracking and Its Application The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,

More information

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements Ondrej Linda, Milos Manic, Miles McQueen Abstract: This paper presents design and simulation of a low cost and low

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Synchrophasor Implementation Experience and Integration Challenges in Indian Grid

Synchrophasor Implementation Experience and Integration Challenges in Indian Grid 21, rue d Artois, F-75008 PARIS CIGRE US National Committee http : //www.cigre.org 2015 Grid of the Future Symposium Synchrophasor Implementation Experience and Integration Challenges in Indian Grid P.

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Global Synchronized Phasor Measurement Standards

Global Synchronized Phasor Measurement Standards Global Synchronized Phasor Measurement Standards Vahid Madani and Farnoosh Rahmatian March 30, 2011 i-pcgrid Workshop 2011 Phasor Measurement System GPS Timing standards IEEE 1588 PTP C37.238 Profile Communication

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

PMU Time Source Security

PMU Time Source Security PMU Time Source Security Erich Heine Information Trust Institute Authors: Erich Heine, Tim Yardley, Dr. Alejandro Dominguez-Garcia, Daniel Chen 1 Overview PMU time synchronization

More information

Security: Cryptography

Security: Cryptography Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity

More information

Nimbra - communication platform for the SmartGRID

Nimbra - communication platform for the SmartGRID Nimbra - communication platform for the SmartGRID Real-Time and High Integrity communication for SmartGrid applications Dr. Christer Bohm, Net Insight AB Nimbra MSR Our background is real-time but for

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards Journal of Computational Information Systems 9: 14 (2013) 5513 5520 Available at http://www.jofcis.com Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart

More information

Cyber Security and Privacy Issues in Smart Grids

Cyber Security and Privacy Issues in Smart Grids Cyber Security and Privacy Issues in Smart Grids Acknowledgement: Slides by Hongwei Li from Univ. of Waterloo References Main Reference Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. Cyber

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

IN TODAY S power grid, phasor measurement

IN TODAY S power grid, phasor measurement IEEE TRANSACTIONS ON SMART GRID, VOL. 9, NO. 3, MAY 2018 1551 Self-Healing Attack-Resilient PMU Network for Power System Operation Hui Lin, Chen Chen, Member, IEEE, Jianhui Wang, Senior Member, IEEE, Junjian

More information

Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities

Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities G. Kumar Venayagamoorthy, PhD, FIET, FSAIEE Duke Energy Distinguished Professor & Director & Founder

More information

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM Anburaj. S 1, Kavitha. M 2 1,2 Department of Information Technology, SRM University, Kancheepuram, India. anburaj88@gmail.com,

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

C Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme

C Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme C37.118 13.1.2016 Informatik 7 Rechnernetze und Kommunikationssysteme Measures Voltage, Current, phase PMU1 IEEE C37.118 WAN PDC Historian Phasor Data Concentrator HMI App1 PMU2 APn Bay1 Bayn LAN e.g.,

More information

Synchrophasor Based Robust Linear State Estimator

Synchrophasor Based Robust Linear State Estimator Synchrophasor Based Robust Linear State Estimator Ali Abur, Murat Göl and Bilgehan Dönmez Department of Electrical and Computer Engineering Northeastern University, Boston abur@ece.neu.edu NASPI Workshop,

More information

Efficient and Secure Source Authentication for Multicast

Efficient and Secure Source Authentication for Multicast Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related

More information

NASPI Reliability Coordinator Data Quality Survey Summary. Alison Silverstein NASPI Project Manager March 21, 2016

NASPI Reliability Coordinator Data Quality Survey Summary. Alison Silverstein NASPI Project Manager March 21, 2016 NASPI Reliability Coordinator Data Quality Survey Summary Alison Silverstein NASPI Project Manager March 21, 2016 Overview Improving data quality is essential to assure that synchrophasor technology can

More information

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Mitigating DoS attacks against broadcast authentication in wireless sensor networks Syracuse University SURFACE Electrical Engineering and Computer Science L.C. Smith College of Engineering and Computer Science 1-1-2008 Mitigating DoS attacks against broadcast authentication in wireless

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

Experimenting Security Algorithms for the IEC based Substation Communication

Experimenting Security Algorithms for the IEC based Substation Communication Experimenting Security Algorithms for the IEC 61850-based Substation Communication Sugwon Hong 1, Dae-Yong Shin 1, and Seung-Jae Lee 2 1 Department of Computer Software, 2 Electrical Engineering Myongji

More information

Cyber Vulnerabilities on Agent-based Smart Grid Protection System

Cyber Vulnerabilities on Agent-based Smart Grid Protection System Cyber Vulnerabilities on Agent-based Smart Grid Protection System Md Shihanur Rahman and Hemanshu R. Pota School of Engineering and Information Technology University of New South Wales PO Box 796, Canberra

More information

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1

More information

Robust EC-PAKA Protocol for Wireless Mobile Networks

Robust EC-PAKA Protocol for Wireless Mobile Networks International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks

More information

PAP13 - Harmonization of IEEE C with IEC and Precision Time Synchronization

PAP13 - Harmonization of IEEE C with IEC and Precision Time Synchronization PAP13 - Harmonization of IEEE C37.118 with IEC 61850 and Precision Time Synchronization 12 July 2010 Use Cases Related to Mapping IEEE C37.118 with IEC 61850 as Proposed for Draft IEC 61850-90-5 Synchrophasor

More information

Interfacing Power System and ICT Simulators: Challenges, State-of-the-Art and Study Cases

Interfacing Power System and ICT Simulators: Challenges, State-of-the-Art and Study Cases IEEE Power & Energy Society eneral Meeting 2014 National Harbor, MD, USA, July 31th, 2014 IEEE Task Force on Interfacing Techniques for Simulation Tools Interfacing Power System and ICT Simulators: Contributors:

More information

A Polynomial-Time Method to Find the Sparsest Unobservable Attacks in Power Networks

A Polynomial-Time Method to Find the Sparsest Unobservable Attacks in Power Networks A Polynomial-Time Method to Find the Sparsest Unobservable Attacks in Power Networks Yue Zhao, Andrea Goldsmith, and H. Vincent Poor Abstract Power injection attacks that alter generation and loads at

More information

Wide Area Monitoring System Planning, Strategy and Implementation in Thailand s Power Grid

Wide Area Monitoring System Planning, Strategy and Implementation in Thailand s Power Grid Sept.3-5, 2013, China AORC-B-3-0002 CIGRE-AORC 2013 Wide Area Monitoring System Planning, Strategy and Implementation in Thailand s Power Grid W. PIMJAIPONG L.SURAPONGPUN Electricity Generating Authority

More information

Chapter 2 Communication for Control in Heterogeneous Power Supply

Chapter 2 Communication for Control in Heterogeneous Power Supply Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

Design and Simulation of Fast Substation Protection in IEC Environments

Design and Simulation of Fast Substation Protection in IEC Environments Design and Simulation of Fast Substation Protection in IEC 685 Environments Alfonso Valdes, Cui Hang, Prosper Panumpabi, Nitin Vaidya, Chris Drew Information Trust Institute University of Illinois at Urbana-Champaign

More information

Applications of PTP in non-telecom networks. Anurag Gupta November 1 st -3 rd 2011, ITSF 2011

Applications of PTP in non-telecom networks. Anurag Gupta November 1 st -3 rd 2011, ITSF 2011 Applications of PTP in non-telecom networks Anurag Gupta angupta@juniper.net November 1 st -3 rd 2011, ITSF 2011 Introduction PTP/ 1588 has grown from its initial objective of Synchronization of real-time

More information

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public

More information

Timestamps and authentication protocols

Timestamps and authentication protocols Timestamps and authentication protocols Chris J. Mitchell Technical Report RHUL MA 2005 3 25 February 2005 Royal Holloway University of London Department of Mathematics Royal Holloway, University of London

More information

CAN protocol enhancement

CAN protocol enhancement Protocols CAN protocol enhancement This article describes the enhanced CAN protocol called CAN-HG and the features of the IC circuitry from Canis that implement it. CAN-HG has been designed to meet two

More information

Distributed Agent-Based Intrusion Detection for the Smart Grid

Distributed Agent-Based Intrusion Detection for the Smart Grid Distributed Agent-Based Intrusion Detection for the Smart Grid Presenter: Esther M. Amullen January 19, 2018 Introduction The smart-grid can be viewed as a Large-Scale Networked Control System (LSNCS).

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

PMU Networking with IP Multicast

PMU Networking with IP Multicast White Paper PMU Networking with IP Multicast Overview This document proposes a network architecture which implements IP networking technologies, including IP multicast, to help enable efficient transmission

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Synchrophasor Data Communications Questionnaire. NASPI D&NMTT October Co-chairs Jim McNierney NYISO Dan Brancaccio Bridge Energy Group

Synchrophasor Data Communications Questionnaire. NASPI D&NMTT October Co-chairs Jim McNierney NYISO Dan Brancaccio Bridge Energy Group Synchrophasor Data Communications Questionnaire NASPI D&NMTT October 23 2013 Co-chairs Jim McNierney NYISO Dan Brancaccio Bridge Energy Group Survey says Purpose of survey was to get an idea of what networking

More information