Skip to main content

A GPS Spoofing Resilient WAMS for Smart Grid

  • Conference paper
Dependable Computing (EWDC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7869))

Included in the following conference series:

Abstract

Smart grids provide efficiency in energy distribution, easy identification of disturbance sources, and fault prediction. To achieve these benefits a continuous monitoring of voltage and current phasors must be performed. Phasor Measurement Units (PMUs) allow measurements of the phasors. A Wide Area Measurement System uses PMUs placed in different locations to assess the status of the power grid. To correctly analyze the phasors provided by PMUs, phasors must refer to the same time. For this reason each PMU uses the clock provided by a GPS receiver. GPS receiver is vulnerable to spoofing attack and it is a single point of failure. In this context we examined Network Time Protocol (NTP) as an alternative time source when the GPS receiver is compromised. In this paper a resilient architecture is proposed that is able to detect and react to the GPS spoofing attack. Experimental tests have shown the effectiveness of our solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Romero, J.J.: Blackouts illuminate india’s power problems. IEEE Spectrum 49(10), 11–12 (2012), doi:10.1109/MSPEC.2012.6309237

    Article  Google Scholar 

  2. Singh, A., Aasma, S.: Grid failure in Northern, Eastern and North-Eastern grid in 2012: Cause & its effect on economy of India An Review. SAMRIDDHI-A Journal of Physical Sciences, Engineering and Technology (S-JPSET 2012) 3(2) (2012) ISSN: 2229-7111

    Google Scholar 

  3. FERC/NERC Staff Report on the September 8, 2011 Blackout. Arizona-Sourthem California Outages on September 8, 2011 (April 2012)

    Google Scholar 

  4. Final report on the august 14, 2003 blackout in the united states and canada: Causes and recommendations. Technical report, U.S.-Canada Power System Outage Task Force (April 2004)

    Google Scholar 

  5. Larsson, S., Danell, A.: The black-out in southern Sweden and eastern Denmark, September 23, 2003. In: 2006 IEEE PES Power Systems Conference and Exposition, PSCE 2006, October 29-November 1, pp. 309–313 (2003), doi:10.1109/PSCE.2006.296324

    Google Scholar 

  6. Oral, B., Donmez, F.: The Impacts of Natural Disasters on Power Systems: Anatomy of the Marmara Earthquake Blackout. Acta Polytechnica Hungarica (2010)

    Google Scholar 

  7. D’Antonio, S., Coppolino, L., Elia, I.A., Formicola, V.: Security issues of a phasor data concentrator for smart grid infrastructure. In: Proceedings of the 13th European Workshop on Dependable Computing, EWDC 2011, pp. 3–8. ACM, New York (2011), doi:10.1145/1978582.1978584

    Google Scholar 

  8. Coppolino, L., D’Antonio, S., Elia, I.A., Romano, L.: Security analysis of smart grid data collection technologies. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 143–156. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Coppolino, L., D’Antonio, S., Esposito, M., Romano, L.: Exploiting diversity and correlation to improve the performance of intrusion detection systems. In: International Conference on Network and Service Security, N2S 2009, June 24-26, pp. 1–5 (2009)

    Google Scholar 

  10. Momoh, J.: Smart Grid: Fundamentals of Design and Analysis. IEEE Press Series on Power Engineering, vol. 63. Wiley (2012)

    Google Scholar 

  11. Doberstein, D.: Fundamentals of GPS Receivers. Springer ISBN 978-1-4614-0409-5

    Google Scholar 

  12. Hadley, M.D., McBride, J.B., Edgar, T.W., O’Neil, L.R., Johnson, J.D.: Securing Wide Area Measurement Systems. U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability (June 2007)

    Google Scholar 

  13. Humphreys, T.: Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing, submitted to the Subcommittee on Oversight, Investigations and Management of the House Committee on Homeland Security, U.S. House of Representatives, Washington, DC (July18, 2012), http://homeland.house.gov/sites/homeland.house.gov/files/Testimony-Humphreys.pdf

  14. Warner, J.S.: GPS Spoofing Countermeasures. Appeared in Homeland Security Journal (December 12, 2003)

    Google Scholar 

  15. IEEE Standard C37.118-2005: IEEE Standard for Synchrophasors for Power Systems (2006)

    Google Scholar 

  16. Volpe National Transportation Systems Center, Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, U.S. Department of Transportation Research and Innovative Technology Administration, Cambridge, Massachusetts (2001), http://www.navcen.uscg.gov/pdf/vulnerability_assess_2001.pdf

  17. Shepard, D.P., Humphreys, T.E., Fansler, A.A.: Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection 5(3-4), 146–153 (2012)

    Article  Google Scholar 

  18. Warner, J.S., Johnston, R.G.: GPS Spoofing Countermeasures. Vulnerability Assessment Team Los Alamos National Laboratory Los Alamos, New Mexico, 87545

    Google Scholar 

  19. Humphreys, T.: Statement on the vunerability of civil unmanned aerial vehicle and other systems to civil GPS spoofing. University of Texas at Austin (July 18, 2012)

    Google Scholar 

  20. Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture, Network Working Group report RFC-3513. Nokia, 26 p. (April 2003)

    Google Scholar 

  21. Partridge, C., Mendez, T., Milliken, T.: Host Anycasting Service, Network Working Group report RFC-1536, Bolt Beranek Newman, 9 p. (November 1992)

    Google Scholar 

  22. Mills, D.L.: Unix kernel modifications for precision time synchronization, Electrical Engineering Department Report 94-10-1, University of Delaware, 24 p. (October 1994)

    Google Scholar 

  23. Mills, D.L.: Adaptive hybrid clock discipline algorithm for the Network Time Protocol. IEEE/ACM Trans. Networking 6(5), 505–514 (1998)

    Article  Google Scholar 

  24. Warner, J.S., Johnston, R.G.: A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Garofalo, A., Di Sarno, C., Coppolino, L., D’Antonio, S. (2013). A GPS Spoofing Resilient WAMS for Smart Grid. In: Vieira, M., Cunha, J.C. (eds) Dependable Computing. EWDC 2013. Lecture Notes in Computer Science, vol 7869. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38789-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38789-0_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38788-3

  • Online ISBN: 978-3-642-38789-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics