Skip to main content

Modeling and Simulation of Intelligent Substation Network Under Intrusion Attack

  • Conference paper
  • First Online:
Advanced Computational Methods in Life System Modeling and Simulation (ICSEE 2017, LSMS 2017)

Abstract

Recent advancement in the integration of power systems and information communication technology has brought the key concerns towards security operation of cyber physical power system. This paper focuses on realizing the unified system modeling under intrusion attacks and refining the attack effects on communication network by simulation research. We start this survey with an overview of the system operation and crucial intrusion attacks associated with operational security from fusion system perspective. A novel limited stochastic Petri net (LSPN) graph theory is introduced to establish the unified firewall protection system model of intelligent substation network. By proposing quantitative computational methodology of communication throughput variation, the potential consequence on the communication network is determined with information transmission constraints. The final test on IEEE-30 node power system illustrates the usefulness of the proposed model analysis. The research work would raise awareness of the cyber intrusion threats and provide the basis for security defense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Z.: Smart Grid Technology, 4th edn. China Electric Power Press, Beijing (2010). ISBN 9787512302235

    Google Scholar 

  2. Liang, G., Zhao, J., Weller, S.R.: The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Syst. 40, 149–151 (2016)

    Google Scholar 

  3. Berman, D., Butts, J.: Towards characterization of cyber attacks on industrial control systems: emulating field devices using Gumstix technology. IEEE Xplore, Resilient Control Systems (ISRCS), pp. 63–68 (2012)

    Google Scholar 

  4. Buford, J., Sanchez-Aarnoutse, J.C., Chen, T.M.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2, 741–749 (2011)

    Article  Google Scholar 

  5. Tran, B.N., Lakshminarayana, S.: SecureRails: towards an open simulation platform for analyzing cyber-physical attacks in railways. IEEE Xplore, pp. 95–98 (2016)

    Google Scholar 

  6. Hong, J., Panciatici, P., Liu, C.-C., Stefanov, A.: Intruders in the grid. IEEE Power Energy Mag. 10, 58–66 (2012)

    Google Scholar 

  7. Ahmadon, M.A.B., Yamaguchi, S.: On service orchestration of cyber physical system and its verification based on petri net. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp. 1–4 (2016)

    Google Scholar 

  8. Liu, D., Li, Q-S., Wang, Y.: A hybrid system based CPS model and control of loads in active distribution network. In: 2016 IEEE International Conference on Power System Technology, pp. 1–8 (2016)

    Google Scholar 

  9. Adnan, R., Hahn, A., Higdon, M., Manimaran, G., Sridhar, S.: Development of the power cyber SCADA cyber security testbed cyber security and information intelligence research workshop. Oak Ridge National Lab, vol. 21, pp. 1–4 (2010)

    Google Scholar 

  10. Davis, C.M., Tate, J.E., Okhravi, H.: SCADA cyber security testbed development. In: 38th North American Power Symposium NAPS, pp. 483–488 (2006)

    Google Scholar 

  11. Xie, X., Hu, Y., Xin, Y.: Power information systems security: modeling and quantitative evaluation. In: Proceedings of IEEE Power Engineering Society General Meeting, vol. 1, pp. 905–910 (2004)

    Google Scholar 

  12. Liu, C.-C., Manimaran, G., Ten, C.W.: Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans. Power Syst. 23, 1836–1846 (2008)

    Article  Google Scholar 

  13. Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Trans. Smart Grid 1, 99–107 (2010)

    Article  Google Scholar 

  14. Jajodia, S., Noel, S.: Advanced cyber attack modeling, analysis, and visualization, Final Technical report AFRL-RI-RS-TR-2010-078, George Mason University (2010)

    Google Scholar 

  15. Hahn, A., Sridhar, S., Manimaran, G.: Cyber-physical system security for the electric power grid. Proc. IEEE 100, 210–224 (2012)

    Article  Google Scholar 

  16. Bompard, E., Napoli, R., Xue, F.: Vulnerability of interconnected power systems to malicious attacks under limited information. Eur. Trans. Electr. Power 18, 820–834 (2008)

    Article  Google Scholar 

  17. Ernster, T., Morris, T., Pan, S., Srivastava, A., Vellaithurai, C.: Modeling cyber-physical vulnerability of the smart grid with incomplete information. IEEE Trans. Smart Grid 4, 235–244 (2013)

    Article  Google Scholar 

  18. Liu, D., Lu, M.Y., Wang, X.S., Wang, Y.: Key technologies and trends of cyber physical system for power grid. In: Proceedings of the CSEE, vol. 35, pp. 3522–3531 (2015). (in Chinese)

    Google Scholar 

  19. National Institute for Standards and Technology (NIST): Guidelines for smart grid cyber security: vol. 3, supportive analyses and references: NISTIR 7628[S] (2010)

    Google Scholar 

  20. Li, M.Y., Rahman, S., Wang, Q., Tang, Y.: Framework for vulnerability assessment of communication systems for electric power grids. IET Gener. Transm. Distrib. 10, 477–486 (2016)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by Key project of National Natural Science Foundation of China (Research on complex networked system architecture and system operating state security assessment with fault dynamic evolution mechanism) (Grant No. 61633016), a Communication and Network Technology National Engineering Research Center Open Fund project and an open project of National Key Laboratory (Research on operation security analysis and defense strategy of cyber physical system). We gratefully acknowledge the support from the Professor Fei Minrui of Shanghai University and Professor Hu Songlin.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojuan Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Huang, X., Fu, R., Tang, Y., Li, M., Yue, D. (2017). Modeling and Simulation of Intelligent Substation Network Under Intrusion Attack. In: Fei, M., Ma, S., Li, X., Sun, X., Jia, L., Su, Z. (eds) Advanced Computational Methods in Life System Modeling and Simulation. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 761. Springer, Singapore. https://doi.org/10.1007/978-981-10-6370-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6370-1_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6369-5

  • Online ISBN: 978-981-10-6370-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics