Smart Grid Cyber Security An Overviewof Threatsand Countermeasures V1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/281719657

Smart Grid Cyber Security: An Overview of Threats and Countermeasures

Article in Journal of Power and Energy Engineering · July 2015


DOI: 10.17265/1934-8975/2015.07.005

CITATIONS READS
35 1,464

4 authors, including:

Arman Sargolzaei Hugo Santana


Florida Polytechnic University Eindhoven University of Technology
69 PUBLICATIONS 2,569 CITATIONS 2 PUBLICATIONS 52 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Arman Sargolzaei on 20 February 2016.

The user has requested enhancement of the downloaded file.


Journal of Energy and Power Engineering

Smart Grid Cyber Security: An Overview of


Threats and Countermeasures
Carlos Lopez1,2,3 , Arman Sargolzaei1,2 , Hugo Santana1 , and Carlos Huerta1
1PLC International Inc., Smart Communication Systems, Miami, FL, 33155, USA
2 FIU Department of Electrical and Computer Engineering, Miami, FL, 33174 USA
3 US Naval Research Laboratory Corrosion Science and Engineering, Washington, DC, 20375, USA

Abstract: The smart grid is the next generation of power and distribution systems. The integration of advanced
network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The
smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed
energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components
come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital
vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system.
A number of countermeasures and solutions from the literature will also be reported, to give an overview of the
options for dealing with such problems. This paper serves as a triggering point for future research into smart grid
cyber security.
Keywords: Smart grid; power line communications; smart metering; threats; vulnerabilities; countermeasures;
solutions.

1 I NTRODUCTION concentrations pertaining to the spectrum of consumers,


The power grid is the infrastructure which transports such as households, universities, businesses and others.
electricity from where it is generated; coal plants, nat- There are five key factors to consider for the efficient
ural gas refineries, nuclear reactors, and others. The operation of the smart grid: communications, smart
traditional power grid involved large centralized electric metering, distributed energy resources, monitoring, and
power plants. These plants fed power over a one-way controlling [3, 4].
channel from the distributor to the user. It served its Communication across the power line uses feeder sec-
function over the last century, but it has recently been tionlines as a medium between consumers and utilities
subject to deregulation and is burdened with several [3]. Communication also happens through microwave
issues ranging from the technical to the economic [1]. channels, fiber-optic links, wireless, ethernet, as well
The advent of newly improved telecommunications tech- pilot wire cables; where a wide range of bandwidths are
niques for control and monitoring of energy flow made implemented [5]. Smart metering implements intelligent
the creation of the smart grid possible [2]. devices for real time monitoring of energy consumption
The smart grid is the next generation power grid [6]. The distribution of energy resources allows for the
in which electricity is managed and distributed in ad- moving away from centralized power stations to more
vanced two-way communication systems. It delivers widely available options as well the inclusion of alter-
power from suppliers to consumers in a way that it con- native energy supplies [7, 8]. SCADA, or Supervisory
trols intelligent appliances to save energy, reduce cost, Control and Data Acquisition, defines standards for the
increase reliability, as well as transparency [3]. Figure 1 operation, monitoring and controlling of grid industrial
illustrates the sectionality of the smart grid architecture, processes [9, 10].
where a central control can mitigate the generation of As mentioned previously, the smart grid allows for
power via numerous sources such as coal, wind, solar, more efficient energy distribution than its predecessor,
nuclear, and others. This power is then transmitted to however the literature demonstrates that the smart grid
various distribution centers and organized via various is vulnerable to security threats at both the physical and


Corresponding Author: Arman Sargolzaei, PhD candi- 1
date, Florida International University, PLC International
Inc, a.sargolzaei@gmail.com, Miami, FL, USA
Journal of Energy and Power Engineering

Fig. 1: Smart Grid Layout

logical layer [1, 11, 12, 13, 14, 15]. Threats from the phys- 2 S MART G RID OVERVIEW
ical layer are theft, vandalism, and sabotage; while pro- 2.1 Smart Metering
tecting the logical layer means protecting the data. The
A smart meter is a device which identifies electricity
smart energy sector has been subject to a wide spectrum
consumption and other information to a corresponding
of attacks over the last five years. Web-based applications
utility for monitoring and billing purposes. The meters
and SCADA systems are vulnerable to entities coming
communicate with the line and utility systems via a
between the data and the data-gathering system, such
centralized headend, called Advanced Metering Infras-
as the Stuxnet worm which hit Iranian power stations in
tructure (AMI). The AMI connects to large numbers
2010 [16]. It has been demonstrated in 2011 [17], that the
of smart meters in order to serve large districts [4].
load on devices can be increased overflowing levels over
Research bears out that the metering infrastructure of
the internet. The metering network can be compromised
the grid can be broken down into a hierarchical structure
and deny consumer services, according to the work of
[24]. Smart Appliances: connected through a local home
Berthier at al in 2012 [18].
area network (HAN) to a smart meter through which
Several solutions and countermeasures to these prob-
energy consumption data is reported [25] . Smart Me-
lems have been proposed in the literature [2, 14, 11, 19,
ters: measures power consumption and sends data to a
20, 21, 22]. At the metering level, they would involve
concentrator node through a neighborhood area network
more widely distributed intrusion detection techniques
(NAN) [25]. Concentrator Nodes: collects data from all
or minimizing the information load of metering de-
nearest neighbor smart meters and has capability to
vices. Further research on the encryption of the data
process data from particular devices via a wide area
is fundamentally important, according to the Govern-
network (WAN) [26]. Utility Centers: stores and processes
ment Accountability Office [23]. Another high priority
data for billing and monitoring grid status [4].
R&D challenge, according to the NISTIR 7628 findings
[20], is the manipulation of cryptographic public key
infrastructure of the network to account for the increased 2.2 Power Line Communications
complexity of the smart grid. In general, power lines are designed for the trans-
This paper provides the results of comprehensive lit- mission of AC power at 50-60 Hz. Attaching a power
erature review to identify useful techniques, algorithms, line carrier (PLC) system to a communication system
and other methods which can be applied to cyber se- involves a transmitter and receiver between a feeder line
curity problems related to the smart grid. Following two way connection with utilities [3]. Connecting PLC
the introduction, the paper is organized as follows. Sec- transceivers to the grid line requires coupling circuits
tion 2 includes smart grid infrastructure, detailing key to drive PLC signals into the power line and protect
components. Section 3 will provide an overview of the communication equipment from high current main sig-
wide spectrum of possible attacks that the smart grid is nals [27]. PLC signals respect CENELEC (European Elec-
vulnerable to. Section 4 shows possible countermeasures trotechnical standards organization) and FCC (Federal
and solutions that will secure smart grid operations. The Communications Commission) standards, where they
paper concludes in Section 5. can are subdivided according to low and high voltage
and frequency ranges, respectively [28].

2
Journal of Energy and Power Engineering

Narrowband channels operate at low and high volt- been addressed through the use of stochastic modeling
ages and support low to medium data rate (up to 100’s techniques by Liang and Zhuang [37]. These techniques
of kbs) applications, such as power consumption mea- implemented state evolution modeling in order to cap-
surements [29]. Broadband channels operate at low to ture the trajectory of the evolution of operational states
medium voltages and support high data rate (up to 100’s of devices within the microgrid and its connection to
of Mbs) applications; such as video phones, relaying the main grid. State estimation was used to estimate
applications, SCADA, voice and data. A widely used the states of the power system based on real time
modern technique called Orthogonal Frequency Division measurements; these being analog, logic, and psuedo
Multiplexing (OFDM) was implemented in the early measurements which amount to predictive information
2000’s and continues to the present day. This is used on power generation and loading. Reliability analysis
to encode multiple carrier frequencies within a single was performed implementing Monte Carlo simulations,
line for use in distribution automation and advanced where scenarios (output states) are randomly generated
metering management within the smart gird [3, 30]. based on a probablity density function and the outputs
Other widely used forms of modulation include single as organized as viable system operational states.
side band (SSB) and quadrature amplitude (QAM) [31].
2.4 Monitoring and Control
2.3 Distributed Energy Resources
Intelligent electronic devices (IEDs) are micropro-
The old central power source and transmission
cessor based devices used for the protection, automa-
framework is changing to the paradigm of a massively
tion, control and monitoring of power system hardware.
distributed spectrum of variable and small renewable
Upon acquiring power system data, IEDs perform cal-
energy sources [3]. These include wind [32], solar, and
culations which create local databases about the spe-
other alternatives which could act as stand alone sup-
cific asset they are monitoring; examples of which in-
plies. Regardless of the sort of generation, the growth
clude system health or performance history on primary
of these energy alternatives in the market must be re-
equipment such as transformers, capacitor banks, and
spected due to several key factors [33]. (i) Government
circuit breakers [41]. Synchronizing events in time at
regulations promote and in some cases mandate their
the substation level typically involves GPS receivers,
use. (ii) Tax breaks provide financial incentive. (iii) They
distributing clock signals through those generated by
reduce the load on transmission line systems. (iv) They
orbitting satellites. IED’s utilize precise timing methods
lower the need for traditional large power plants. (v)
like the IRIG-B and SNTP standard to provide better
They help in peak shaving, adding temporary power to
accuracy and precision [42].
the grid when peak loading happens.
Every distributed energy resource (DER) includes an IRIG-B signals are composed of 100 bits produced
Electronic Power Processor (EPP) to govern the exchange every second, 74 of which contain time-of-year and year
power between it and the grid, along with a Switching information in binary coded decimal (BCD) format, with
Power Interface (SPI) to control drawn currents [3]. identifier bits referencing the start and end of a frame
The research by Tenti and Mattavelli [34] details the [43]. These signals can be transmistted by a range of
importance of both EPP’s and SPI’s working together to media; such as shielded cables and optical fibers for
take full advantage of smart grid capability. When this unmodulated data and coaxial or shielded twisted-pair
occurs, the work of Costabeber et al [35] demonstrates cable for modulated data [43]. SNTP is a version of the
that DER’s become even more attractive in terms of network timing protocol (NTP), which is a technique for
management convenience. Individual DER’s effectively transferring time data between computers over a data
act as micro grids and successful cross-communication network [44]. SNTP is the simple version of NTP, mean-
with nearest neighbor EPP’s allows for exploitation of ing that it lacks state estimating capabilities. This makes
such functionalities without a central supervisor. it more ideal for sending substation timing information
Microgrids are small-scale power grids which can be between a server (sourced by GPS signals for example)
made smart when controlled through two-level control, and a client (a specific IED).
(i) analog-centric for power stability and (ii) digital- SCADA protocols set the standard for data transmis-
centric for automation [36]. Military and academic in- sions over communication channels and exist at the
stitutions have taken to the use of microgrids in order generation, transmission, and distribution level [10]. It
to increase power availability in adverse conditions and provides for the automation of monitoring and data
reduce energy usage costs [38, 39, 40]. The ability to acquisition of the grid, linking back to a control cen-
run microgrids in so-called island mode provides high ter via a gateway system. The Distributed Networking
local reliability, though this cause difficulty in correlat- Protocol 3.0 (DNP3), IEC 61850, IEC 62351 and other
ing its supplies with those of the main grid. This has protocols are implemented for the secure communication

3
Journal of Energy and Power Engineering

of power system data [2]. DNP3 was initially designed This allows attackers to learn the communication pro-
for the transmission of serial data, based on RS-232 tocol used in a meter. This information would allow for
standards and others, but has recently been ported to the creation of false consumption reports and can set the
the TCP/IP layer for use in two-way communications. stage for larger scale attacks. The eavesdropping attack
IEC 62351 is used to establish ethernet-based communi- undermines the confidentiality of the metering reports
cations for power substations. They specifies protocols by an adversarial party. This third party does this by
at the TCP/IP, UDP/IP and MAC layers and defines the monitoring network traffic and can obtain data such as
timing requirements for information exchange [2]. IEC future price information, control structure, and power
61850 uses the security specifications of IEC 62351 in consumption [50].
order to provide for data modeling, reporting, transfer In the laboratory, the work of Valli et al saw the
and storage of substation configuration data [12]. capturing of NAN packets from a meter by placing it
In response to the 2003 North American blackout, the inside of a Faraday cage and exposing their equipment
Federal Energy Regulatory Commission (FERC) com- to a range of frequencies [51]. In this work, they were
mitted the North American Electric Reliability Corpora- able to capture packets by letting their devices listen
tion (NERC) to be the Electric Reliability Organization in on the radio emissions of a meter using the ZigBee
(ERO) for the United States. NERC enforces critical standard [52]. They found that packets were collected
infrastructure protection (CIP) standards 002-009, which from the meter’s home area network (HAN) and were
provide frameworks for identifying and protecting crit- able to determine that the packets were encrypted.
ical electronic assets which support reliable power grid
operations [45]. NERC standards specify government- 3.1.3 Jamming and Access Restriction
mandated requirements for cyber asset identification, A jamming attack is used to prevent meters from
security controls, training, security parameters, physical connecting with the utility company through stuffing the
security, systems security, incident reporting and recov- wireless media with noise. This can be implemented in
ery plants [46]. two fashions: (i) continuous noise signal emission caus-
ing the channel to remain blocked, and (ii) noise signal
3 T HREATS , V ULNERABILITIES , AND emission only in response to the sensing of normal radio
ATTACKS channel signals [53]. Smart meters are thusly affected in
two corresponding ways: (i) the channel will always be
3.1 Metering Infrastructure Attacks
seen as busy by carriers, and (ii) data packets will be
3.1.1 Compromising the physical meter prevented from being received [53].
Meters can be hacked directly by accessing on- A restriction attack disrupts meter operations at the
board memory, thereby reading diagnostic ports and MAC address layer. The attacking entity prevents the
other network interfaces. Some of the tools used by meter from initiating legitimate MAC address operations
hackers are either hardware tools available for purchase and can cause data packet collisions [53]. This attack is
or open source software tools. Prime examples of both, characterized by the fact that it targets communications
respectively, are the SecureState ’Termineter’ [47] and the channels such that preference is given to the adversarial
InGuardian ’OptiGuard’ [12]. signal as opposed to those of legitimate meters [53].
Both Termineter and Optiguard are sets of Python- The work of Lazos and Krunz detailed the channel-
based libraries designed to provide functionality for the selective jamming attack, which targets control channels
C12.18 and C12.19 American National Standards Insti- in a wireless mesh network [54]. Their work analyzed the
tute (ANSI) communication protocols. The C12.18 pro- selective jamming on carrier signal sensing MAC proto-
tocol is a set of standards for two-way communication cols, which essentially checks a multiple node channel
between meters and their optical (infrared) serial ports to see if traffic can flow through it. The studied channel
[48]. Communication is established via an ANSI type 2 used a split phase design, where time measuring signals
optical probe. The intruder takes advantage of the C12.18 are split into alternating control and data transmission
protocol to open the port, allowing C12.19 standardized phases.
data to pass through it. The C12.19 protocol allows for Each node converges to a default channel for assign-
the viewing of meter table data; this includes meter ment negotiation during the control phase. Selective
identity, operating mode, configuration mode, status, targeting of the default channel can lead to the signal
measurements, and more [49]. jamming in the control phase. This forces the node to
defer channel negotiation until the next default phase,
3.1.2 NAN Sniffing and Eavesdropping forcing inactivity during the transmission phase, effec-
NAN sniffing is used to capture a smart meter’s tively stopping the channel. Wireless mesh networks
consumption data by breaking network encryption [24]. have been shown to be important for the exchange of

4
Journal of Energy and Power Engineering

information in the smart grid [55]. Jamming of this kind


can lead to catastrophic effects on the communications
infrastructure of the grid’s devices and components.

3.1.4 Bad Data Injection


The attacks mimic legitimate senders and receivers
to acquire unauthorized access to the wireless network.
Once access is granted, the victim’s resources become
overwhelmed through the processing of fictictious mes-
sages and measurements placed into the network by the
attacker. The work of Kosut et al divides malicious data
attacks into two regimes: strong and weak [56, 57]. The
main difference between being the number of meters an
adversary has managed to take control of.
The strong attack regime refers to the situation where
the attacker has a sufficiently large number of meters
to launch an undetected attack. Kosut’s work is based Fig. 2: Attack Scenarios [13]
on earlier works of Liu et al, where they implemented
mathematical models of the DC and AC power flow out 3.1.7 Energy Theft Attack
of a power system [58]. The work of McLaughlin et al and others [13, 60]
makes use of the attack tree concept in order to demon-
3.1.5 Spoofing strate a scenario where multiple versions of the above-
Spoofing a meter means to impersonate its identity mentioned attacks might be brought together. There are
on the network. The work of McLaughlin et al [13] three sections to the attack tree found in Figure 2, which
demonstrated proof of this concept by having their detail where in the process energy theft may take place.
fake meter implement the ANSI C12.21 protocol [59] to (i) An attacker can interrupt a measurement before it
create a cryptographic nonce (a random number used takes place. (ii) One may tamper with the stored demand
for authentication) to send to a utility company. The data either before or while the measurements are stored
utility will then compute a message authentication code in the meter. (iii) The adversary may modify the network
(MAC) by hashing together a password and the nonce. even before or while the meter takes its data and logs it.
The MAC is then sent back to the meter, which calculates
its own MAC; thereby, completing the authentication 3.2 Decryption Attacks
process. The issue with this system is that utility fails This attack is used to discover the encryption key of
to verify the freshness of the meter’s nonce, making it a network in order to connect to it and steal its data. An
easy for impersonators to play themselves off as the real attacker may do this by accessing the physical frames of
meter [13]. the network, taking them, and storing enough of them
so they can be decrypted using correct algorithms [61].
3.1.6 Man in the Middle Attacks Another form of attack which yields success is called the
Man in the middle (MITM) attacks are executed side channel attack. This attack exploit some aspect of a
when the adversary inserts themselves in between com- physical system which is employing a data encryption
municating devices and examines the traffic between algorithm [61, 62]. The following sections will delve into
them [12]. They are like an amalgam of eavesdrop- detail on different ways this attack may be expressed.
ping, injection, and spoofing attacks mentioned earlier.
The third party connects to two devices and directs 3.2.1 Electromagnetic Attacks
communication between them while viewing the traffic. These attacks deal with discerning the encoded
Sophisticated MITM attacks can mitigate encryption by plaintext of a power line message through the leakage
passing a fake encryption key in place of legitimate ones of electromagnetic radiation [63, 64]. These attacks use
[12]. special probes placed at various locations along the unit
or circuit in question. Where one places the probe de-
pends on if one is aiming to detect direct or unintentional
emissions. Direct emissions are intentional current flows
through a line, where short current burts with sharp

5
Journal of Energy and Power Engineering

rising edges can cause large bandwidths [63]. Unin- system. This is especially dangerous due to it being
tentional emissions are those electromagnetic leakages able to manipulate estimation of system power flow.
which couple to those of other circuit components or Transmission line power flow exceeding transmission
cabling. These emissions are typically modulations of line capacity being a possible scenario [73]. Depending
the carrier signals that are either present or have been on if the attack is short term or long term, it can have
introduced into the device. Under these definitions, di- damaging effects on the security-constrained economic
rect emissions are the more difficult of the two to detect, dispatch (SCED) price estimation. [73]
requiring close proximity to the device in question. An
attacker would likely prefer the unintentional emissions, 3.3 Denial of Service Attacks
as these provide a wide spectrum of signals to probe [65]
and through which encryption keys in the data may be This attack seeks to sabotage a power grid network
found [63, 66]. by overwhelming its communication and computational
Many proofs of the concept has been demonstrated resources in order to prevent it from working [21]. This
in the laboratory. The work of Enev and Gupta [67] denies customers of that grid utility their power service.
experimented on the information leakage from eight This attack can be applied at multiple layers in the smart
televisions connected to the same power line. It was grid.
found that the radiative interference patterns of TV
3.3.1 Physical Layer Attacks
power supplies yielded discernable information about
the media being played. The work of Hayashi et al One only needs to connect to the communication
[68, 69, 70] has demonstrated the viability of obtaining channel rather than the actual network to launch this
secret keys from the radiation patterns of power and attack [2]. Channel jamming attacks become one of the
communication cables attached to FPGA boards. His most efficient to use by attackers and one of the most
work has shown that cryptographic key information may dangerous for utilities and customers alike. Examples
leak from near field [68] and far field [69] radiation of such attacks include the continuous emission and
patterns. injection of high power wave tones and FM modulated
noise into the communication channel at a brute force
3.2.2 Power Analysis Attacks level. A more sophisticated attack is detailed by the work
Power analysis attacks are characterized by ana- of Proano and Lazos, wherein they exploit specific weak-
lyzing the use of electrical power of a device while it nesses in communications protocols (in their case TCP)
performs an encryption algorithm [62]. They are divided to perform their attacks [75]. Their selective jamming
into two classes, simple and differential. Simple power attacks sees the adversary classifying packets in real
analysis (SPA) attacks observe the data visually ( oscillo- time, decoding the control field at the MAC layer, and
scope, for example), and interpreting what cryptographic corrupting them before the end of their transmissions.
algorithm the signal has been encoded with. Differential
power analysis (DPA) applies statistical error-correcting 3.3.2 MAC Layer Attacks
algorithms to SPA by monitoring trends in the data. The Media Access Control (MAC) layer is respon-
DPA attacks are especially dangerous, as they can be so sible for two-way communication and is susceptible to
precise that even the switching of a transistor can give attackers who wish to modify parameters, which gives
away an encryption key. All cryptographic algorithms, the attacker better leeway in accessing the network at the
and devices running them, have so far been shown to cost of degrading network performance for legitimate
be vulnerable to DPA [62]. customers on the same channel [2]. Examples include
spoofing attacks which can target both network avail-
3.2.3 Fault Analysis Attack ability and integrity. One way this attack may be realized
This class of attack injects faults into a device is through sending of fake Address Resolution Protocol
performing some computation and checks the output (ARP) messages and packets into the local area network.
signal to obtain patterns associated with encryption The attacker’s MAC address becomes associated with
within the data. These faults can be anything from the IP address of a legitimate host, this causes traffic
unusual environmental conditions (increased heat, for meant for the host to go to the adversary [76].
example), the injection of a laser beam at the appropriate
frequency [64], or the injection of data packets that 3.3.3 Network/Transport Layer
collide with legitimate packets [71]. The work of Yuan TCP/IP protocols are said to be the two more
et al and Liu et al has shown the load redistribution vulnerable standards in the network infrastructure, due
attack [72, 73, 74]. This is a false data injection attack to the use of email as the communication media [2, 12].
which modifies selected information in a SCADA power Traffic flooding and worm attacks through the internet

6
Journal of Energy and Power Engineering

have led to serious performance issues [2]. Buffer flood- traffic between the HMI (reading) and logic controllers
ing attacks on through the DNP3 protocol have been (writting) [16].
examined in the literature [77, 78]. The work of East et
al saw the creation of a taxonomy of such attacks; which 3.4.2 Tranmission Level Attacks
can range from sending fake DNP3 messages in order to Transmission SCADA, aka T-SCADA, standards are
reset, manipulate, or corrupt data from a substation [79]. responsible for the monitoring of inputs and outputs
through the transmission system. Examples of inputs
3.3.4 Application Layer might include phasor measurements, line voltages, fre-
Application layer attacks seek to exhaust the re- quencies, transformer settings, and load values. Exam-
sources of a communication channel, focusing on trans- ples of outputs might include capacitance, load adjust-
mission bandwidth in computers and routers [2]. These ments, and breaker controls [12]. These I/O values can
attacks seek to limit the bandwidths of CPU’s and be redefined upon an attacker compromising the T-
I/O’s of connected devices. The work of Ranjan et al SCADA server, examples of which are the following
saw the study and categorization of a number of such [12]. (i) The centralized SCADA console can receive
attacks. A flood attack sends requests at higher than nor- misrepresented values. (ii) Malicious data can be written
mal frequencies, while asymmetrical attacks send high- to the main controller. (iii) The manipulation of secure
workload requests. One-shot attacks has the attacker channels leading to substation gateways use Secure
spreading the workload over multiple sessions, using Socket Layer (SSL) and Transport Layer Security (TLS)
HTTP floods to stress the servers over time [80]. certificate-based protocols. Implanting an unauthorized
device with the appropriate certificate can lead to the
3.4 Control and Monitoring Attacks compromise of the wide area network.
Fieldbus is the family of industrial computer net- 3.4.3 Distribution Level Attacks
work protocols brought together under a standard
Compromising distribution SCADA, or D-SCADA,
known as IEC 61158. They include DNP3 (Distributed
systems can lead to the access of power output manage-
Network Protocol), Modbus, PROFIBUS (Process Field
ment systems, AMI headend, and generation systems.
Bus), CIP (Modeling and Data Management). Each is
At the device level, the compromising of field controllers
designed so that they follow the master-slave model of
and others can lead to an array of consequences; ranging
device communication [12].
from merely operational inefficiencies to outages that
Many protocols lack authentication and are without
come from the reporting of false data [12]. An example
encryption procedures, leaving a system using Fieldbus
would be an auto recloser, a type of remote terminal
protocols susceptible to a range of attacks [4, 12]. (i)
unit (RTU) which acts as a breaker to protect against
The sending of illegitimate data packets causing pro-
power surges and leads to a recovery mode state once
tocol failure. (ii) Protocol commands can force slave
conditions return to normal. The right manipulation
devices into inoperable states. (iii) Protocol commands
could lead to the recloser tripping at the inappropri-
can force restarts, thus interrupting industrial processes.
ate moment, which have a cascading effect throughout
(iv) Codes can erase data from diagnostics. (v) Other
the distribution system. An attacker acquiring complete
codes can retrieve user or business information. (vi)
control over an RTU is in a position to insert malicious
Certain commands can broadcast to multiple devices
logic or code into the RTU controller. Malware within
at once, therefore stopping the flow of network traffic
the RTU can cause random faults in the system, while at
(denial of service) (vii) Querying network devices via a
the same time reporting nominal working conditions to
forced configuration and function scans.
the utility center. This disrupts power distribution in the
targeted area, which resembles denial of service attacks
3.4.1 Generation Level Attacks
stated earlier.
The control processes of generation SCADA, aka G-
SCADA, controllers are susceptible to a range of vulner- 3.4.4 Time Delay Switch Attack
abilities [4, 12]: (i) individual controllers can be manipu-
The work of Sargolzaei et al has demonstrated what
lated, resulting in control codes being overwritten with
is called the time delay switch (TDS) attack [81, 82, 83].
harmful commands. (ii) Programmable logic controllers,
It introduces a range of time delays into the data stream
HMI and SCADA systems can be used to establish an
during the various state measuring points of a power
external control channel to steal data. (iii) The HMI can
plant, where it was shown to be very effective when
be accessed and used to manually override portions
applied at the interplay between power station levels.
of the control process. (iv) A man-in-the-middle attack
Their work focused on the attack’s ability to intrude
inline on the Ethernet network can alter the flow of I/O

7
Journal of Energy and Power Engineering

communication channels for the sensing loop and au- from these above listed attacks, the following scheme has
tomatic generation control signals of a power system. been proposed [87]. (i) The meter will transmit legitimate
These signals exist between the IT layer and the control measurement data to the user through a secure channel.
area of the power plant. It was demonstrated that TDS (ii) The user will calculate the final bill by combining
attacks can be used to sabotage an entire power system the meter data with a certified tariff policy. (iii) The bill
by forcing it into a state of destabilization. is then transmitted to the provider alongside a zero-
knowledge proof, which will validate the computation.
4 C OUNTERMEASURES AND S OLUTIONS It is the act of limiting the data exchange to purely billing
information that the user’s privacy is maintained [1].
4.1 Infrastructure Countermeasures
4.1.1 Injection/Spoofing Countermeasures 4.1.5 Distributed Data Aggregation
At the cyber defense level, bad data injection (BDI) Incremental data aggregation approaches have been
puts prime importance on the transmission and authen- proposed in the literature [88, 89]. The aggregator acts as
tic receiving of legitimate data. The most recent works in the root of an aggregation network tree which connects
the literature have focused on strict authentication and all nearest neighbor smart meters. All meters would
key management [84]. Strict authentication techniques in forward their collected data towards this centralized
the literature deal with using Transport Layer Security tree, where all data along the path would be encrypted
(TLS) and Secure Socket Layer (SSL) protocols are used via homomorphic encryption. Homomorphic encryption
in conjunction with the Secure Hash Algorithm (SHA) allows for computations to be enacted on the plaintext
and Hash Message Authentication Code (HMAC) are of an encrypted message through the ciphertext. This
also used to verify communication channel traffic [84]. encryption process happens at each node of the tree
Dynamic key management has been implemented in before being forwarded to the next level, where the
the literature as a means of throwing attackers off by highest level is connected to the service provider. In this
constantly refreshing secret keys in the data stream [85]. scheme, individual meters only see portions of the data,
preserving user identity [1].
4.1.2 Theft Detectors
The work by Mashima and Cardenas [19] correlates 4.1.6 Memory Attestation
energy theft with the creation of a set of time series
Attestation refers to validating the integrity of a
representing the customer’s electricity consumption in
device for computing. A number of attestation schemes
Watt-hours. The goal of the attackers is to use the time
have been proposed in the literature to deal with MITM
series to force the utility to lower the energy bill. A theft
or DOS attacks. The work of Song et al saw the cre-
detector can be constructed by taking the average of
ation of a protocol which checks for the modification
the series over a number of measurements and check
of memory in the channel and generates a checksum
whether this is less than some threshold value. This
rule when this occurs. This checksum is only sent in
threshold value being the minimum of daily averages
one direction, thus negating the attacker’s ability to
taken over a pre-set number of days in the past [19].
take advantage of the grid’s two-way communication
scheme [90]. The work of He et al proposed a delay-
4.1.3 Secure Key Management
resilient remote memory (DRMA) technique, which can
It is crucial to design secure and scalable manage- detect compromised devices based on their response
ment schemes based upon the generation, distribution, time when compared to the delivery time of a healthy
and updating of shared cryptographic keys [20]. Public grid [91]. Based on data coming from the real-time delay,
Key Infrastructure (PKI) has been touted as a viable so- compromised devices can be sorted out from healthy
lution when implemented as a key management device. ones.
PKI being a standard for binding public cryptographic
keys with user identities by means of central certificate 4.1.7 Anonymization
authority [86]. An alternative that is useful for the distri-
Anonymization has been proposed as a solution
bution of public keys would be the dated but applicable
to the problem of meters being subjected to MITM,
technique created by Diffie and Hellman [20].
spoofing, and other attacks [1]. Data is broken down into
4.1.4 Privacy Preserving Metering high and low frequency components, which encompass
consumption and billing data respectively. The work of
The information network in the smart grid will
Efthymiou and Kalogridis suggests to keep the connec-
frequently transport confidential user information such
tion between high and low frequency data known only
as customer identity, location, associated electronic de-
to a third party [92]. The data can then be sampled at
vices, power usage, etc. In order to protect this data

8
Journal of Energy and Power Engineering

the appropriate frequency without compromising load 4.3 SCADA Countermeasures


balancing mechanisms. 4.3.1 Live Forensics
The work of Ahmed et al demonstrated a need for
4.1.8 State Estimation
forensically examining SCADA systems without turning
The work of Giani et al shows a countermeasure them off [97]. Ahmed put forward a technique called live
against unobservable attacks based on state estimation forensics in order to detect and thus partially mitigate
and the use of phase measurement units (PMU’s) [93, threats in real time. The work of Taveras capitalized on
94]. Her team examined the compromising of a 19 bus the work of Ahmed at al, where live data acquisition was
portion of an IEEE 300 bus test case. Each attack is used to take in both volatile and non-volatile information
associated with what is called an island, modeled as a from various levels of the SCADA system [98]. This
perturbation in the power flow [94]. The voltage phase is done by setting up a watch dog by means of finite
angles evolve in time in unison in each island, and state estimation, constantly monitoring events. If the
should ideally have only one way (state) in which they system were to go into a particular strange state that
travel. If the number of travelling states becomes large, violates a predefined rules, the watchdog will switch
one would observe deviation in the power flow which to forensics mode in order to collect the data. Wu et
is associated with a compromised device [93, 94]. al implemented these techniques on a programmable
logic controller, where they targetted the change of the
4.2 Decryption Countermeasures memory addresses in the controller [99]. Further research
4.2.1 Electromagnetic and Power Analysis Counter- is needed to make these techniques viable for the large
measures amounts of data found in actual SCADA systems.
The most generally implemented countermeasure
4.3.2 Industrial Protocol Filters
against electromagnetic (EM) and DPA attacks is to de-
crease the relationship between the data and the power The traffic associated with protocols like Modbus,
consumption of the device. Multiple options exist for this DNP3, IEC 61850 and others can be filtered depending
purpose of making attacks computationally expensive upon the needs of the SCADA distribution. The work
for the attacker. Reducing the signal to noise ratio via of Kang et al demonstrated a number of techniques
the addition of Gaussian noise into the data will hide for preventing infected traffic from attacking SCADA
interesting signals in the power trace [95]. DPA attacks protocols. Dubbed the IndusCAP-Gate system, it auto-
usually assume the signal is sampled periodically, so an matically generates whitelists by analyzing traffic and
effective further countermeasure would be to randomize performing multiple filtering based up said lists for
and shuffle data points in time [95]. It is possible to make blocking suspected traffic [100]. Multiple filters are a
the vulnerable part of a signal disappear in the power series of four filters for analyzing data packets, checking
trace by randomly applying cryptographic masks to it policy adherence in the packets and access control [100].
[95].
4.3.3 Intrusion Detection and Prevention Systems
4.2.2 Fault Analysis Countermeasures Deep packet inspection (DPI) can be performed
The literature describes general countermeasure on a network, with the traffic being checked against a
against fault analysis attacks: sensor-based and error- set of vulnerability signatures [12]. A number of open
detection based [96]. Sensor-based techniques focus on source tools exist for this purpose. The de facto standard
finding environmental faults caused by such attacks. is Snort, maintainted by Sourcefire. It reads network
Error-detection based strategies involve the introduction packets, logs them and analyzes network traffic. Once
of redundancies at the hardware, software, and informa- traffic is received, Snort will decode packets and turn
tion levels in order to detect fault injection [96]. Temporal them into data structures and identifies the protocols
redundancy involves repeating the same process or fol- therein. It can then decode IP, TCP or UDP dependencies,
lowing it up with the inverse process to check for faults. raising an alarm if malformed headers or similar issues
Information redundancy checks for separation between are detected [101].
the output of codes predicting a certain output and the Yasakethu and Jiang proposed an IDS method based
actual output of said code. These tests have been applied on machine learning so as to sequentially acquire knowl-
to advanced encryption standard (AES) hardware, which edge about incoming data and make predictions about
is slated to have future applications in the smart grid. future events based on previous data [102]. The pro-
posed machine-machine interface would involve rule-
based algorithms in order to identify causality between
events and vector machines to classify said events [103].

9
Journal of Energy and Power Engineering

Artificial neural networks (ANN) and Hidden Markov [10] B. Galloway and G. Hancke, “Introduction to in-
Models would then be used for nonlinear data analysis dustrial control networks,” IEEE Communications
when coping with data that is temporally dependent Surveys and Tutorials, 2012.
[102]. [11] G. Ericsson, “Cyber security and power system
communication-essential parts of a smart grid in-
5 C ONCLUSION frastructure,” IEEE Transactions on Power Delivery,
This paper was used to identify interesting projects 2010.
and possible avenues of further research with which to [12] E. D. Knapp and R. Samani, Applied Cyber Security
take part in the smart grid security industry. Multiple and the Smart Grid: Implementing Security Controls
issues of importance to smart grid cyber security were into the Modern Power Infrastructure. New York,
studied and discussed. These include the smart metering New York: Elsevier Inc., 2013.
infrastructure, power line communication, distributed [13] S. McLaughlin et al., “Energy theft in the advanced
energy resources, and network systems. The available metering infrastructure,” IEEE Journal on Selected
literature shows a spectrum of possible routes through Issues in Communications, 2009.
which the smart grid may be made vulnerable to attack. [14] F. Molazem, “Security and privacy of smart meters:
An observed trend was that many of the attacks were A survey,” University of British Columbia: Overview
almost identical in their function, but they are simply of Computer Security, 2012.
applied to the grid in different ways. The literature [15] F. Cleveland, “Cyber security issues for advanced
bears out a number of theoretical, computational and metering infrastructure,” Power and Energy Society
experimental algorithms to increase the safety of the General Meeting-Conversion and Delivery of Electrical
smart grid. Energy in the 21st Century, 2008.
[16] R. Langner, “To kill a centrifuge: A technical anal-
R EFERENCES ysis of what stuxnet’s creators tried to achieve,”
[1] A. Bari et al., “Challenges in the smart grid ap- The Langner Group, 2013.
plications: An overview,” International Journal of [17] A.-H. Mohsenian-Rad et al., “Distributed internet-
Distributed Server Networks, 2014. based load altering attacks against smart power
[2] W. a. a. Wange, “A survey on the communication grids,” IEEE Transactions on Smart Grid, 2011.
architectures in smart grid,” Computer Networks, [18] R. Berthier et al., “Intrusion detection for advanced
2011. metering infrastructures: Requirements and archi-
[3] Y. Ye, Y. Qian, et al., “A survey on smart grid com- tectural directions,” First IEEE International Con-
munication infastructures: Motivations, require- ference on Smart Grid Communications (SmartGrid-
ments, and challenges,” IEEE Communications Sur- Comm), 2010.
veys and Tutorials, 2012. [19] D. Mashima and A. Cardenas, “Evaluating elec-
[4] E. D. Knapp, Industrial Network Security: Secur- tricity theft detectors in smart grid networks,”
ing Critical Infrastructure Networks for Smart Grid, Research in Attacks, Intrusions, and Defenses, 2012.
SCADA, and other Industrial Control Systems. New [20] S. G. I. Panel, “Introduction to nistir 7628 guide-
York, New York: Elsevier Inc., 2011. lines for smart grid cyber security,” The Smart Grid
[5] S. Horowitz and A. Phadke, Power System Relaying. Interoperability Panel Cyber Security Working Group,
New York, New York: John Wiley & Sons, Ltd, 2010.
third ed., 2008. [21] X. Li et al., “Securing smart grid: Cyber attacks,
[6] S. Depuru et al., “Smart meters for power grid: countermeasures, and challenges,” IEEE Transac-
Challenges, issues, advantages and status,” Renew- tions on the Smart Grid, 2012.
able and Sustainable Energy Reviews, 2011. [22] I. Tubert-Broham, An Introduction to Cryptography.
[7] A. Richter et al., “Transitioning from the traditional Santa Clara, CA: Network Associates, Inc, 1999.
to the smart grid: Lessons learned from closed loop [23] U. S. G. A. Office, “Challenges in securing the
supply chains,” Proceedings of 2012 International electricity grid,” GAO-12-926T, Testimony before the
Conference on Smart Grid Techology, Economics and Committee on Energy and Natural Resource, U.S.
Policies, 2012. Senate, 2012.
[8] G. Pepermans et al., “Distributed generation: defi- [24] F. Skopik et al., “A survey on threats and vulnera-
nition, benefits and issues,” Energy Policy, 2005. bilities in smart metering infrastructures,” Interna-
[9] G. A. Taylor et al., “Distributed monitoring and tional Journal of Smart Grid and Clean Energy, 2012.
control of future power systems via grid com- [25] N. Mohammadi et al., “A framework for intrusion
puting,” IEEE Power Engineering Society General detection system in advanced metering infrastruc-
Meeting, 2006. ture,” Security Communication Networks, 2012.

10
Journal of Energy and Power Engineering

[26] D. Grochocki et al., “Ami threats, intrusion detec- tories, Inc, 2009.
tion requirements and deployment recommenda- [42] D. Ingram et al., “Evaluation of precision time
tions,” Proceedings of 3rd IEEE International Confer- synchronization methods for substation applica-
ence on Smart Grid Communications, 2012. tion,” International IEEE Symposium on Precision
[27] K. Fezzani et al., “Analysis and optimization of Clock Synchronization for Measurement Control and
power line coupling circuits for cenelec-plc mo- Communication, 2012.
dem,” IEEE International Conference on Electronics, [43] C. Sciences, “Overview of irig-b time code
Circuits, and Systems, 2006. standard.” http://www.cyber-sciences.com/
[28] F. Khan et al., “An overview of ofdm based nar- documents/TN-102 IRIG-B.pdf, January 2014.
rowband and communication standards for smart [44] B. Dickerson, “Precision timing in the power in-
grid applications,” World Applied Sciences Journal, dustry: How and why we use it.” http://www.
2012. arbiter.com/news/technology.php?id=4, 2014.
[29] S. Galli, A. Scaglione, and Z. Wang, “For the grid [45] M. Zafirovic-Vukotic et al., “Securing scada com-
and through the grid: The role of power line munications following nerc cip requirements,”
communication in the smart grid,” CoRR, 2011. Asia Energy Week, 2008.
[30] P. Langfeld and K. Dostert, “Ofdm system syn- [46] N. A. E. R. C. (NERC) and C. I. P. Committee,
chronization for powerline communication,” Insti- “Nerc standard cip-002 through cip-009,” Cyber
tute of Industrial Information Systems, 2001. Security, 2006.
[31] A. Onyemaechi et al., “Modulation and demodula- [47] SecureState, “Termineter: Smart meter testing
tion techniques in powerline carrier,” Advances in framework.” https://code.google.com/p/
Agriculture, Sciences and Engineering, 2013. termineter/, 2014.
[32] E. E. R. E. U.S. Department of Energy, “Annual [48] ANSI, “Protocol specifications for ansi type 2 op-
report on us wind power installation, cost, and tical port,” American National Standards Institute,
performance trends 2007,” 2008. 2006.
[33] G. Frederich and P. Dove, “Integrating distributed [49] ANSI, “American national standard for utility in-
energy resources into the smart grid,” Advantech dustry end device data tables,” American National
Corportation Industrial Group, 2010. Standards Institute, 2009.
[34] P. Tenti and P. Mattavelli, “Improving power qual- [50] F. Aloul et al., “Smart grid security: Threats, vul-
ity and distribution efficiency in micro-grids by nerabilities, and solutions,” International Journal of
cooperative control of switching power interfaces,” Smart Grid and Clean Energy, 2012.
International Power Electronics Conference, 2010. [51] C. Valli et al., “Eavesdropping on the smart grid,”
[35] A. Castabeber et al., “Surround control of dis- Proceedings of the Austrailian Digital Forensics Con-
tributed resources in micro-grids,” 2010 IEEE In- ference, 2012.
ternational Conference on Sustainable Energy Technolo- [52] P. Parikh et al., “Opportunities and challenges
gies, 2010. of wireless communication technologies for smart
[36] A. Sobe and W. Elmenreich, “Smart microgrids: grid applications,” IEEE Power and Energy Society
Overview and outlook,” CoRR, 2013. General Meeting, 2010.
[37] H. Liang and W. Zhuang, “Stochastic modeling [53] Z. Baig and A.-R. Amoudi, “An analysis of smart
and optimization in a microgrid: A survey,” En- grid attacks and coutermeasures,” Journal of Com-
ergies, 2014. munications, 2013.
[38] L. Ferdinando, “Fort bliss unveils army’s first mi- [54] L. Lazos and M. Krunz, “Selective jamming/drop-
crogrid.” http://www.army.mil/article/103577/ ping insider attacks in wireless mesh networks,”
Fort Bliss unveils Army s first microgrid/, May IEEE Network, 2011.
2013. [55] Y. Xu, “Wireless mesh network in smart grid:
[39] P. Buxbaum, “Microgrid and power.” http://www. Modeling and analysis for time critical communi-
kmimediagroup.com/military-logistics-forum/ cations,” IEEE Transactions on Wireless Communica-
432-articles-mlf/microgrids-and-power/ tions, 2013.
5463-microgrids-and-power, Feb. 2014. [56] O. Kosut et al., “Malicious data attacks on the
[40] N. Barnes, “Smart microgrids on colleges and uni- smart grid,” IEEE SmartGridComm, 2010.
versity campuses.” http://www.aashe.org/blog/ [57] O. Kosut et al., “Malicious data attacks on the
smart-microgrids-college-university-campuses, smart grid,” IEEE Transactions on Smart Grid, 2010.
May 2011. [58] Y. Liu, P. Ning, and M. Reiter, “False data injection
[41] D. Dolezilek and S. Schweitzer, “Practical applica- attacks against state estimation in electric power
tions of smart grid,” Schweitzer Engineering Labora- grids,” ACM Conference on Computer and Communi-

11
Journal of Energy and Power Engineering

cations Security, 2009. attacks against state estimation in electric power


[59] A. N. S. Institute, “Protocol specification for tele- grids,” ACM Transactions on Information and System
phone modem communication,” Accredited Stan- Security, 2011.
dard Committee on Electricity Metering, 1999. [75] A. Proano and L. Lazos, “Selective jamming at-
[60] E. Byres et al., “The use of attack trees in assess- tacks in wireless networks,” IEEE International Con-
ing vulnerabilities in scada systems,” International ference on Communications (ICC), 2010.
Infrastructure Survivability Workshop, 2004. [76] U. Premaratne et al., “An intrusion detection sys-
[61] X. Carcelle, Power Line Communications in Practice. tem for iec61850 automated substations,” IEEE
Boston, Massachussetts: Artech House, 2006. Transactions on Power Delivery, 2010.
[62] F.-X. Standaert, Introduction to Side-Channel Attacks. [77] D. Jin et al., “An event buffer flooding attack in
Paris, France: Springer, 2010. dnp3 controlled scada systems,” Proceedings of the
[63] D. Agrawal et al., The EM Side-Channel(s): At- 2011 Winter Simulation Conference, 2011.
tacks and Assessment Methodologies. London, UK: [78] D. Lee et al., “Simulated attack on dnp3 protocol
Springer, 2003. in scada systems,” The 31st Symposium on Cryptog-
[64] J. Di-Battista et al., “When failure analysis meets raphy and Information Security, 2014.
side-channel attacks,” Springer Cryptographic Hard- [79] S. East et al., “A taxonomy of attacks on the
ware and Embedded Systems: Lecture Notes in Com- dnp3 protocol,” IFIP Advances in Information and
puter Science, 2010. Communication Technology, 2009.
[65] F. Debeer et al., “Practical electro-magnetic anal- [80] S. Ranjan et al., “Ddos-shield: Ddos-resilient
ysis,” Non-Invasive Attack Testing Workshop NIAT, scheduling to counter application layer attacks,”
2011. IEEE/ACM Transactions on Networking, 2009.
[66] O. Meynard et al., “Characterization of the infor- [81] A. Sargolzaei et al., “Time-delay switch attack on
mation leakage of cryptographic devices by us- load frequency control in smart grid,” Advances in
ing em analysis,” Springer Information Security and Communication Technology, 2013.
Cryptology: Lecture Notes in Computer Science, 2012. [82] A. Sargolzaei, Y. Kang, and M. N. Abdelghani,
[67] M. Enev and S. Gupta, “Televisions, video privacy, “Control of nonlinear heartbeat models under
and powerline electromagnetic interference,” Pro- time-delay-switched feedback using emotional
ceedings of the 18th ACM Conference on Computer and learning control,” International Journal on Recent
Communications Security, 2011. Trends in Engineering and Technology, 2014.
[68] Y. Hayashi et al., “An analysis of information leak- [83] A. Sargolzaei, Y. Kang, and M. N. Abdelghani,
age from a cryptographic hardware via common- “Delayed inputs attack on load frequency control
mode currnet,” Proceedings of the 2009 International in smart grid,” The Fifth Conference on Innovative
Symposium on Electromagnetic Compatibility, Kyoto, Smart Grid Technologies (ISGT), IEEE, 2014.
2009. [84] D. Wang et al., “A survey on bad data injection
[69] Y. Hayashi et al., “Information leakage from cryp- attack in smart grid,” The 5th IEEE PES Asia-Pacific
tographic hardware via common-mode current,” Power and Energy Engineering Conference, 2013.
IEEE International Symposium on Electromagnetic [85] Y. Sun et al., “Dynamic secret-based encryption
Compatibility (EMC), 2010. method in smart grid wireless communication,”
[70] Y. Hayashi et al., “Evaluation of information leak- IEEE Innovative Smart Grid Technologies-Asia, 2012.
age from cryptographic hardware via common- [86] T. Baumeister, “Adapting pki for the smart grid,”
mode current,” Institute of Electronics, Information IEEE International Conference on Smart Grid Commu-
and Communication Engineers Transactions on Elec- nications, 2011.
tronics, 2012. [87] A. Rial and G. Danezis, “Privacy-preserving smart
[71] A. Moradi et al., “On the power of fault-sensitivity metering,” Proceedings of the 10th Annual ACM
analysis and collision side-channel attacks in a Workshop on Privacy in the Electronic Society, 2011.
combined setting,” Springer Cryptographic Hardware [88] F. Li et al., “Secure information aggregation for
and Embedded Systems, 2011. smart grids using homomorphic encryption,” Pro-
[72] Y. Yuan et al., “Modeling load redistribution at- ceedings of the 1st IEEE Conference on Smart Grid
tacks in power systems,” IEEE Transactions on Communications, 2010.
Smart Grid, 2011. [89] S. Ruj et al., “A security architecture for data
[73] Y. Yuan et al., “Quantitative analysis of load redis- aggregation and access control in smart grids,”
tribution attacks in power systems,” IEEE Transac- Computing Research Repository (CoRR), 2011.
tions on Parallel and Distributed Systems, 2012. [90] K. Song et al., “Omap: One-way memory attesta-
[74] Y. Liu, P. Ning, and M. Reiter, “False data injection tion protocol for smart meters,” Ninth IEEE In-

12
Journal of Energy and Power Engineering

ternational Symposium on Parallel and Distributed Arman Sargolzaei earned his MS degree in Electrical
Processing with Applications Workshops, 2011. Engineering in 2012 from Florida International Univer-
[91] X. He et al., “A novel delay-resilient remote mem- sity in Miami, Florida. He is currently a PhD candidate in
ory attestation for smart grid,” Springer Wireless electrical engineering at Florida International University
Algorithms, Systems, and Applications, 2013. where he researches at the Dynamcial Systems Labora-
[92] C. Efthymiou and G. Kalogridis, “Smart grid pri- tory under the supervision of Professor Kang Yen. He
vacy via anonymization of smart metering data,” is also working as a computer hardware developer for
First IEEE International Conference on Smart Grid PLC International Inc.
Communications, 2010.
[93] A. Giani et al., “Smart grid data integrity attacks: Hugo Santana earned his Computer Systems Engi-
Characterizations and countermeasures,” Second neering degree in 2011 from Monterrey Institute of Tech-
International Conference on Smart Grid Communica- nology and Higher Education in Monterrey, Mexico. He
tions, 2011. currently works as a Software Developer for Embedded
[94] A. Giani et al., “Smart grid data integrity attacks,” Systems at PLC International Inc. His areas of interests
IEEE Transactions on Smart Grid, 2013. include Big Data and Back-end programming.
[95] T. Güneysu and A. Moradi, “Generic side-channel Carlos Huerta is the President of PLC International
countermeasures for configurable devices,” Spring Inc. His areas of interest include Smart Power Grid and
Cryptographic Hardware and Embedded Systems, 2011. Telecommunications technologies.
[96] K. Bousselam et al., “On countermeasures against
fault attacks on the advanced encryption stan-
dard,” Fault Analysis in Cryptography, 2012.
[97] I. Ahmed et al., “Scada systems: Challenges for
forensic investigators,” Computer, 2012.
[98] P. Taveras, “Scada live forensics: Real time data
acquisition process to detect, prevent, or evaluate
critical situations,” 1st Annual International Interdis-
ciplinary Conference, 2013.
[99] T. Wu et al., “Towards a scada forensic architec-
ture,” Proceedings of the 1st International Symposium
for ICS and SCADA Cyber Security Research, 2013.
[100] D. Kang et al., “Whitelists based multiple filtering
techniques in scada sensor networks,” Journal of
Applied Mathematics, 2014.
[101] A.-S. Pathan, The State of the Art in Intrusion Pro-
tection and Detection. Boca Raton, FL: Auerbach
Publications, 2014.
[102] S. Yasakethu and J. Jiang, “Intrusion detection via
machine learning for scada syste m protection,”
Proceedings of the 1st International Symposium for ICS
& SCADA Cyber Security Research, 2013.
[103] R. Mitchell and I.-R. Chen, “Behavior-rule based
intrusion detection systems for safety critical smart
grid applications,” IEEE Transactions on Smart Grid,
2013.
Carlos Lopez received his BS degree in Electrical
Engineering in 2013 and his BS degree in Physics in
2014 from Florida International University in Miami,
Florida. He was an intern in electrical engineering at PLC
International Inc and is currently an electrical engineer
performing research and development work at the US
Naval Research Laboratory as a contractor for Excet,
Inc. His research interests include electromagnetics and
alternative energy systems.

13
View publication stats

You might also like