2021
DOI: 10.1049/cps2.12014
|View full text |Cite
|
Sign up to set email alerts
|

Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

Abstract: Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few res… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 63 publications
(27 citation statements)
references
References 20 publications
(34 reference statements)
0
27
0
Order By: Relevance
“…The evidences are collected at three locations: DNP3 Master, Substation Router, and server hosting PWDS. Details on the testbed’s architecture, use cases, and fusion are published in [ 11 , 21 , 33 ], respectively.…”
Section: Testbed and Fusion Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The evidences are collected at three locations: DNP3 Master, Substation Router, and server hosting PWDS. Details on the testbed’s architecture, use cases, and fusion are published in [ 11 , 21 , 33 ], respectively.…”
Section: Testbed and Fusion Architecturementioning
confidence: 99%
“…The objective of the intruder is to disrupt grid operations through False Command and Data Injection, whose impacts are detailed in [ 21 , 33 ]. Four use cases with this threat model are considered here.…”
Section: Testbed and Fusion Architecturementioning
confidence: 99%
“…This enables modularity by segregating the details of MiTM dynamics from a power system researcher who is concerned with the traffic that is modified rather than how they are modified. The algorithms incorporated for different use cases in Figure 5b are presented in [43].…”
Section: Resilient Energy Systems Lab Cyber‐physical Testbed Architec...mentioning
confidence: 99%
“…A brief overview of each component is given below. The detailed explanation of RESLab, including its architecture and use cases, is provided in [22], [36]. Common Open Research Emulator (CORE) is used to emulate the communication network.…”
Section: A Testbed Architecturementioning
confidence: 99%
“…The objective of the intruder is to disrupt grid operations. Details on the sequence of actions that create the FCI and FDI attacks and how they impact the power system side are detailed in [22], [36]. These are four use cases:…”
Section: B Modifying Measurements and Commandsmentioning
confidence: 99%