2019 SoutheastCon 2019
DOI: 10.1109/southeastcon42311.2019.9020426
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of Man in the Middle Attack On Smart Grid Testbed

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Authors in [1] present a MiTM attack on PMUs and PDCs by generating IEEE C37.118 packets using Wireshark. The use of Wireshark for creating a MiTM attack is unrealistic because it adds latency to the system that can be easily detected.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in [1] present a MiTM attack on PMUs and PDCs by generating IEEE C37.118 packets using Wireshark. The use of Wireshark for creating a MiTM attack is unrealistic because it adds latency to the system that can be easily detected.…”
Section: Related Workmentioning
confidence: 99%
“…The integration of information technology (IT) with industrial control systems (ICS) has revolutionized smart control of critical infrastructure systems such as energy, water, chemical, and transportation. Fast and accurate remote data collection and processing are helping to automate and optimize these sectors [1]. Initially, the integration of IT (cyber) and ICS (physical) systems focused on utility rather than data security.…”
Section: Introductionmentioning
confidence: 99%
“…Process the dnp3P oint.chunkIndex[0] and dnp3P oint.chunkIndex [1] mod pkt = send to master(mod pkt) 22: return mod pkt 23: end function sponse stating that the breaker is opening. The intruder then modifies the true response into a binary CLOSE response and forwards it to the operator.…”
Section: F Acknowledgements Modificationmentioning
confidence: 99%
“…The work in [18] and [19] focuses on developing real-time solutions for detecting and defending against denial-of-service (DoS) attacks. In [18], a dynamic differential system is used that models the changing states of a metering infrastructure during DoS attacks and in [19] an online storage facility is proposed for access to faster and scalable data analysis.In [20,21,22] solutions are proposed to protect against negative impacts on power grid state estimation due to delays in the transmission of state measurements and control signals.The work in [23] demonstrates that the lack of strong integrity and authentication checks in a power grid's network communication protocols can allow hackers easy access to the system and may cause detrimental effects to performance.…”
Section: Nomenclaturementioning
confidence: 99%