Cyber-physical Models of Power System State Estimation Security - - PowerPoint PPT Presentation

cyber physical models of power system state estimation
SMART_READER_LITE
LIVE PREVIEW

Cyber-physical Models of Power System State Estimation Security - - PowerPoint PPT Presentation

Cyber-physical Models of Power System State Estimation Security Gyrgy Dn School of Electrical Engineering KTH, Royal Institute of Technology Stockholm, Sweden Joint work with: Ognjen Vukovi, Henrik Sandberg, Kin Cheong Sou, Andr


slide-1
SLIDE 1

Cyber-physical Models of Power System State Estimation Security

György Dán

School of Electrical Engineering KTH, Royal Institute of Technology Stockholm, Sweden

Joint work with: Ognjen Vuković, Henrik Sandberg, Kin Cheong Sou, André Teixeira, Karl-Henrik Johansson, Gunnar Karlsson

TCIPG Seminar Series 7 December 2012

slide-2
SLIDE 2

Supervisory Control and Data Acquistion (SCADA)

  • Computerized monitoring and control
  • Real-time data acquisition
  • Metering

– Voltage, current, power

  • Status information

– Breakers

  • Control
  • Energy Management System (EMS)
  • Short circuit calculation
  • Contingency analysis
  • Optimal power flow
  • ...
  • State estimation

2 György Dán http://www.ee.kth.se/~gyuri

  • A. Teixeira et al, ``Optimal Power Flow: Closing the Loop over Corrupted

Data,‘’ in Proc. of American Control Conference (ACC), Jun. 2012

  • L. Xie et al, “False Data Injection Attacks in Electricity Markets,” in Proc. of

IEEE SmartGridComm, Oct. 2010

slide-3
SLIDE 3

z1

  • Steady-state power flow model
  • Estimation of phase angles i,(

vector) based on (z)

  • Weighted Least Squares (WLS) estimation
  • Gauss-Newton algorithm

Model-based State Estimation

X12 z2

3 György Dán http://www.ee.kth.se/~gyuri

X13

slide-4
SLIDE 4

Bad Data Detector (BDD)

  • Measurement residual
  • Hypothesis testing
  • H0: Random measurement noise
  • Various methods
  • test (Normal distribution)
  • Maximum normalized residual
  • BDD alarm

) ˆ ( ) ( ˆ : x h e x h z z r     

2

State estimator Bad Data Detector Contingency Analysis Optimal Power Flow x z=h(x)+e

z z r ˆ   x ˆ z x ˆ , ˆ

Operator

1

u

2

u u

Alarm

4 György Dán http://www.ee.kth.se/~gyuri

' 2

z

slide-5
SLIDE 5

State Estimator and BDD

State estimator Bad Data Detector Contingency Analysis Optimal Power Flow

z z r ˆ   x ˆ z x ˆ , ˆ

Operator

1

u

2

u u

x

5 György Dán http://www.ee.kth.se/~gyuri

z=h(x)+e

slide-6
SLIDE 6

Naïve Attack on the State Estimator

State estimator Bad Data Detector Contingency Analysis Optimal Power Flow za=h(x)+a+e

a a a

z z r ˆ  

a

x ˆ

a a z

x ˆ , ˆ

Operator

1

u

2

u u

+ Attacker a Alarm! x

6 György Dán http://www.ee.kth.se/~gyuri

z=h(x)+e

slide-7
SLIDE 7

State Estimator and BDD

State estimator Bad Data Detector Contingency Analysis Optimal Power Flow

z z r ˆ   x ˆ z x ˆ , ˆ

Operator

1

u

2

u u

x

7 György Dán http://www.ee.kth.se/~gyuri

z=h(x)+e

slide-8
SLIDE 8

Stealth Attack on the State Estimator

State estimator Bad Data Detector Contingency Analysis Optimal Power Flow za=h(x)+a+e

z z r ˆ   c x  ˆ a z c x   ˆ , ˆ

Operator

1

u

2

u u

+ Attacker a=Hc No alarm… x

8 György Dán http://www.ee.kth.se/~gyuri

  • Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state

estimation in electric power grids,” in Proc. ACM CCS, 2009, pp. 21–32.

) (

  

x

x x h H

z=h(x)+e

slide-9
SLIDE 9

Two Examples

  • 40 bus training network
  • Real and pseudo measurement data (66 measurement points)

9 György Dán http://www.ee.kth.se/~gyuri

  • Simple network
slide-10
SLIDE 10

Minimum Effort Stealth Attacks

10 György Dán http://www.ee.kth.se/~gyuri

  • Based on linear approximation
  • Pseudo measurements unchanged

40 bus training network

  • : maximum metering redundancy
  • : actual metering redundancy
slide-11
SLIDE 11

Specific Attack: „Naive”

Attack

11 György Dán http://www.ee.kth.se/~gyuri

  • Manipulation of 1 measurement value at BLOO
  • Attack of transmission line (measurement 33)
slide-12
SLIDE 12

Specific Attack: „Stealth”

  • Manipulation of 7 measurements at 5 substations

Attack

12 György Dán http://www.ee.kth.se/~gyuri

  • Attack of transmission line (measurement 33)
slide-13
SLIDE 13

Experiment: „Stealthy” vs „Naive” Attack

  • SCADA/EMS system
  • Complete state estimator (active and reactive power)
  • Attacked data written to SCADA database

Bad data detected & removed

Target bias (MW) Estimated value (MW) # BDD Alarms

  • 14.8

50 36.2 100 86.7 150 137.5 200

Non convergent

  • Transmission line nom. rat.: 260 MVA

13 György Dán http://www.ee.kth.se/~gyuri Teixeira et al, “A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator,‘’ in Proc. of IFAC World Congress, Aug. 2011

slide-14
SLIDE 14

Protection against „Stealth” Attacks

  • Calculate the effort needed for attack
  • Increase the effort needed for attack
  • Maximize attack cost for budget 
  • Make attacks impossible
  • Protection of at least n measurements

14 György Dán http://www.ee.kth.se/~gyuri

: ( )

arg max min

M

MM k k C P 

 

 

  • Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation

in electric power grids,” in Proc. ACM CCS, 2009, pp. 21–32.

  • R. Bobba et al, “Detecting false data injection attacks on DC state estimation,” in

Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010.

  • G. Dán, H. Sandberg, “Stealth Attacks and Protection Schemes

for State Estimators in Power Systems,” in Proc. of IEEE SmartGridComm, Oct. 2010

slide-15
SLIDE 15

Protection against „Stealth” Attacks

3

1 

15 György Dán http://www.ee.kth.se/~gyuri

  • Calculate the effort needed for attack
  • Increase the effort needed for attack
  • Maximize attack cost for budget 
  • Make attacks impossible
  • Protection of at least n measurements

: ( )

arg max min

M

MM k k C P 

 

 

  • Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation

in electric power grids,” in Proc. ACM CCS, 2009, pp. 21–32.

  • R. Bobba et al, “Detecting false data injection attacks on DC state estimation,” in

Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010.

  • G. Dán, H. Sandberg, “Stealth Attacks and Protection Schemes

for State Estimators in Power Systems,” in Proc. of IEEE SmartGridComm, Oct. 2010

slide-16
SLIDE 16

Protection against „Stealth” Attacks

  • Calculate the effort needed for attack
  • Increase the effort needed for attack
  • Maximize attack cost for budget 
  • Make attacks impossible
  • Protection of at least n measurements
  • Effort?

 

1

16 György Dán http://www.ee.kth.se/~gyuri

: ( )

arg max min

M

MM k k C P 

 

 

  • Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation

in electric power grids,” in Proc. ACM CCS, 2009, pp. 21–32.

  • R. Bobba et al, “Detecting false data injection attacks on DC state estimation,” in

Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010.

  • G. Dán, H. Sandberg, “Stealth Attacks and Protection Schemes

for State Estimators in Power Systems,” in Proc. of IEEE SmartGridComm, Oct. 2010

slide-17
SLIDE 17

SCADA Attack Surface and Costs

17 György Dán http://www.ee.kth.se/~gyuri

IEC 60870-5/PSTN

  • Attack cost
  • Number of attacked

infrastructure components

  • Protection cost
  • Number of protected

infrastructure components

  • Equipment upgrades
  • Key management
  • Performance implications
  • Heterogeneous infrastructure
  • Point-to-point links (PSTN, leased line)
  • Multi-hop links (OPGW)

4 1 2 3

slide-18
SLIDE 18

SCADA Attack Surface and Costs

  • Attack cost
  • Number of attacked

infrastructure components

  • Protection cost
  • Number of protected

infrastructure components

  • Equipment upgrades
  • Key management
  • Performance implications
  • Heterogeneous infrastructure
  • Point-to-point links (PSTN, leased line)
  • Multi-hop links (OPGW)

18 György Dán http://www.ee.kth.se/~gyuri

IEC 60870-5/OPGW

4 1 2 3

slide-19
SLIDE 19

Cyber-Physical Infrastructure Model

 buses  Set of substations  Set of measurements  Communication system: undirected graph

  • Control center

 Set of established routes for substation

S s M S

  • Measurement taken at substation

M m ) (m S

c

s

1  n ) , ( E S G

i s c i s i s s R s s s s

r s r s S r r r r R     , , }, ,..., , {

) ( 2 1

  • all measurement data are sent over a single route to

, 1 | ) ( |  s R

c

s

  • all data are split equally over routes to

, 1 | ) ( |  s R | ) ( | s R

c

s

19 György Dán http://www.ee.kth.se/~gyuri

O.Vuković et al., ``Network-aware Mitigation of Data Integrity Attacks on Power System State Estimation,‘’ IEEE Journal on Selected Areas in Communications (JSAC), vol. 30, no. 6, July 2012

4 1 2 3

slide-20
SLIDE 20

Mitigation Schemes

 Bump-in-the-wire (BITW) authentication  Physical protection

  • set of substations that use BITW authentication

S E 

  • set of substations where data is susceptible to attack

) (

i s E r

 } { ) ( , s r E s

i s E

  

i s i s E

r r E s   ) ( , 

  • Guards or video surveillance
  • ,

S P  P sc 

20 György Dán http://www.ee.kth.se/~gyuri

slide-21
SLIDE 21

Illustration: IEEE 118 Bus Network

  • Topology
  • Star
  • Mesh
  • Baseline scenario
  • Single path routing
  • Shortest path

21 György Dán http://www.ee.kth.se/~gyuri

slide-22
SLIDE 22

  • minimum number of substations to be attacked in order

to perform a stealth attack against measurement

m

) ' ( ) ' ( ) ' ( ;

, ) ( ) ' ( and 1 ) ( , , s.t. min

m S i m S i m S E P S m

R r r m a m a Hc a c a          

  

  

 

 Mixed Integer Linear program for computing

Security Metrics: Measurement Attack Cost

m

m

OPGW more vulnerable

22 György Dán http://www.ee.kth.se/~gyuri

50 100 150 200 250 300 350 400 1 2 3 4 5 6 Star OPGW

Number of measurements Attack cost (m)

slide-23
SLIDE 23

Security Metrics: Substation Attack Impact

  • number of measurements that can be stealthily attacked

at substation

s

I

s

  

s

I P s

 Efficient (O(M3) ) algorithm for computing

s

I

 Comparison with (substation) betweenness centrality

  • Single shortest-path routing,

} { , 1 | |

c s

s P Ø, E s R    

 Attack impact up to 40% of measurements

23 György Dán http://www.ee.kth.se/~gyuri

slide-24
SLIDE 24

Mitigation Against Attacks

 Improve the most vulnerable part of the system  Multi-objective optimization problem

  • Minimize or maximize

s

I

S s

max

 

  • Lexicographical minimization

m

  M m

min

} | { w , lexmin

, ,

  

m R E P

m w(P,E,R)

  • Objective : minimize number of measurements with attack cost

} | { min   m m

  • Objectives are ordered, objective has priority over objective

    '

24 György Dán http://www.ee.kth.se/~gyuri

50 100 150 200 250 300 350 400 1 2 3 4 5 6 Star OPGW

slide-25
SLIDE 25

Algorithm for Mitigation

 Critical Substation First algorithm  Mitigation schemes

  • Iterative algorithm
  • In each iteration
  • Multi-path routing
  • Identify critical substations
  • For every critical substation create alternate mitigation schemes
  • Calculate assuming the alternate mitigation schemes

' m

  • Apply the mitigation scheme that improves the most

m

  • Modified single-path routing
  • Data authentication (Tamper-proof and BITW)
  • Protection

25 György Dán http://www.ee.kth.se/~gyuri

O.Vuković et al., ``Network-aware Mitigation of Data Integrity Attacks on Power System State Estimation,‘’ IEEE Journal on Selected Areas in Communications (JSAC), vol. 30, no. 6, July 2012

slide-26
SLIDE 26

Numerical Results

 Modified single-path routing – simple but efficient  40% decrease of the maximum attack impact  Increased attack cost for 50% of measurements

26 György Dán http://www.ee.kth.se/~gyuri

slide-27
SLIDE 27

Numerical Results

 Multi-path routing  Authentication

  • Decreases by 50%
  • for most measurements

s

I

S s

max

 

2  m

  • m

m

   , 1

27 György Dán http://www.ee.kth.se/~gyuri

  • Dominating set to mitigate

attacks (<< n) !!!

slide-28
SLIDE 28

Multi-area State-Estimation

  • Interconnected systems
  • No central authority
  • Distributed state estimation
  • Protect sensitive data
  • Fully distributed
  • Inter CC communication
  • ICCP over TCP/IP
  • Data integrity attack
  • Compromise CC
  • Manipulate data to disturb

estimation

  • Avoid or delay convergence

György Dán http://www.ee.kth.se/~gyuri 28 O.Vuković , G. Dán `` On the Security of Distributed Power System State Estimation under Targeted Attacks,‘’ ACM Symposium on Applied Computing, Mar. 2013

slide-29
SLIDE 29

Multi-area State-Estimation

György Dán http://www.ee.kth.se/~gyuri 29

Wide area network (WAN)

TSO3 TSO4

Wide area network

TSO2 TSO1

O.Vuković , G. Dán `` On the Security of Distributed Power System State Estimation under Targeted Attacks,‘’ ACM Symposium on Applied Computing, Mar. 2013

  • Interconnected systems
  • No central authority
  • Distributed state estimation
  • Protect sensitive data
  • Fully distributed
  • Inter CC communication
  • ICCP over TCP/IP
  • Data integrity attack
  • Compromise CC
  • Manipulate data to disturb

estimation

  • Avoid or delay convergence
slide-30
SLIDE 30

Distributed State Estimation

  • Periodic exchange of border state variables
  • Several algorithms available
  • Convergence to consistent state estimate
  • Iterative algorithm

State estimator Bad Data Detector Contingency Analysis Optimal Power Flow

z=h(x1,x2)+e

z z r ˆ   x ˆ z x ˆ , ˆ

Operator 1 x1 State estimator Bad Data Detector Contingency Analysis Optimal Power Flow

z z r ˆ   x ˆ z x ˆ , ˆ

Operator 2 x2

z=h(x1,x2)+e x12 x21

) (k

x 

György Dán http://www.ee.kth.se/~gyuri 30

slide-31
SLIDE 31

Border Bus Phase Angle Attack

  • Iteration under attack
  • Attacker chooses δa,2 to maximize
  • Under constraint on ||δa,2||
  • First singular vector attack (model/state-aware)
  • δa=u1 (First singular vector of A)
  • Attacker needs information
  • H matrix and system state
  • Power flow measurements – direction ()

CC1 CC2

x1,b + δa,1

a k b T k k T k k k

H W H H W H x x 

) ( 1 ) ( 1 ) ( 1 ) ( ) ( ) (

] [ ~

  

   

x2,b x1,b x2,b + δa,2

A

|| ~ ||

) (k

x 

) (k

x 

1

Au

1

Au 

) (

~ k x 

) ( ) ( ) ( ) ( ) 1 (

~

k k k k k

x x x x x      

György Dán http://www.ee.kth.se/~gyuri 31

slide-32
SLIDE 32

Attack Impact: Convergence Time

György Dán http://www.ee.kth.se/~gyuri 32

  • IEEE 118 bus system 6 regions
  • Attacker compromises Area 1
  • Attack strategies
  • MUV: Maximum update every iteration
  • FSV: First singular vector
  • UR: Uniform rotation
  • Attack strategy crucial
  • Field measurement data

important for powerful attack (FSV+MEAS)

slide-33
SLIDE 33

Attack Impact: Convergence Time

György Dán http://www.ee.kth.se/~gyuri 33

Region 1

B 4 = {b49-b67} B 6 = {b68, b69, b78-b81, b97-b101, b103-b112, b116} B 1 = {b1-b17, b30, b117} T 1,2

|| ||= 3

B 2= {b21-b29, b31, b32, b70-b73, b113-b115} T 2,5 = 2 B 5 = {b74-b77, b82-b96, b102, b118} T 5,6 = 10 T 1,3 = 4 B 3 = {b18-b20, b33-b48} T 3,4 = 6 T 3,6 = 1 T 4,6 = 2

|| || || || || || || || || || || ||

Region 2 Region 3 Region 4 Region 5 Region 6

T 2,3 = 1

|| ||

T 2,6 = 1

|| ||

  • Attack strategy crucial
  • Field measurement data

important for powerful attack (FSV+MEAS)

  • IEEE 118 bus system 6 regions
  • Attacker compromises Area 1
  • Attack strategies
  • MUV: Maximum update every iteration
  • FSV: First singular vector
  • UR: Uniform rotation
slide-34
SLIDE 34

Attack Impact: Estimation Error

György Dán http://www.ee.kth.se/~gyuri 34

Region 1

B 4 = {b49-b67} B 6 = {b68, b69, b78-b81, b97-b101, b103-b112, b116} B 1 = {b1-b17, b30, b117} T 1,2

|| ||= 3

B 2= {b21-b29, b31, b32, b70-b73, b113-b115} T 2,5 = 2 B 5 = {b74-b77, b82-b96, b102, b118} T 5,6 = 10 T 1,3 = 4 B 3 = {b18-b20, b33-b48} T 3,4 = 6 T 3,6 = 1 T 4,6 = 2

|| || || || || || || || || || || ||

Region 2 Region 3 Region 4 Region 5 Region 6

T 2,3 = 1

|| ||

T 2,6 = 1

|| ||

  • Up to 30% estimation

error on most loaded transmission lines

  • IEEE 118 bus system 6 regions
  • Attacker compromises Area 1
  • Attack strategies
  • MUV: Maximum update every iteration
  • FSV: First singular vector
  • UR: Uniform rotation
slide-35
SLIDE 35

Attack Detection

  • Expected behavior of non-expansive mapping
  • For large k and k’<k
  • Example: No attack

György Dán http://www.ee.kth.se/~gyuri 35   

   || || || ||

) ( ) ' ( ) ( ) 1 ' ( k k k k

x x x x

slide-36
SLIDE 36

Attack Detection

  • Expected behavior of non-expansive mapping
  • For large k and k’<k
  • Example: FSV attack no convergence

György Dán http://www.ee.kth.se/~gyuri 36   

   || || || ||

) ( ) ' ( ) ( ) 1 ' ( k k k k

x x x x

slide-37
SLIDE 37

Summary

  • SCADA/EMS state estimator BDD can be fooled
  • Based on linear approximation
  • Potentially in reality too
  • Cyber-attack vulnerability and cost model
  • Communication topology matters
  • Algorithm for cost-effective mitigation
  • Distributed state estimator vulnerable
  • Confidentiality for measurement data important
  • Detection possible
  • Localization and mitigation?

37 György Dán http://www.ee.kth.se/~gyuri

slide-38
SLIDE 38

References

  • G. Dán, H. Sandberg, „Stealth Attacks and Protection Schemes for State Estimators

in Power Systems ”, in Proc. of IEEE SmartGridComm, Oct. 2010

  • A. Teixeira, G. Dán, H. Sandberg, K.H. Johansson, “A Cyber Security Study of a

SCADA Energy Management System: Stealthy Deception Attacks

  • n

the State Estimator”, in Proc. of IFAC World Congress, Aug. 2011

  • O. Vuković, K.C. Sou, G. Dán, H. Sandberg, “Network-layer Protection Schemes

against Stealth Attacks on State Estimators in Power Systems”, in Proc. of IEEE SmartGridComm, Oct. 2011

  • G. Dán, K.C. Sou, H. Sandberg, ”Power System State Estimation Security: Attacks

and Protection Schemes”, in Smart Grid Communications and Networking (eds. Poor, Hossain, Han), Cambridge University Press, 2012.

  • André Teixeira, Henrik Sandberg, György Dán and Karl-Henrik Johansson, “Optimal

Power Flow: Closing the Loop over Corrupted Data,‘’ in Proc. of American Control Conference (ACC), Jun. 2012

  • O. Vuković, K.C. Sou, G. Dán, H. Sandberg, “Network-layer Protection Schemes

against Stealth Attacks on State Estimators in Power Systems”, IEEE Journal on Selected Areas in Communications (JSAC), Jul. 2012

  • György Dán, Henrik Sandberg, Gunnar Björkman, Mathias Ekstedt, ”Challenges in

Power System Information Security,’’ IEEE Security & Privacy Magazine, vol. 10, no. 4, Jul.-Aug. 2012

  • O. Vuković, G. Dán, “On the Security of Distributed Power System State Estimation

under Targeted Attacks,” in Proc. of ACM Symposium on Applied Computing (SAC),

  • Mar. 2013

38 György Dán http://www.ee.kth.se/~gyuri

slide-39
SLIDE 39

Cyber-physical Models of Power System State Estimation Security

György Dán

School of Electrical Engineering KTH, Royal Institute of Technology Stockholm, Sweden

Joint work with: Ognjen Vuković, Henrik Sandberg, Kin Cheong Sou, André Teixeira, Karl-Henrik Johansson, Gunnar Karlsson

TCIPG Seminar Series 7 December 2012