Title | Cyber Attacks on Power System Automation and Protection and Impact Analysis |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Rajkumar, Vetrivel Subramaniam, Tealane, Marko, \c Stefanov, Alexandru, Presekal, Alfan, Palensky, Peter |
Conference Name | 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) |
Keywords | blackout, Cascading Failures, composability, Cyber Attacks, cyber security, cyberattack, IEC 61850, IEC standards, Metrics, power grid vulnerability, power grid vulnerability analysis, Power system protection, pubcrawl, Real-time Systems, Resiliency, Smart grids, Standards, substation automation |
Abstract | Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital substations. However, IEC 61850 is not cyber secure. In this paper, we demonstrate the dangerous implications of not securing IEC 61850 standard. Cyber attacks may exploit the vulnerabilities of the Sampled Values (SV) and Generic Object-Oriented Substation Event (GOOSE) protocols of IEC 61850. The cyber attacks may be realised by injecting spoofed SV and GOOSE data frames into the substation communication network at the bay level. We demonstrate that such cyber attacks may lead to obstruction or tripping of multiple protective relays. Coordinated cyber attacks against the protection system in digital substations may cause generation and line disconnections, triggering cascading failures in the power grid. This may eventually result in a partial or complete blackout. The attack model, impact on system dynamics and cascading failures are veri ed experimentally through a proposed cyber-physical experimental framework that closely resembles real-world conditions within a digital substation, including Intelligent Electronic Devices (IEDs) and protection schemes. It is implemented through Hardware-in-the-Loop (HIL) simulations of commercial relays with a Real-Time Digital Simulator (RTDS). |
DOI | 10.1109/ISGT-Europe47291.2020.9248840 |
Citation Key | rajkumar_cyber_2020 |