A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation

Shahbaz Hussain, Atif Iqbal, Stefano Zanero, S. M. Suhail Hussain, Abdullatif Shikfa, Enrico Ragaini, Rashid Alammari, Irfan Khan*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

The traditional power systems are rapidly digitalized and automated for increased monitoring and control. This automation of power system communication has made it possible to monitor and control operations remotely in a plant. However, this also opens up an exploitation vector for attackers, after they gain access to the substation network. This scenario can only be investigated through an in-depth study of communication protocols and control authority concepts associated with power system. IEC 61850 has emerged as the most popular protocol for power system communication. In this paper, we investigate realtime simulation of power systems with IEC 61850 based communication, in order to devise a testbed that can be used to validate false data injection cyberattacks and evaluate their impact. Based on the results, we discuss possible countermeasures to such attacks and outline future research directions.

Original languageEnglish
Title of host publication2021 IEEE Texas Power and Energy Conference, TPEC 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728186122
DOIs
StatePublished - 2 Feb 2021
Externally publishedYes

Publication series

Name2021 IEEE Texas Power and Energy Conference, TPEC 2021

Bibliographical note

Publisher Copyright:
© 2021 IEEE.

Keywords

  • IEC 61850
  • communication protocols
  • control authority
  • countermeasures
  • cyberattacks
  • false data injection
  • real time digital simulation

ASJC Scopus subject areas

  • Renewable Energy, Sustainability and the Environment
  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering
  • Control and Optimization

Fingerprint

Dive into the research topics of 'A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation'. Together they form a unique fingerprint.

Cite this