Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

Published: 21 August 2018 Publication History

Abstract

Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this article, we study False Data Injection (FDI) attacks against railway Traction Power Systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements—which we call efficiency attack and safety attack—that (i) maximize the system’s total power consumption and (ii) mislead trains’ local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a Global Attack Detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect FDI attacks on trains’ voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false-positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false-positive rate.

References

[1]
OSIRIS. 2015. Osiris 8 urban rail - Comprehensive approach to making the save. Mobility - The European Collective Transport Magazine. Retrieved from http://bit.ly/2pryv7E.
[2]
Piers Connor. 2016. Electric traction power supplies. Railway Technical Web Pages. Retrieved from http://www.railway-technical.com/etracp.shtml.
[3]
L. Abrahamsson. 2012. Optimal Railroad Power Supply System Operation and Design. PhD Thesis, KTH Sweden.
[4]
S. Acikbas and M. T. Soylemez. 2007. Parameters affecting braking energy recuperation rate in DC rail transit. In Proceedings of the ASME/IEEE Joint Rail Conference 8 Internal Combustion Engine Division Spring Technical Conference.
[5]
Alstom. 2001. ERTMS/ETCS on-board ALSTOM solution. Retrieved from https://bit.ly/1OOb38f.
[6]
S. Amin, X. Litrico, S. Sastry, and A. M. Bayen. 2013. Cyber security of water scada systems part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control System Technologies 21, 5 (Sept. 2013), 1963--1970.
[7]
P. Arboleya, G. Diaz, and M. Coto. 2012. Unified AC/DC power flow for traction systems: A new concept. IEEE Transactions on Vehicle Technologies 61, 6 (July 2012), 2421--2430.
[8]
P. Arboleya, B. Mohamed, C. Gonzlez-Morn, and I. El-Sayed. 2016. BFS algorithm for voltage-constrained meshed DC traction networks with nonsmooth voltage-dependent loads and generators. IEEE Transactions on Power Systems 31 (2016), 1526--1536.
[9]
Y. Cai, M. R. Irving, and S. H. Case. 1995. Iterative techniques for the solution of complex DC-rail-traction systems including regenerative braking. IEEE Proceedings on Generation, Transmission and Distribution 142, 5 (1995), 445--452.
[10]
A. A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry. 2011. Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the ACM AsiaCCS.
[11]
K. G. David. 2015. The train that powers its station. (2015). http://bbc.in/1KRROZK.
[12]
S. S. S. R. Depuru, L. Wang, and V. Devabhaktuni. 2011. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft. Energy Policy 39, 2 (Feb. 2011), 1007--1015.
[13]
R. G. Fletcher. 1991. Regenerative equipment for railway rolling stock. Power Engineering Journal 5, 3 (May 1991), 105--114.
[14]
T. F. Gabrielle. 2014. Deadly derailment in Moscow metro. Retrieved from http://bit.ly/2d5D7dy.
[15]
A. Gonzlez-Gil, R. Palacin, P. Batty, and J. P. Powell. 2014. A systems approach to reduce urban rail energy consumption. Energy Conversion and Management 80 (2014), 509--524.
[16]
K. Hartwig, M. Grimm, M. Meyer zu Hörste, and K. Lemmer. 2006. Requirements for safety relevant positioning applications in rail traffic - A demonstrator for a train borne navigation platform called “DemoOrt.” Retrieved from http://elib.dlr.de/21252/1/wcrr.pdf.
[17]
K. Jinsub and T. Lang. 2013. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE J. Sel. Areas Commun. 31, 7 (July 2013), 1294--1305.
[18]
S. Karnouskos. 2011. Stuxnet worm impact on industrial cyber-physical system security. In Proceedings of the Conference of the IEEE Industrial Electronics Society.
[19]
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor. 2010. Trustworthy hardware: Identifying and classifying hardware trojans. Computer 43, 10 (Oct 2010), 39--46.
[20]
D. F. Kune, J. Backes, S. S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu. 2013. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the IEEE Symposium on Security and Privacy.
[21]
Y. Liu, P. Ning, and M. K. Reiter. 2009. False data injection attacks against state estimation in electric power grids. In ACM CCS.
[22]
P. McDaniel and S. McLaughlin. 2009. Security and privacy challenges in the smart grid. IEEE Security Privacy 7, 3 (2009), 75--77.
[23]
D. Mike. 2009. Recoverable advanced metering infrastructure. In Proceedings of the Black Hat Technical Security Conference.
[24]
M. Miyatake and H. Ko. 2010. Optimization of train speed profile for minimum energy consumption. IEEE Transactions on Electrical and Electronic Engineering 5, 3 (2010), 263--269.
[25]
Y. Okada, T. Koseki, and K. Hisatomi. 2004. Power management control in DC-electrified railways for the regenerative braking systems of electric trains. Advances in Transport 15 (2004), 919--929.
[26]
C. L. Pires, S. I. Nabeta, and J. R. Cardoso. 2007. ICCG method applied to solve DC traction load flow including earthing models. IET Electric Power Applications 1, 2 (March 2007), 193--198.
[27]
A. U. Raghunathan, T. Wada, K. Ueda, and S. Takahashi. 2014. Minimizing energy consumption in railways by voltage control on substations. In Proceedings of the International Conference on Railway Engineering Design and Optimization.
[28]
M. A. Rahman, E. Al-Shaer, and R. G. Kavasseri. 2014. A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids. In Proceedings of the ACM/IEEE ICCPS.
[29]
Homeland Security. 2011. U.S. DHS. insider threat to utilities. Retrieved from https://bit.ly/1YPFoZH.
[30]
S. Shuai, T. Tao, and C. Roberts. 2015. A cooperative train control model for energy saving. IEEE Transactions on Intelligent Transportation Systems 16, 2 (April 2015), 622--631.
[31]
S. Shuai, T. Tao, L. Xiang, and G. Ziyou. 2014. Optimization of multitrain operations in a subway system. IEEE Transactions on Intelligent Transportation Systems 15, 2 (April 2014), 673--684.
[32]
Mors Smitt. 2016. Traction energy measuring solutions. Retrieved from http://bit.ly/2q5OUuZ.
[33]
SMRT. 2015. Press Release. Retrieved from https://bit.ly/1RxGBSk.
[34]
F. Sottile. 2011. Real Solutions to Equations from Geometry. Vol. 57. American Mathematical Society Providence, RI.
[35]
Symantec. 2014. Dragonfly: Cyberespionage attacks against energy suppliers. Retrieved from http://symc.ly/2cowemc.
[36]
S. N. Talukdar and R. L. Koo. 1977. The analysis of electrified ground transportation networks. IEEE Transactions on Power Applied Systems 96, 1 (1977).
[37]
A. Teixeira, H. Sandberg, G. Dan, and K. H. Johansson. 2012. Optimal power flow: Closing the loop over corrupted data. In Proceedings of the ACC.
[38]
The Economic Times -- Railways. 2012. Indian railways to launch real-time train tracking via Google maps. Retrieved from https://bit.ly/1OIcMOe.
[39]
Transport for London. 2008. LU carbon footprint report 2008. Retrieved from http://bit.ly/2pgb8xb.
[40]
A. J. Wood and B. F. Wollenberg. 1996. Power Generation, Operation, and Control. A Wiley-Interscience.
[41]
Anil Yadav. 2013. Traction choices: Overhead ac vs third rail dc. Retrieved fro, http://bit.ly/2orprPW.
[42]
Y. Yanling, L. Zuyi, and R. Kui. 2011. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid 2, 2 (2011), 382--390.

Cited By

View all
  • (2023)Detection of Cyber Attacks on Railway Autotransformer Traction Power SystemsIEEE Transactions on Industry Applications10.1109/TIA.2023.330749659:6(7188-7200)Online publication date: Nov-2023
  • (2023)Cyber Threat Assessment in Monitoring Turnout Railway Systems2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA54631.2023.10275401(1-8)Online publication date: 12-Sep-2023
  • (2022)Cyber security of railway cyber-physical system (CPS) – A risk management methodologyCommunications in Transportation Research10.1016/j.commtr.2022.1000782(100078)Online publication date: Dec-2022
  • Show More Cited By

Index Terms

  1. Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Cyber-Physical Systems
      ACM Transactions on Cyber-Physical Systems  Volume 2, Issue 4
      Special Issue on Medical CPS Papers
      October 2018
      313 pages
      ISSN:2378-962X
      EISSN:2378-9638
      DOI:10.1145/3236466
      • Editor:
      • Tei-Wei Kuo
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 21 August 2018
      Accepted: 01 September 2017
      Revised: 01 May 2017
      Received: 01 October 2016
      Published in TCPS Volume 2, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Railway traction power systems
      2. efficiency and safety
      3. false data injection attacks
      4. global attack detection

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • National Cybersecurity R8D Directorate
      • National Research Foundation (NRF)
      • NSFC
      • Prime Minister's Office, Singapore
      • Start-up Grant at NTU
      • National Cybersecurity R8D Programme

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)17
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 11 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Detection of Cyber Attacks on Railway Autotransformer Traction Power SystemsIEEE Transactions on Industry Applications10.1109/TIA.2023.330749659:6(7188-7200)Online publication date: Nov-2023
      • (2023)Cyber Threat Assessment in Monitoring Turnout Railway Systems2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA54631.2023.10275401(1-8)Online publication date: 12-Sep-2023
      • (2022)Cyber security of railway cyber-physical system (CPS) – A risk management methodologyCommunications in Transportation Research10.1016/j.commtr.2022.1000782(100078)Online publication date: Dec-2022
      • (2021)Detection of Cyber Attacks on Railway Autotransformer Traction Power Systems2021 IEEE 2nd International Conference on Smart Technologies for Power, Energy and Control (STPEC)10.1109/STPEC52385.2021.9718653(1-6)Online publication date: 19-Dec-2021
      • (2020)Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature ReviewSmart Cities10.3390/smartcities30300463:3(894-927)Online publication date: 13-Aug-2020
      • (2020)On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power GridACM Transactions on Cyber-Physical Systems10.1145/33727514:3(1-29)Online publication date: 12-Mar-2020

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media