INSE 6640: Smart Grids and Control System Security: Lecture 10 - Cyber-Attacks Against State Estimation in Smart Grid
INSE 6640: Smart Grids and Control System Security: Lecture 10 - Cyber-Attacks Against State Estimation in Smart Grid
Security
Fall 2020
Fall 2020 1 / 55
Outline
Fall 2020 2 / 55
Securing Smart Grids: Goal and Threats
Fall 2020 3 / 55
Securing CPS (1/2)
Fall 2020 4 / 55
Securing CPS (2/2)
Fall 2020 6 / 55
Traditional IT Security & CPS (1/4)
1
*M. Bishop, Computer Security, Art and Science, Addison-Wesley, 2013
Fall 2020 7 / 55
Traditional IT Security & CPS (2/4)
• Confidentiality refers to the ability to keep information secret
from unauthorized users. A lack of confidentiality results in
disclosure of information.
• Confidentiality in CPS must prevent an adversary from inferring
information/data related to the physical/controller system (Plant
Model/ Controller algorithm) by eavesdropping on the
communication channels between the sensors and the controller,
and between the controller and the actuator.
Fall 2020 8 / 55
Traditional IT Security & CPS (3/4)
Fall 2020 9 / 55
Traditional IT Security & CPS (4/4)
• Availability refers to the ability of a system/data of being
accessible and usable upon demand. Lack of availability results in
denial of service (DoS).
• Availability in CPS is therefore the capability of maintaining the
operational goals by preventing or surviving DoS attacks to the
information transmitted by the sensors and controller
• The strong real-time requirement of many CPS introduces new
challenges.
• A minor DoS event for an enterprise networks might be a major
event for CPS, i.e. producing irreparable damages to the system
and entities around it
Fall 2020 10 / 55
Defender Model
Fall 2020 11 / 55
Defender Model: Controller+Detector
• The defender is represented by the Controller module (Controller
Logic + State Estimator) plus an anomaly Detector module2 ;
• Separation of roles:
• The Detector implements an anomaly detection algorithm (policy)
to understand if a cyber attacks is affecting the communication
channels
• The Controller implement a logic capable of ensuring that the plant
can meet the operational goals (stability, tracking of a reference,
etc)
2
this is the basic setup, other architectures can be considered
Fall 2020 12 / 55
Available Information in a Feedback Control System
Fall 2020 13 / 55
Adversary Models
Fall 2020 14 / 55
Attacker’s Objective
• The attacker goal is to steer the plant state within the region or
unacceptable performance/danger.
• The attacker wants to remain undetected (stealthy)
Fall 2020 15 / 55
Attacker’s available information
The hat symbol ˆ· denotes that the attacker might have a complete or
partial understanding of the sets P, F, D
Fall 2020 16 / 55
Attacker Policy
Fall 2020 17 / 55
3D Modeling of Attacks in Networked CPS
Fall 2020 18 / 55
Attack Space: 3D modeling (1/3)
Fall 2020 19 / 55
Attack Space: 3D modeling (2/3)
Fall 2020 20 / 55
Attack Space: 3D modeling (3/3)
Fall 2020 21 / 55
Stealthy Attacks in CPS
Fall 2020 22 / 55
Examples of Attacks against CPS
Fall 2020 23 / 55
Denial-of-Service Attack (DoS)
Attack policy ak
• Prevent the actuator and/or sensor data from reaching their
respective destinations and producing an absence of data.
3D Modeling
• Model knowledge: ?
• Disclosure Resources: ?
• Disruption Resources: ?
Fall 2020 24 / 55
Denial-of-Service Attack (DoS)
Attack policy ak
• Prevent the actuator and/or sensor data from reaching their
respective destinations and producing an absence of data.
3D Modeling
• Model knowledge: No needed
• Disclosure Resources: Not Needed
• Disruption Resources: Needed on the channel where the DoS
attack is performed
Fall 2020 25 / 55
Denial-of-Service Attack (DoS) - Performance
Attack Performance
• Trivially not a stealthy attack. However, DoS attacks may be
misdiagnosed as a poor network condition.
• A DoS attack impact the closed-loop system by affecting the
estimator task and ultimately the control system performance.
Fall 2020 26 / 55
Replay Attack on the Sensor Measurements
PHASE 1 PHASE 2
Attack policy
• Phase I: Eavesdropping (Recording)
ak = 0
0 0 uk
lk = lk−1 ∪
0 Υy yk
PHASE 1 PHASE 2
3D Modeling
• Model knowledge: ?
• Disclosure Resources:?
• Disruption Resources: ?
Fall 2020 28 / 55
Replay Attack on the Sensor Measurements
PHASE 1 PHASE 2
3D Modeling
• Model knowledge: No needed
• Disclosure Resources: On the measurement channel
• Disruption Resources: Needed on both channels
Fall 2020 29 / 55
Replay Attack - Performance
M
I
6 6
Attack Performance
• It is usually employed in steady-state conditions otherwise it is
easy to detect
• If the attacker has access to all channels, a replay attack can be
stealthy. Advanced active detection strategies are needed to
prevent stealthiness (next class, we will study the watermarking
solution in [Mo, 2009])
Fall 2020 30 / 55
Covert Attack
Covert Attack
Attack policy
Design an FDI attack on both communication channels such that the
effect of the attack on the input signal is canceled in the measurement
channel.
Fall 2020 31 / 55
Covert Attack - Example
Covert Attack
Covert Attack
3D Modeling
• Model knowledge: Complete knowledge of P
• Disclosure Resources:
• If the plant has a linear behavior: no disclosure resources are
needed
• If the plant has a nonlinear behavior, then disclosure resources on
the actuation channel are needed
• Disruption Resources: Needed on both channels
Fall 2020 33 / 55
Covert Attack - Performance
Covert Attack
Attack Performance
• A covert attack is a perfect stealthy attack that cannot be detected
by any detector located in the control center [Smith, 2011].
• Specific detection mechanisms have been developed to detect
such attacks. Next class, we will see the Moving Target idea
developed in [Weerakkody, 2015].
Fall 2020 34 / 55
Attack Overview in the 3D Attack Space
Fall 2020 35 / 55
Stealthy Attack Against State Estimation in Smart Grid
Fall 2020 36 / 55
Smart Grid: Power Transmission System
Fall 2020 37 / 55
Power System State
• According to the state of the system, the Smart Grid can be in one
of the following situations:
1 Normal
2 Emergency
3 Restorative
• Normal: all the loads in the system can be supplied power by the
existing generators without violating any operating constraints
• Emergency: violation of some of the operating constraints while
the power system continues to supply power to all the loads.We
must bring the system back to normal using corrective actions!
• Restorative: Correction actions are being applied to
stabilize/eliminate limit violations, e.g. disconnecting loads,
disconnecting lines, energy re-balance
Fall 2020 38 / 55
The Scenario: Power Transmission System and
Networked Control
• Let us denote with x the state of the system and with y the
available measurements, i.e.
x = [x1 , x2 , . . . , xn ]T , y = [y1 , y2 , . . . , ym ]T , n, m ∈ Z + , xi , yi ∈ R
• The linearized static power flow equation (Plant Model) has the
following structure
y = Cx + e
y = Cx + e
• Estimation Problem: How can we find the best fit x for a given y?
• We have to solve a system with n unknown and m equations,
where n 6= m
Fall 2020 42 / 55
Bad Data Detector (1/3)
Model: y = Cx + e
Least square state estimation:
x̂ = (C T C)−1 C T y
Fall 2020 44 / 55
Bad Data Detector (3/3)
• Now the question is: If we can detect faulty sensors, can we also
detect cyber attacks producing False Data Injection?
Fall 2020 45 / 55
Bad Data Detector (3/3)
• Now the question is: If we can detect faulty sensors, can we also
detect cyber-attacks producing False Data Injections?
• Before 2011, the answer was believed to be yes. But after
[Liu, 2011] the answer is not always!!!
Fall 2020 46 / 55
Design of a Stealthy Attack against State Estimation
Fall 2020 47 / 55
Attacker Model
ya = y + a
Fall 2020 49 / 55
Attack Impact on the State Estimation (1/2)
Fall 2020 50 / 55
Attack Impact on the State Estimation (2/2)
Fall 2020 51 / 55
Stealthy False Data Injection
Steps:
1 The attacker decides the bias d to cause on the state estimation,
i.e.
x̂bad = x̂ + d
2 The attacker computes and injects the following vector into the
measurements
a = Cd
ya = y + a
The attack above bypasses the bad data detector, i.e.
||y − C x̂|| ≤ τ
while changing the result of state estimation. Therefore this attack is,
by definition, stealthy
Fall 2020 52 / 55
Thank you!
Fall 2020 53 / 55
References I
D. Kundur
Cyber Security of Smart Grid
Class: Cyber-Physical Security of the Smart Grid
H. Tebianian, B. Jeyasurya
Dynamic state estimation in power systems: Modeling, and challenges
Electric Power Systems Research, 2015.
Fall 2020 54 / 55
References II
S. R. Smith
A decoupled feedback structure for covertly appropriating networked control
systems
IFAC Proceedings, 44.1, 90–95, 2011.
Y. Mo, B. Sinopoli
Secure control against replay attacks
IEEE Allerton Conference, pp. 911–918, 2009.
Fall 2020 55 / 55