Abstract
As the ongoing energy transition requires more communication infrastructure in the electricity grid, this intro-duces new possible attack vectors. Current intrusion detection approaches for cyber attacks often neglect the underlying phys-ical environment, which makes it especially hard to detect data injection attacks. We follow a process-aware approach to eval-uate the communicated measurement data within the electricity system in a context-sensitive way and to detect manipulations in the communication layer of the SCADA architecture. This paper proposes a sophisticated tool for intrusion detection, which integrates power flow analysis in real-time and can be applied locally at field stations mainly at the intersection between the medium and low voltage grid. Applicability is illustrated using a simulation testbed with a typical three-node architecture and six different (attack) scenarios. Results show that the sensitivity parameter of the proposed tool can be tuned in advance such that attacks can be detected reliably.
Original language | English |
---|---|
Title of host publication | 2023 IEEE Belgrade PowerTech |
Publisher | IEEE |
Number of pages | 9 |
ISBN (Electronic) | 978-1-6654-8778-8 |
ISBN (Print) | 978-1-6654-8779-5 |
DOIs | |
Publication status | Published - 9 Aug 2023 |
Event | 15th IEEE Belgrade PowerTech 2023 - Belgrade, Serbia Duration: 25 Jun 2023 → 29 Jun 2023 Conference number: 15 |
Conference
Conference | 15th IEEE Belgrade PowerTech 2023 |
---|---|
Country/Territory | Serbia |
City | Belgrade |
Period | 25/06/23 → 29/06/23 |
Keywords
- Low voltage
- Sensitivity
- Current measurement
- Intrusion detection
- Real-time systems
- Smart grids
- Reliability
- 2023 OA procedure