Next Article in Journal
A Medium-Scale 50 MWfuel Biomass Gasification Based Bio-SNG Plant: A Developed Gas Cleaning Process
Next Article in Special Issue
Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources
Previous Article in Journal
Environmentally Sustainable Biogas? The Key Role of Manure Co-Digestion with Energy Crops
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

1
College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China
2
School of Electrical Engineering and Computer Science, the University of Newcastle, Newcastle, NSW 2308, Australia
3
Department of Electrical and Electronic Engineering, Institut Teknologi Brunei, Bandar Seri Begawan BE1410, Brunei
*
Author to whom correspondence should be addressed.
Energies 2015, 8(6), 5266-5286; https://doi.org/10.3390/en8065266
Submission received: 19 March 2015 / Revised: 18 May 2015 / Accepted: 25 May 2015 / Published: 3 June 2015
(This article belongs to the Special Issue Smart Metering)

Abstract

:
The distribution automation system (DAS) is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS). The results demonstrate the reasonability and effectiveness of the proposed methodology.

1. Introduction

The seamless merging of traditional power systems with cutting-edge information technologies has become an inevitable trend in smart grids [1,2]. In a power distribution system, with the help of advanced information technologies and intelligent feeder remote terminal units (FRTU), a distribution automation system (DAS) is able to provide higher reliability, greater efficiency and intensive interactions with consumers [3].
Nonetheless, the adoption of common communication protocols and deployment of various intelligent electronic devices (IED) introduces more vulnerabilities which can be used by cyber attackers [4]. Moreover, the tighter integration of cyber systems and physical power systems can easily lead to cyber-attacks that can degrade control performance or even cause power outages in a smart grid [5,6]. Thus, knowing how to deal with the cyber security issues of smart grids has become a new challenge. Some basic guidelines for cyber security have been published [7,8] and some studies on the cyber security of power control systems have been carried out in the past few years [9,10,11,12,13,14]. The existence of exploitable vulnerabilities is the precondition for cyber-attacks.
However, most of the existing cyber security studies focus on the control systems in power plants or substations. In these studies, the intelligent terminal devices are usually located in restricted areas. On the contrary, the terminal devices in a DAS are usually located at remote areas with limited physical protection, e.g., FRTUs [15]. These terminal devices act as widespread real-time monitors and intelligent controllers in a distribution system, and can exchange measurement data and control commands with the DAS control center server through communication network in normal operations. As for cyber-attacks, an attacker can penetrate FRTUs or other terminal devices via the modems between them and the communication network. On account of the limited computational capacity, most of the effective security measures found in computer networks cannot be used directly in the terminal devices [16]. Moreover, the intelligent terminal devices in a DAS will support more open and standardized communication protocols such as IEC 61850 in the near future [17]. For these reasons, the DAS is more vulnerable to cyber-attacks and therefore the security issues in a DAS should be properly addressed.
It is worth noting that ensuring the complete security of every single device in the DAS is hardly possible from the point of view of the cost of implementing the security measures [18]. Thus, an assessment framework for vulnerability ranking in a DAS is urgently required. The common vulnerability scoring system (CVSS) provides an open framework for vulnerability assessment [19]. It evaluates the impacts of vulnerabilities in computer networks from three aspects: base, temporal and environmental. However, the CVSS scores each vulnerability independently. It cannot analyze the impacts of cyber- attacks on physical systems, and does not take the interactions among different vulnerabilities into consideration. Ten [11] proposed an assessment framework to evaluate the vulnerability of supervisory control and data acquisition (SCADA) systems. Zonous [13] presented a unified formalism to model cyber-physical systems and proposed a vulnerability ranking method according to the potential physical consequences as well as attack complexity. However, these researches mainly focus on the cyber-attacks against power transmission systems and the interaction between attackers and defenders has not been analysed.
This paper focuses on the vulnerability assessment issue in a DAS. The purposes are to study the potential physical consequences of cyber-attacks on a DAS and to help system operators rank the vulnerabilities so as to more effectively enhance the cyber security of a DAS. The main contribution of this paper is proposing an original vulnerability assessment model to rank the vulnerabilities in a DAS based on potential consequences of cyber-attacks and the relationship among different vulnerabilities. Specifically, the potential physical consequences of cyber-attacks are discussed from two aspects: terminal devices and control center servers. The attack processes are modeled as a series of attack-defense games (ADGs) and relationships among different vulnerabilities are analyzed by introducing vulnerability adjacency matrix.
The rest of this paper is organized as follows: Section 2 presents the overall process of vulnerability assessment. Section 3 analyzes the physical consequences of cyber-attacks. Section 4 and Section 5 build the game model and introduce the vulnerability adjacency matrix to analyze the relationship among vulnerabilities, respectively. A case study based on bus 2 of the Roy Billinton Test System (RBTS) is used to illustrate how to apply the proposed method in Section 6. Finally, some conclusions are given in Section 7.

2. Outline of Methodology

The assessment methodology can be divided into three parts: physical consequences analysis, attack processes modeling and vulnerability adjacency matrix formation.

2.1. Physical Consequences

Potential consequences of cyber-attacks include revealing utilities’ and consumers’ private information, economic losses, and loss of load [18]. This paper mainly focuses on the control performance of the DAS, so the physical consequences are assessed by the quantity of loss of load and its duration.
A successful cyber-attack will result in a violation of all or part of the security properties (the integrity, availability, and confidentiality) [20]. Loss of different security properties leads to different physical consequences. Loss of integrity renders attackers the ability to change the control commands or measurement data. For instance, an attacker can send modified control commands to trip the switches in a distribution system, or send incorrect measurement data to misguide the decision-making of control strategies, both of which will result in unnecessary loss of load. Loss of availability renders the operators unable to collect measurement data or control the terminal devices, but it would not lead to severe physical consequences directly and immediately [21]. For example, a denial of service (DoS) attack on a relay protection IED will not affect the normal operation of a distribution system until a fault occurs. Confidentiality is usually the main concern in terms of personal privacy [22] and the leakage of system settings can ultimately lead to integrity or availability attacks [23]. However, compared with integrity and availability, loss of confidentiality will not affect the control performance of the DAS directly in most cases [15]. Thus, the physical consequences of cyber-attacks on confidentiality are not the research emphasis of this paper.
A DAS consists of a control center, terminal devices and a communication network. The communication architecture of a DAS is depicted in Figure 1. Except for the remote monitoring and control under normal operations, the fault detection, isolation and restoration are the most important functions in a DAS which can enhance the reliability of a distribution system. There are primarily two restoration schemes in distribution systems [24,25], both of which will be discussed in Section 3.
Figure 1. DAS communication architecture.
Figure 1. DAS communication architecture.
Energies 08 05266 g001

2.2. Attack Process

In order to launch a successful attack, the attackers have to first look for exploitable access points, and then hack other vulnerabilities in the network based on the entry at the access point.

2.2.1. Selecting Access Point

In a DAS, potential access points include the servers in a control center as well as the intelligent terminal devices located in remote areas. The terminal devices are usually deployed in remote areas with little physical protection and many of them do not even require a password for authentication [18], while the servers are typically isolated within an electronic security perimeter [12], so it is usually easier to get access to the vulnerabilities in terminal devices than those in control center servers. On the other hand, the exploitation of the vulnerabilities in the servers usually results in severer physical consequences. Thus, the possibility of selecting different vulnerabilities to be access point varies.

2.2.2. Hacking Other Vulnerabilities

The second stage of an attack can be modeled as a series of two-person ADGs. The attacker intends to cause the severest physical consequences, while the defender (i.e., the system operators) aims at minimizing this loss. Thus, the game discussed in this paper is basically a non-cooperative ADG. In the ADGs, payoffs for the attacker and the defender are the uppermost elements which are related to the potential physical consequences, vulnerability information and the topology of the distribution system. The Nash equilibrium of the game indicates the attack’s attack intention and the optimal defense strategy. The specific analysis method will be presented comprehensively in Section 4.
The overall process of the quantitative vulnerability assessment for a DAS is shown as Figure 2. The vulnerability adjacency matrix is used to analyze the relationship among different vulnerabilities and will be discussed in Section 5.
Figure 2. Overall process of vulnerability assessment.
Figure 2. Overall process of vulnerability assessment.
Energies 08 05266 g002

3. Physical Consequences Analysis

Based on the discussion in Section 2.1, the physical consequences caused by loss of integrity and availability are analyzed from two levels: terminal devices and control center server. Moreover, both of the normal and fault work condition are considered in this paper.
As shown in Figure 3, a typical multi-sectioned and multi-linked distribution system is given for understanding the potential physical consequences of cyber-attacks. In Figure 3, CB, L, F, S, T represents the circuit breaker, the load, the FRTU, the section switch and the tie switch, respectively. Every switch and circuit breaker is monitored and controlled by control center through an FRTU. The main feeder is divided into several feeder sections by the circuit breaker and other switches.
Figure 3. Multi-sectioned and multi-linked network of a distribution system.
Figure 3. Multi-sectioned and multi-linked network of a distribution system.
Energies 08 05266 g003
When a fault occurs, there are two schemes to implement the restoration function: centralized feeder automation (Scheme 1) and agent-based feeder automation (Scheme 2). As for Scheme 1, all the information will be sent to the control center server from FRTUs, and the server performs fault detection, isolation, and restoration. In Scheme 2, an FRTU can exchange information with its neighbor FRTUs to detect and isolate the fault area. The FRTU of the feeder breaker (i.e., F0 in Figure 3) collects information from other FRTUs in feeder h, communicates with the FRTUs of the breakers in its neighbor feeders (i.e., the feeders that are connected with feeder h through tie switches), and then performs restoration function to the power outage area.

3.1. Terminal Devices

3.1.1. FRTUs of Section Switches

Control commands and measurement data are the core information being exchanged in a DAS. The control commands are mainly used to operate switches, while the measurement data is used for decision-making. Thus, the consequence caused by loss of integrity in FRTUs of section switches can be determined by:
I h , i = I h , i C + I h , i M
where Ih,i represents the consequence caused by loss of integrity in Fh,i and Fh,i is the ith FRTU in main feeder h; I h , i C and I h , i M denotes the consequence caused by loss of control command integrity and measurement data integrity in Fh,i respectively.
Loss of control commands integrity or measurement data integrity allows an attacker to modify the corresponding information. The modification of control information will result in loss of load directly. For example, a command injection attack on F4 can trip section switch S4 and therefore cause the loss of load L5. With the help of fault detection, isolation and restoration, the power supply to L5 can be restored automatically in several minutes. Thus, the consequence caused by integrity loss of control command is described as:
I h , i C = j = i + 1 N h ( Ω h , j × t h )
Ω h , j = k S h , j ( L k × ω k )
where Ωh,j is the impact factor of the loads in the jth feeder section of feeder h; th is the duration of power outage which is equal to the time needed to apply restoration function in feeder h; Nh is the number of feeder sections in feeder h; Lk and ωk represents the loading level and the importance of kth load respectively; Sh,j is the set of loads in jth feeder section of feeder h. The importance of load represents the comprehensive influence on personal and property safety, which is on a scale of 1–5 [26]. The more important the load is, the higher it scores.
The modification of measurement data will mislead the DAS to make an improper control decision. Let us take the measurement data in F2 as an example. When a fault occurs between S1 and S2, S1 experiences a fault current while S2 does not. The correct actions include disconnecting S1 and S2, and closing tie switches to restore power supply to the rest of the distribution system. However, if the measurement data in F2 is tampered, the control center server (in Scheme 1) or agent-based FRTUs (in Scheme 2) would mistakenly believe that S2 experiences a fault current and therefore disconnect S2 and S3. Moreover, CB1 cannot be reclosed as a result that the fault has not been isolated. Thus, L1 and L3 will be wrongly removed compared to the correct control actions. On the other hand, if the fault occurs between S2 and S3, the manipulation of measurement data in F2 may mislead the control center server or agent-based FRTUs into believing that S2 does not experience a fault current. Consequently, S1 and S2 will be disconnected, and therefore L2 will be left in blackout. Furthermore, because of the fault has not been isolated, fault current appears again in the neighbor feeder (i.e., feeder h′) which supplies electricity to L3 after restoration. Therefore, the loads which need to be restored in feeder h and the loads in feeder h′ will experience outage for some time until the fault is finally isolated by another fault diagnosis process. Based on this discussion, the consequence caused by loss of measurement data integrity can be represented by:
I h , i M = γ h , i × ( j = 1 i + 1 ( Ω h , j × T h , j ) Ω h , i × T h , i ) + γ h , i + 1 × ( Ω h , i × T h , i + 1 + ( k = i + 2 N h Ω h , k + g = 1 N h ' Ω h ' , g ) × t h ' )
where γh,i is the failure rate of the ith feeder section of feeder h; Th,i is the time required to repair the permanent failure in ith feeder section of feeder h; Nh′ is the number of feeder sections in feeder h′; th′ is the time needed to apply restore function in feeder h′. If the fault occurs in the last feeder section, set th′ = 0 because there is no need to close tie switches in this circumstance.
As for availability, it ensures both the control center server and the FRTUs to get the requested information in time. Loss of availability would result in expanding the blackout area. For example, if the trip commands cannot reach S2 when a fault occurs between S1 and S2, S1 and S3 will be disconnected in order to isolate the fault. As a result, L3 will lose electricity additionally.
Therefore, the physical consequence caused by loss of availability in FRTUs of section switches can be denoted as:
A h , i = γ h , i × Ω h , i + 1 × T h , i + γ h , i + 1 × Ω h , i × T h , i + 1
where Ah,i denotes the consequences caused by loss of availability in Fh,i.

3.1.2. FRTUs of Tie Switches

Tie switches are normally open switches. This enables power wheeling in normal operation and fault restoration. A cyber-attack on the FRTU of a tie switch can result in loss of load. For example, if a fault occurs between S1 and S2, while T1 cannot be closed because of the commands from F5 is modified or not received, just closing T2 may not be able to fully restore the blackout area due to the system constraints. Therefore, the consequence caused by loss of control commands integrity or availability in FTRUs of tie switches can be denoted as:
I h , i = h S t i e , i j = 1 N h 1 ( γ h , j × T h , j × k S c u t , h ( L k × ω k ) ) i S t i e
A h , i = h S t i e , i j = 1 N h 1 ( γ h , j × T h , j × k S c u t , h ( L k × ω k ) ) i S t i e
where Stie is the set of tie switches; Stie,i is the set of main feeders which can be connected by ith tie switch; Scut,h is the set of the loads that cannot be restored when a fault occurs in feeder h.
In the above equations, the load with a higher importance usually has a higher priority in restoration. Thus, Scut,h can be confirmed by Algorithm 1. In this algorithm, SΔ is the set of loads that need to be restored by closing tie switches; Pl is the redundant capacity of other feeders; Ψ is a temporary variable; NSΔ is the number of the power consumers in SΔ.
Algorithm 1. LoadCut
Input: SΔ, Pl
Output:  Scut,h
begin
sorting the loads in SΔ according to its importance;
    for i = 1 to NSΔ do
       ΔP ← ΔP + SΔ(i)
    end
    if ΔPPl then
       return Scut,h ← ∅;
    end
    j ← 1;
    for i = 1 to NSΔ do
      Ψ ← Ψ + SΔ (i);
      if Ψ > Pl then
         Scut,h(j) ← SΔ(i);
         Ψ ← Ψ − SΔ (i);
         jj + 1;
          end
     end
end

3.1.3. FRTU of Feeder Breaker

The FRTU of a feeder breaker plays different roles in different restoration schemes. In Scheme 1, the control center server performs the isolation and restoration strategies. F0 (i.e., the FRTU of feeder breaker in feeder h) does not communicate with other FRTUs. The consequence caused by loss of integrity in F0 is similar with that of FRTUs of section switches:
I h , i = j = 1 N h ( Ω h , j × t h )     i S h , C B
where Sh,CB is the set of feeder breakers in feeder h.
If the close command cannot reach CB1 after fault isolation, the loads in the source side of feeder h will remain in blackout. Thus, the consequence caused by loss of availability in the FRTU of a feeder breaker can be represented as:
A h , i = j = 2 N h ( γ h , j × T h , j × k = 1 j 1 Ω h , k )     i S h , C B
In Scheme 2, F0 makes the restoration strategy and sends commands to other FRTUs. A modified command from F0 to trip CB1 may lead to blackout in feeder h. On the other hand, if a fault occurs in the neighbor feeder of feeder h, F0 may send a tampered response to misguide the neighbor feeder into believing that feeder h does not have extra power to restore the outage loads. In other words, feeder h is unable to provide restoration power to its neighbor feeders. Therefore, in Scheme 2, the consequence caused by loss of integrity in F0 can be confirmed by:
I h , i = j = 1 N h ( Ω h , j × t h ) + h ' S n e i , h g = 1 N h ' 1 ( γ h ' , g × T h ' , g × k S c u t , h ' ( L k × ω k ) )
where Snei,h denotes the set of neighbor feeders of feeder h.
If the service of F0 is not available when a fault occurs, the loads will remain in outage as a result of CB1 and tie switches have not been closed. Furthermore, feeder h′ cannot get restoration power from feeder h because it cannot get the necessary information from F0. Thus, in Scheme 2, the consequence caused by loss of availability in F0 can be confirmed by:
A h , i = j = 1 N h ( γ h , j × T h , j × l = 1 N h Ω h , l ) + h ' S n e i , h g = 1 N h ' 1 ( γ h ' , g × T h ' , g × k S c u t , h ' ( L k × ω k ) )

3.2. Control Center Server

The control center server performs supervisory control to the distribution system in normal operation, and plays different roles when a fault occurs according to different schemes.
In Scheme 1, the control center server is in charge of making control decisions and sending control commands to the FRTUs when a fault occurs. If the control center server is attacked, the loss of control commands integrity can result in blackout of the entire distribution system. Thus:
I c t r l = h S F j = 1 N h ( Ω h , j × T s e r v e r )
Where Ictrl is the consequence caused by loss of information integrity in control center server; SF is the set of feeders; Tserver is the time needed to recover the control center server.
If the control center server is not available to formulate control strategies, the fault will not be removed and the loads in the fault feeder will remain in outage. Thus, the consequence caused by loss of information availability in control center server (i.e., Actrl) can be represented as:
A c t r l = h S F i = 1 N h ( γ h , i × T h , i × j = 1 N h Ω h , j )
In Scheme 2, the agent-based FRTUs are in charge of fault detection, isolation and restoration. Loss of availability in a control center server will not affect fault isolation and loads restoration. In other words, an attack on the availability of a control center server will not result in loss of load, so Actrl = 0. However, the control center server can still trip or close the switches through remote control in normal operations. Thus, the physical consequence caused by loss of integrity in control center server in this scheme is determined by Equation (12).

4. DAS Vulnerability Assessment Model

4.1. Selecting Access Point

Both the FRTUs and the control center server in the DAS can be used as initial access points by attackers. The possibility of selecting a specific vulnerability to be access point is mainly related to two factors: (1) the difficulty of getting access to a specific vulnerability; (2) the potential physical consequences of successful exploitation of a vulnerability.
The metrics of access difficulty are shown in Table 1. The greater the difficulty is, the lower the metric value will be. Table 1 reflects the reality that comprehensive physical protection and network isolation are helpful to prevent a vulnerability from being attacked.
Table 1. Access Difficulty Scoring Evaluation.
Table 1. Access Difficulty Scoring Evaluation.
Metric valueDescription
0.2A vulnerability is of comprehensive physical protection and is local exploitable only.
0.5A vulnerability is of comprehensive physical protection and is remotely exploitable.
0.8A vulnerability is of little physical protection and is local exploitable only.
1.0A vulnerability is of little physical protection and is remotely exploitable.
After getting access to the access point, the attackers can launch a further attack by taking advantages of the vulnerabilities in other devices. As a matter of fact, the exploitation of a vulnerability does not always result in the complete loss of integrity and availability. Different vulnerabilities have different impacts on the security properties. For the vulnerability i in device t, the potential physical consequence after being attacked takes the following form:
R v u l , i = ( α i × C t T ) × λ i
In Equation (14), Rvul,i denotes the potential physical consequence if vulnerability i (i.e., Vi) is successfully exploited; λi measures the complexity to exploit Vi, its reference value is provided by the Access Complexity metric in CVSS [19]; Ct = [Ih,t Ah,t] (if t belongs to terminal devices) or Ct = [Ictrl Actrl] (if t is a control center server) is a vector of a specific device t which includes two aspects of potential physical consequences; αi = [αint,i αavail,i] is a logical array, where αint,i and αavail,i represent whether an attack on Vi will result in loss of integrity and availability in device t respectively. If the exploitation of Vi does have an impact on the loss of integrity or availability, the corresponding element is assigned to 1, otherwise the element is assigned to 0.
Therefore, the possibility of selecting Vi to be access point (i.e., Pacc,i) can be represented as follows:
P a c c , i = { R a p , i × R v u l , i j S a c c ( R a p , j × R v u l , j ) , i S a c c      0      ,       i S a c c
where Rap,i and Rap,j represent the difficulty to get access to Vi and Vj respectively; Sacc is the set of potential access points in a DAS.

4.2. Hacking Other Vulnerabilities

After penetrating an access point, an attacker can get sensitive information about surrounding devices such as device settings and vulnerability information for a next-step attack. As mentioned above, the relationship between the attacker and the system operator can be modeled as a two-person ADG. The attacker’s strategy is to select an attack target, and the defender’s strategy is to take a defense action. In order to predict the probability distribution of attack actions and defense strategies that reasonable attacker and defender would take, the attacker’s payoff and defender’s payoff should be analyzed elaborately.
The maximal payoff for an attacker by attacking Vj in device t’ can be calculated according to Equation (14). However, the attacker can barely get the maximal payoff because of the defense strategies and access difficulty. Suppose an attack is launched from Vi, the set of attacker’s strategy and defender’s strategy can be denoted as S a i = ( S i , j a ) 1 × m and S d i = ( S i , k d ) 1 × n respectively, where S i , j a represents the strategy of attacking Vj, S i , k d represents using kth defense strategy.
The payoff function for an attacker, i.e., U a ( S i , j a , S i , k d ) , can be represented as follows:
U a ( S i , j a , S i , k d ) = ( R v u l , j D ( S i , j a , S i , k d ) ) × R a p , j
where D ( S i , j a , S i , k d ) represents the positive impact of the defense strategy S i , k d when the attacker takes the strategy S i , j a . The quantitative method of D ( S i , j a , S i , k d ) will be presented in the following text.
Because of the real-time requirement of DAS operations and the limited computing power in terminal devices, some common secure methods such as message authentication may have disruptive effects on the normal operation of a DAS [8,27], so both the positive and negative impacts of a specific defense strategy should be taken into consideration in formulating the payoff function for a defender.
The positive impact refers to the defense reward against an attack, i.e., the reduction of attacker’s payoff through deploying a defense strategy. Different defense strategies lead to different defense effects. For example, message authentication contributes to checking data integrity. Therefore, the positive impact could be denoted as follows:
D ( S i , j a , S i , k d ) = ( α j β k ) × C t ' T × λ j
In Equation (17), ∧ represents the logical AND operation which performs the logical operation on each element of array αj and array βk; βk = [βint,k βavail,k] is a logical array, where βint,k and βavail,k represent whether defense strategy S i , k d contributes to enhance the integrity and availability, respecively. If S i , k d effectively enhances the integrity or availability, the corresponding element is set to be 1, otherwise it will be 0.
The negative impacts of a defense strategy mainly include loss of availability of devices and other costs of deploying the defense strategy. In practice, the overall cost of deploying defense strategies in a DAS is usually constrained, so we need to rank the vulnerabilities and then enhance the DAS cyber security in a more effective way, i.e., according to the ranking list. While the cost of deploying the defense strategy for a single device is not a major concern in calculating the defender’s payoff. For example, if a defense strategy can significantly increase the cyber security of the DAS, it should be used even if it requires a high cost to deploy.
In a DAS, both the control center server and the terminal devices require time-critical responses to achieve real-time monitoring and controlling. In other words, only the timely transmitted data is valid. Therefore, considering that the FRTUs in a DAS usually have very limited computing power, some typical defense strategies such as using encryption techniques in message authentication are not always feasible. For example, an over complex cryptographic algorithm will increase the computational complexity and need additional time for encryption and decryption before the information is sent and received. As a result, the real-time transmission of control commands and measurement data requirement might be violated. How to design a cryptographic algorithm which can ensure that the messages can be appropriately encrypted while limiting the latency is a research hotspot [15,16,28], but it is out of the scope of this paper. In this paper, the time needed to transmit information between the control center server and the terminal devices, including transmission time and the extra computation time for encryption and decryption, can be calculated according to the computer network knowledge [29]. If the overall time exceeds a pre-set threshold, the defense strategy is supposed to have a negative impact on the availability of information. The negative impact of kth defense strategy, i.e., N ( S i , j a , S i , k d ) , is denoted as:
N ( S i , j a , S i , k d ) = λ j × t ' Φ k A h , t '
where Φk represents the set of devices which are influenced by kth defense strategy.
According to the above discussion, the defender’s payoff function can be represented by:
U d ( S i , j a , S i , k d ) = D ( S i , j a , S i , k d ) × R a p , j N ( S i , j a , S i , k d )
Based on the payoff functions for the attack and the defender, i.e., Equation (16) and (19), the probability distribution of attack actions, i.e., σ a , can be obtained by solving the Nash equilibrium of the ADG [30]. σ a = ( σ i , j a ) 1 × m , where σ i , j a is the possibility of attacking Vj from Vi. If there are multiple equilibrium solutions, the Pareto efficiency criterion is used to identify the final solutions.

5. Vulnerability Adjacency Matrix

The quantitative assessment result of a vulnerability denotes the possibility that the vulnerability is attacked. The vulnerability with a higher score is more likely to be attacked. Here, the vulnerability adjacency matrix is introduced to analyze the relationship between different vulnerabilities.
Definition 1: Single-step Vulnerability Adjacency Matrix (SVAM). The element Vi,j in an SVAM denotes the possibility that Vj is selected to be the next-step attack target when the threat reaches Vi. The bigger the value of Vi,j is, the more likely Vj is attacked from Vi. When i = 1, V1,j represents the possibility that vulnerability j is selected to be the access point, thus Vi,j = Pacc,j; otherwise, the value of Vi,j can be determined as:
V i , j = { σ i , j a ,       j S i 0 ,    j S i
where Si is the set of the vulnerabilities that can be exploited through a single-step attack from Vi.
SVAM describes the relationship of two vulnerabilities within a single-step attack, but it cannot deal with the multi-step attack scenario. Assuming that there are multiple attack paths between the source node (Vi) and the destination node (Vj), the possibilities of selecting different paths can be calculated by Algorithm 2. This algorithm traverses all the nodes based on depth first search strategy, where Ei,j is the set of attack paths between Vi and Vj, Pi,j is the set of the possibilities of selecting different paths. Some rings which will result in repetitive computation of the quantitative results may occur in attack paths during traversing. Thus, we use π to store the nodes in the attack path, V i π . If the next-step attack node V n π , the iterative process will be stopped. Pπ is the possibility of selecting the path. In order to get Ei,j and Pi,j, the initial values of π and Pπ are Vi and 1, respectively.
Algorithm 2. FindPaths
Input: SVAM, Vj, π, Pπ
Output: Ei,j, Pi,j
begin
    Vlast ← the last node in π;
    Ei,j ← ∅;
    if Vlast == Vj then
       Ei,jπ;
       Pi,jPπ;
       return Ei,j and Pi,j;
    end
    for each child node of i in SVAM do
       if Vi,m ≠ 0 and Vm π then
             // Vnext is the set of next-step attackable nodes.
             VnextVm;
       end
    end
    for each VnVnext
        add Vn to the bottom of π;
        (Ei,j, Pi,j) = FindPaths (SVAM, Vj, π, Pπ×SVAM(Vlast, Vn));
    end
end
The statistical data of cyber-attacks shows that the length of an attack path is usually shorter than 10 steps. Therefore, the attacks which need more than 10 attack steps should be removed from Ei,j. In conclusion, the quantitative result of Vj, i.e., Qj, can be denoted as:
Q j = k E 1 , j P 1 , j k
where P 1 , j k denotes the possibility of attacking Vj through kth path.

6. Case Studies

The IEEE RBTS bus 2 distribution system [31] is introduced here to illustrate how to apply the proposed assessment model. Both the scenarios of Scheme 1 and Scheme 2 are simulated. Simulation results demonstrated the effectiveness of the method.
Figure 4 shows the topology of the RBTS bus 2 system and the locations of FRTUs. There are four main feeders, ten section switches and two tie switches in total. Every switch is monitored and controlled by an FRTU. The communication network of the RBTS bus 2 is assumed to be a ring network which is also depicted by the dashed lines in Figure 4.
Figure 4. Distribution system for RBTS bus 2 including FRTUs.
Figure 4. Distribution system for RBTS bus 2 including FRTUs.
Energies 08 05266 g004
In the simulation, the response time to apply restore function is assumed to be 5 min, and the time required to repair a permanent failure or the control center server is assumed to be 60 minutes [3]. The importance of each load is given in Table 2, the other detailed information of RBTS bus 2 is shown in reference [31].
Table 2. The importance of different loads.
Table 2. The importance of different loads.
Load pointsCustomer typeLoad importance
1–3, 10–12, 17–19residential1
8, 9industrial3
4, 5, 13, 14, 20, 21government/institution3
6, 7, 15, 16, 22commercial2
According to the discussion in Section 3, in the scenario of Scheme 1, the potential physical consequences caused by loss of integrity and availability in control center server are 41.751 MWh and 6.7761 MWh, respectively. In Scheme 2, only the attacks on the integrity of control center server would result in loss of load and the result of physical consequence is 41.751 MWh. As for the terminal devices, the potential physical consequences are shown as Figure 5. As is clearly seen, the physical consequences of attacking FRTUs of feeder circuit breakers become larger in Scheme 2. This is mainly because that an attack on the FRTU of a feeder circuit breaker would affect not only the loads in the related feeder, but also the loads in its neighbor feeder in Scheme 2.
Figure 5. (a) Physical consequences of attacking FRTUs in Scheme 1; (b) Physical consequences of attacking FRTUs in Scheme 2.
Figure 5. (a) Physical consequences of attacking FRTUs in Scheme 1; (b) Physical consequences of attacking FRTUs in Scheme 2.
Energies 08 05266 g005
The hypothetical vulnerability information of the DAS in this case study is shown as Table 3, including the types of vulnerabilities and the corresponding access complexity (AC). Among which, “Get administrator rights” and “Privilege escalation” means the exploitation of related vulnerabilities will result in loss of integrity and availability, “Denial of Service” will result in loss of availability, “Unauthorized access” will result in loss of integrity. In practice, the vulnerability information could be acquired by vulnerability scanning.
Taking vulnerability 17 as an example, the maximal payoff for an attacker by attacking this vulnerability in Scheme 1 and Scheme 2 can be calculated as follows:
Scheme 1: Rvul,17 = (41.75 × 1 + 6.78 × 1) × 0.71 = 34.4563 MWh;
Scheme 2: Rvul,17 = (41.75 × 1 + 0 × 1) × 0.71 = 29.6425 MWh.
Thus, by attacking vulnerability 17, the attacker can get a payoff up to 34.4563 MWh and 29.6425 MWh in Scheme 1 and Scheme 2, respectively. For other vulnerabilities, the maximal payoffs for the attacker are depicted in Figure 6. Obviously, an attacker can cause greater losses by attacking vulnerability 17 than others.
Table 3. Information of vulnerabilities.
Table 3. Information of vulnerabilities.
Vul. No.Affiliated IEDsIdentifierType of VulnerabilityAC
1F1,0CVE-2011-4034Get administrator rights0.61
2F1,1CVE-2012-0258Get administrator rights0.61
3F1,2CVE-2013-3528Get administrator rights0.71
4F1,3CVE-2012-0258Get administrator rights0.61
5F1,4CVE-2012-3847Denial of Service0.71
6F2,0CVE-2011-4034Get administrator rights0.61
7F2,1CVE-2012-3847Denial of Service0.71
8F3,0CVE-2011-4034Get administrator rights0.61
9F3,1CVE-2011-4056Unauthorized access0.61
10F3,2CVE-2011-4056Unauthorized access0.61
11F3,3CVE-2011-4056Unauthorized access0.61
12F3,4CVE-2012-3847Denial of Service0.71
13F4,0CVE-2011-4034Get administrator rights0.61
14F4,1CVE-2012-0258Get administrator rights0.61
15F4,2CVE-2013-3528Get administrator rights0.71
16F4,3CVE-2012-0258Get administrator rights0.61
17Central ServerCVE-2011-4514Privilege escalation0.71
18Central ServerCVE-2012-3847Denial of Service0.71
Figure 6. Maximal payoffs of attacking different vulnerabilities.
Figure 6. Maximal payoffs of attacking different vulnerabilities.
Energies 08 05266 g006
In a DAS, all the FRTUs and the control center server are potential access points. In general, the control center server is located in the control station and the FRTUs of circuit breakers are located in substations, both of which are well protected in restricted areas. Other FRTUs are located in remote areas with limited physical protection. Therefore, the access difficulty and the possibility that a specific vulnerability is selected to be access point are shown in Table 4. As calculated above, an attacker can cause the severest physical consequence by attacking vulnerability 17. So, as seen in this table, the possibility of selecting vulnerability 17 to be access point is much higher than others.
Table 4. Selecting access point.
Table 4. Selecting access point.
Vul. No.RapPacc (Scheme 1)Pacc (Scheme 2)Vul. No.RapPacc (Scheme 1)Pacc (Scheme 2)
10.20.01180.02621010.03630.0377
210.04890.05081110.02110.0219
310.05740.05961210.07610.0790
410.03210.03331310.01020.0341
510.04510.0468140.20.04080.0423
60.20.00760.02541510.04820.0500
710.01930.02011610.04270.0443
810.00940.0338170.20.40380.3607
90.20.03270.0340180.20.05640
After penetrating access points, an attacker can launch further attacks. Some commonly used defense strategies [32] are used in this study. The detailed information of these countermeasures is described in Table 5. Updating patches are helpful to enhance the overall security properties.
Table 5. Description of defense strategies.
Table 5. Description of defense strategies.
No.NameDescription
1Message authenticationCheck the integrity of information
2Update patch 1Patches for Vul. No. 17
3Update patch 2Patches for Vul. No. 5, 7, 12, and 18
4Update patch 3Patches for Vul. No. 9, 10, and 11
5No countermeasuresNone defense measures are deployed
The possibility that a specific vulnerability is selected to be the next-step attack node can be calculated by solving the Nash equilibrium of an ADG. For example, in Scheme 2, when the attacker penetrates into vulnerability 1 successfully, the attackable nodes by a single-step attack include vulnerability 2 to vulnerability 6. According to the analysis in Section 4.2, the Nash equilibrium for attacker is σa = (0, 0.5211, 0, 0.4789, 0), which means that the possibility of choosing vulnerability 3 and vulnerability 5 to be the next-step attack nodes are 0.5211 and 0.4789 respectively.
Based on the analysis of selecting access points and the relationship among different vulnerabilities, we can get the final quantitative results of all vulnerabilities which are shown in Table 6 and Figure 7.
Table 6. Quantitative results of vulnerabilities in different schemes.
Table 6. Quantitative results of vulnerabilities in different schemes.
Vul. No.Score (Scheme 1)Score (Scheme 2)Vul. No.Score (Scheme 1)Score (Scheme 2)
10.01180.2622100.03630.0377
20.04890.0508110.02110.0219
30.05740.1652120.07610.1928
40.03210.0333130.01020.3771
50.04510.1537140.04080.0423
60.00760.0455150.04820.2978
70.01930.0201160.04270.0443
80.00940.1274170.46990.3607
90.03270.0340180.53000
Figure 7. Comparisons of quantitative results of vulnerabilities in different schemes.
Figure 7. Comparisons of quantitative results of vulnerabilities in different schemes.
Energies 08 05266 g007
As observed from Table 6 and Figure 7, both the vulnerabilities in terminal devices and control center server are likely to be attacked. In Scheme 1, the vulnerabilities in the control center server are more likely to be attacked. This is mainly because that the control center server plays a pivotal role in both normal operation and fault restoration. It collects information from each FRTU, and sends control decisions to them. Although the vulnerabilities in the control center server are harder to exploit, the payoffs are much higher, so the control center server vulnerabilities are more attractive to attackers. Compared to Scheme 1, many FRTUs have a higher possibility to be attacked in Scheme 2. Besides vulnerability 17 which is located in the control center server, vulnerability 1, 13 and 15 have relatively higher scores. This is because that the agent-based FRTUs have the ability to exchange information with its neighbor FRTUs, and to restore power to the blackout area when a fault occurs without the help of the control center server. As for vulnerability 18, attacks on it will result in loss of availability, but will not lead to loss of load in Scheme 2 (see Section 3.2), so vulnerability 18 is not attractive to attackers.
The quantitative results denote the possibility that a specific vulnerability will be attacked. Thus, the proposed assessment framework can be used as a tool in distribution system planning and is helpful to identify any cyber security bottlenecks in a distribution system. The vulnerability with a higher score is more likely to be attacked and should receive priority consideration for cyber security.

7. Conclusions

Cyber security issues in smart grids merit increasing attention due to the tighter integration of cyber systems with physical power systems. Compared with the control systems in power plants or substations, a DAS is more vulnerable to cyber-attacks. However, ensuring the security of every device in a DAS is both economically inefficient and technically unnecessary.
In this paper, a novel method is proposed for vulnerability assessment and ranking in a DAS. The model includes analyzing the potential physical consequences of cyber-attacks, developing ADG models to simulate the attack processes, and proposing vulnerability adjacency matrix to illustrate the relationship among different vulnerabilities. The case studies based on RBTS bus 2 show the effectiveness and validity of the proposed vulnerability assessment model.

Acknowledgments

This work is jointly supported by National Natural Science Foundation of China (No. 51177145, No. 51361130152), and Specialized Research Fund for the Doctoral Program of Higher Education (20120101110112).

Author Contributions

Xiaming Ye designed the algorithm, performed the simulations and wrote the paper; Junhua Zhao conceived the project; Yan Zhang and Fushuan Wen reviewed and polished the manuscript. All authors discussed the simulation results and approved the assessment methodology.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ilic, M.D.; Xie, L.; Khan, U.A.; Moura, J.M.F. Modeling of future cyber-physical energy systems for distributed sensing and control. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 2010, 40, 825–838. [Google Scholar] [CrossRef]
  2. Ericsson, G. Cyber security and power system communication—Essential parts of a smart grid infrastructure. IEEE Trans. Power Del. 2010, 25, 1501–1507. [Google Scholar] [CrossRef]
  3. Lim, I.H.; Sidhu, T.S.; Choi, M.S.; Lee, S.J.; Hong, S.; Lim, S.I.; Lee, S.W. Design and implementation of multiagent-based distributed restoration system in DAS. IEEE Trans. Power Del. 2013, 28, 585–593. [Google Scholar] [CrossRef]
  4. Bou-Harb, E.; Fachkha, C.; Pourzandi, M.; Debbabi, M.; Assi, C. Communication security for smart grid distribution networks. IEEE Commun. Mag. 2013, 51, 42–49. [Google Scholar] [CrossRef]
  5. Ericsson, G. Information security for electric power utilities (EPUs)-CIGRE developments on frameworks, risk assessment, and technology. IEEE Trans. Power Del. 2009, 24, 1174–1181. [Google Scholar] [CrossRef]
  6. Zio, E.; Sansavini, G. Vulnerability of smart grids with variable generation and consumption: a system of systems perspective. IEEE Trans. Syst. Man Cybern. Syst. 2013, 43, 477–487. [Google Scholar] [CrossRef]
  7. National Institute of Standards and Technology, The Smart Grid Interoperability Panel, Cyber Security Working Group. Guidelines for smart grid cyber security. Available online: http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf (accessed on 10 January 2015).
  8. Stouffer, K.; Falco, J.; Scarfone, K. Guide to Industrial Control Systems (ICS) Security; NIST SP 800–82; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011. [Google Scholar]
  9. Liu, N.; Zhang, J.; Zhang, H.; Liu, W. Security assessment for communication networks of power control systems using attack graph and MCDM. IEEE Trans. Power Del. 2010, 25, 1492–1500. [Google Scholar] [CrossRef]
  10. Backhous, S.; Bent, R.; Bono, J.; Lee, R.; Tracey, B.; Wolpert, D.; Xie, D.; Yildiz, Y. Cyber-physical security: A game theory model of human interacting over control systems. IEEE Trans. Smart Grid 2013, 4, 2320–2327. [Google Scholar] [CrossRef]
  11. Ten, C.W.; Liu, C.C.; Maninaran, G. Vulnerability assessment of cyber security for SCADA systems. IEEE Trans. Power Syst. 2008, 23, 1836–1846. [Google Scholar] [CrossRef]
  12. Srivastava, A.; Morris, T.; Ernster, T.; Vellaithurai, C.; Pan, S.; Adhikari, U. Modeling cyber-physical vulnerability of the smart grid with incomplete information. IEEE Trans. Smart Grid 2013, 4, 235–244. [Google Scholar] [CrossRef]
  13. Zonouz, S.; Davis, C.M.; Davis, K.R.; Berthier, R.; Bobab, R.B.; Sanders, W.H. SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures. IEEE Trans. Smart Grid 2014, 5, 3–13. [Google Scholar] [CrossRef]
  14. Chen, T.M.; Sanchez-Aarnoutse, J.C.; Buford, J. Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2011, 2, 741–749. [Google Scholar] [CrossRef]
  15. Lim, I.H.; Hong, S.; Chou, M.S.; Lee, S.J.; Kim, T.W.; Lee, S.W. Security protocols against cyber attacks in the distribution automation system. IEEE Trans. Power Del. 2010, 25, 448–455. [Google Scholar] [CrossRef]
  16. Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-physical systems security for the electric power grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
  17. Han, G.; Xu, B.; Suonan, J. IEC 61850-based feeder terminal unit modeling and mapping to IEC 60870–5-104. IEEE Trans. Power Del. 2012, 25, 2046–2053. [Google Scholar] [CrossRef]
  18. Mo, Y.; Kim, T.H.; Brancik, K.; Dickinson, D; Lee, H.; Perrig, A.; Sinopoli, B. Cyber-physical security of a smart grid infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar]
  19. Mell, P.; Scarfone, K.; Romanosky, S. Common vulnerability scoring system. IEEE Secur. Priv. 2006, 4, 85–89. [Google Scholar] [CrossRef]
  20. Information Technology—Security Techniques—Information Security Risk Management; ISO/IEC 27005; International Organization for Standardization/International Electrotechnical Commission (ISO/IEC): Geneva, Switzerland, 2011.
  21. Falahati, B.; Fu, Y.; Wu, L. Reliability assessment of smart grid considering direct cyber-power interdependencies. IEEE Trans. Smart Grid 2012, 3, 1515–1524. [Google Scholar] [CrossRef]
  22. Ismail, Z.; Leneutre, J.; Bateman, D.; Chen, L. A game theoretical analysis of data confidentiality attacks on smart-grid AMI. IEEE J. Sel. Areas Commun. 2014, 32, 1486–1499. [Google Scholar] [CrossRef]
  23. Gamage, T.; Roth, T.; McMillin, B.; Crom, M. Mitigating event based confidentiality violations in smart grids: An information flow security-based approach. IEEE Trans. Smart Grid 2013, 4, 1227–1234. [Google Scholar] [CrossRef]
  24. Ko, Y.; Kang, T.; Park, H.; Kim, H.; Nam, H. The FRTU-based fault-zone isolation method in the distribution systems. IEEE Trans. Power Del. 2010, 25, 1001–1009. [Google Scholar] [CrossRef]
  25. Zidan, A.; El-Saadany, E. A cooperative multiagent framework for self-healing mechanisms in distribution systems. IEEE Trans. Smart Grid 2012, 3, 1525–1539. [Google Scholar] [CrossRef]
  26. Shang, J.; Sheng, X.; Zhang, J.; Zhao, W. The optimized allocation of mobile emergency generator based on the loads importance. In Proceedings of the Asia-Pacific Power and Energy Engineering Conference, New York, NY, USA, 28–31 March 2009; pp. 1–4.
  27. Dzung, D.; Naedele, M.; Von Hoff, T.; Crevatin, M. Security for industrial communication systems. Proc. IEEE 2005, 93, 1152–1177. [Google Scholar] [CrossRef]
  28. Tsang, P.P.; Smith, S.W. YASIR: A low-latency, high-integrity security retrofit for legacy SCADA systems. In Proceedings of the IFIP TC 11 23rd International Information Security Conference, Milano, Italy, 7–10 September 2008; pp. 445–459.
  29. Kurose, J.F.; Ross, K.W. Computer Networking: A Top-Down Approach, 5th ed; Addison Wesley: Boston, MA, USA, 2005. [Google Scholar]
  30. Osborne, M.J. An Introduction to Game Theory; Shanghai University of Finance & Economics Press: Shanghai, China, 2005. [Google Scholar]
  31. Allan, R.; Billinton, R.; Sjatief, I.; Goel, L.; So, K. A reliability test system for educational purposes—Basic distribution system data and results. IEEE Trans. Power Syst. 1991, 6, 813–820. [Google Scholar] [CrossRef]
  32. Jiang, W.; Fang, B.; Zhang, H.; Tian, Z.; Song, X. Optimal network security strengthening using attack-defense game model. In Proceedings of the Sixth International Conference on Information Technology: New Generations, Las Vegas, NV, USA, 27–29 April 2009; pp. 475–480.

Share and Cite

MDPI and ACS Style

Ye, X.; Zhao, J.; Zhang, Y.; Wen, F. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems. Energies 2015, 8, 5266-5286. https://doi.org/10.3390/en8065266

AMA Style

Ye X, Zhao J, Zhang Y, Wen F. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems. Energies. 2015; 8(6):5266-5286. https://doi.org/10.3390/en8065266

Chicago/Turabian Style

Ye, Xiaming, Junhua Zhao, Yan Zhang, and Fushuan Wen. 2015. "Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems" Energies 8, no. 6: 5266-5286. https://doi.org/10.3390/en8065266

Article Metrics

Back to TopTop