Next Article in Journal
Data Quality Management in the Internet of Things
Next Article in Special Issue
Random Forest Regressor-Based Approach for Detecting Fault Location and Duration in Power Systems
Previous Article in Journal
Simultaneous Burr and Cut Interruption Detection during Laser Cutting with Neural Networks
Previous Article in Special Issue
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks

1
Department of Electrical Engineering, University Carlos III of Madrid, 28911 Leganés, Madrid, Spain
2
Physical Safety Department, University Center of Guardia Civil (CUGC), 28300 Aranjuez, Madrid, Spain
3
International Doctoral School, UNED (National University of Distance Education), 28015 Madrid, Spain
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(17), 5826; https://doi.org/10.3390/s21175826
Submission received: 2 July 2021 / Revised: 5 August 2021 / Accepted: 26 August 2021 / Published: 30 August 2021
(This article belongs to the Special Issue Cybersecurity and Privacy-Preserving in Modern Smart Grid)

Abstract

:
In the last decade, the main attacks against smart grids have occurred in communication networks (ITs) causing the disconnection of physical equipment from power networks (OTs) and leading to electricity supply interruptions. To deal with the deficiencies presented in past studies, this paper addresses smart grids vulnerability assessment considering the smart grid as a cyber-physical heterogeneous interconnected system. The model of the cyber-physical system is composed of a physical power network model and the information and communication technology network model (ICT) both are interconnected and are interrelated by means of the communication and control equipment installed in the smart grid. This model highlights the hidden interdependencies between power and ICT networks and contains the interaction between both systems. To mimic the real nature of smart grids, the interconnected heterogeneous model is based on multilayer complex network theory and scale-free graph, where there is a one-to-many relationship between cyber and physical assets. Multilayer complex network theory centrality indexes are used to determine the interconnected heterogeneous system set of nodes criticality. The proposed methodology, which includes measurement, communication, and control equipment, has been tested on a standardized power network that is interconnected to the ICT network. Results demonstrate the model’s effectiveness in detecting vulnerabilities in the interdependent cyber-physical system compared to traditional vulnerability assessments applied to power networks (OT).

1. Introduction

Smart grids are characterized by high digitisation that facilitates modernisation in electrical network infrastructure, active grid management, control and real-time communication with consumers, prosumers, and DSOs [1]. Smart grid digitisation has created new areas of work, in which the electrical and communications infrastructures are neither independent nor operate in isolation [2,3]. Consequently, both infrastructures must be integrated into a single cyber-physical system (CPS) that must be analysed holistically to identify potential vulnerabilities that may affect the security and continuity of the power supply.
The vulnerability of an electrical network can be defined as its ability to maintain stable operation under the loss or disconnection of an element in the power network [4,5]. Vulnerability analysis allows power network operators to improve the robustness of critical elements in the network and develop countermeasures against untimely failures [6]. Therefore, recognising the most vulnerable elements in a power grid will result in better operation [1,7] and provide an indispensable tool for DSO decision-makers [8].
Traditional vulnerability analysis has focused on determining weaknesses in the electrical infrastructure (OT) when an element is lost. This is known as structural vulnerability [8]. Several authors have used power flow techniques to determine the most vulnerable nodes in a network [9]. However, methods that employ DC power flow are not suitable for analysing cascading events, and AC power flow methods have high computational costs [8]. Other studies have employed topological methods that can define links between the structure and electrical characteristics of OT networks. The main advantages of topological methods are scalability, low computational costs, the ease of defining vulnerability indices, and the possibility of incorporating electrical information, such as line impedance, into models as weighted graphs [8]. Topological methods are functional, logical, and numerical. However, they have several limitations. Functional methods [9] are unsuitable for large power networks, logical methods [10] cannot be applied to cyber-physical systems, and numerical methods [11] have been applied to only small-scale networks.
In recent years, complex network theory has been used to analyse vulnerabilities in OT power networks [8,12,13,14,15,16]. Complex network indices, such as betweenness and net-ability, have been used to assess OT network vulnerabilities [15,17]. The work presented by [18] proposes an electrical network model, based on complex network theory, to identify lines that would affect the OT network’s robustness in the event of a loss or disconnection. The authors of [16] used an adjacent graph model, and in [19], complex network indices, such as node degree and geodesic distance, were used to establish the critical nodes in an OT network that could cause a blackout in the event of cascading failures in specific elements. It should be noted that previous research papers have focused on physical electricity networks and have not addressed vulnerabilities that could occur in IT communications networks producing OT network vulnerabilities.
Current smart grids are cyber-physical systems composed of two heterogeneous networks: the power (OT) and communications (IT) networks which are both interconnected. Consequently, a vulnerability in either network (OT-IT) affects the entire CPS [3,20]. The work discussed in [21] represents an initial approach to analysing vulnerabilities in smart grids by considering them as a single CPS. The authors of [21] propose the use of an adjacency matrix, based on complex numbers, in which the OT network is represented by real components and the IT network by imaginary elements. However, the analysis developed in [21] determines the vulnerability of individual elements in isolated networks, but it does not perform a vulnerability analysis that detects the most critical node in the CPS as a whole.
To identify smart grid vulnerabilities, it is not sufficient to separately analyse the physical components and the computational components, as is assumed in [3]. It is also necessary to model the interaction between them. In [12,13,14,15,16,17,18,19], traditional vulnerability assessment is only based on the power grid; however, the detection of vulnerabilities in power networks is not sufficient to analyse vulnerabilities in smart grids which are also composed of communication networks. Moreover, to highlight hidden interdependencies between power and ICT networks it is also necessary to include the interconnection links between power nodes and communication nodes.
The major novelty and contribution of our paper is the proposal of a new methodology based on a multilayer network for the analysis of vulnerabilities of the smart grid. In this paper, we model a smart grid as a whole cyber-physical system composed of two heterogeneous interconnected networks: power network, ICT network, and also the coupling network between both networks. This approach has not been considered in other publications as can be seen in Table 1.
It can be concluded through this comparison that interdependencies between power and ICT networks in smart grids are not considered in the literature [12,13,14,15,16,17,18,19]. These interdependencies represent one of the challenges in smart grids modelling [3]. This research field is in its early stage [21] and our proposed coupled smart grid modelled represents a contribution to the field.
In this article we propose the following three-fold contribution:
We present an interconnected heterogeneous smart grid model for vulnerability assessment that highlights hidden interdependencies between power and ICT networks. The interconnected model encompasses power networks, ICT networks, and the interconnection between power-ICT networks. It should be emphasized that the interconnected and heterogeneous nature of smart grids is not considered in traditional smart grids vulnerability assessment where only power network vulnerability is analysed, and neither ICT network nor power-ICT interconnection is considered [12,13,14,15,16,17,18,19].
We use multilayer complex network theory to deal with the complexity and heterogeneity of cyber-physical systems considered as interconnected and heterogeneous systems. Traditional smart grids models are modelled as monolayer networks in which only power network is considered [12,13,14,15,16,17,18,19,21], therefore they are not able to detect ICT vulnerabilities nor the interaction between power and ICT networks.
To determine the vulnerabilities of the cyber-physical systems, we use multilayer complex network centrality indexes which allow us to detect hidden interdependencies between power and ICT systems. These interdependencies are not considered in monolayer centrality indexes [12,13,14,15,16,17,18,19,21] because they do not consider the interconnection between power and ICT networks.
The content of the paper is organized as follows: Section 2 introduces the multilayer network theory and their centrality indexes used for vulnerability assessment in multilayer networks. In Section 3, a Cyber-physical smart grid model is presented which is composed of two interconnected heterogeneous networks (power network, ICT network) and by the coupling layer between both networks. In Section 4, the proposed methodology is applied to a standardized power network where the communication network and communication components are included. Finally, the conclusions of the paper are detailed in Section 5.

2. Multilayer Theory

Complex network theory is one of the most widely used tools for analysing large numbers of interconnected elements, an area that has presented significant modelling challenges in recent years [22]. This theory has been used to represent networks in the fields of biology and sociology. It is also valid for representing power networks [17]. Complex network theory has been used to determine the most critical nodes in an electrical grid. In [23], the topology of an Iranian power network was modelled using complex network theory which included electrical network characteristics, such as line admittance. The authors of [24] used complex networks to analyse the impacts of attacks on a model of the French power network. Similarly, complex network theory has allowed the authors of [25] to identify the sequence of events that would produce a blackout in a 25-bus electrical network. What these works have in common is that they analyse network vulnerabilities by considering only the OT infrastructure topology and exclude the physical monitoring and control equipment installed in generators, substations, lines, or consumers. Similarly, previous studies have failed to consider the communication equipment responsible for transmitting the bidirectional flow of information between the electricity grid and the DSO control centre.
In this article, we propose a grid model based on multilayer complex network theory, in which two heterogeneous networks: the OT and IT networks are integrated into a single CPS.

2.1. Basic Definitions

A multilayer network is composed of M layers represented by the pair   = { G , C } , where G represents the family of graphs corresponding to each layer of the network, which are expressed according to G = { G α ,   α { 1 , ,   M } } . Each network layer is represented by a graph consisting of a set of nodes or vertices ( N α ) and a set of edges between nodes ( E α ) so that the graph corresponding to layer α is represented by G α = ( N α , E α ) .
The matrix ( C ) of the pair   M ,   C = { E α β N α × N β ;   α , β ( 1 , ,   M ) ;   α β , } represents the connectivity between the nodes in the multilayer system ( n α G α ,     m β G β , α β ). The elements that comprise the matrix ( C ) are termed “cross layers”. The links between nodes in the same layer ( E α ) are called “intralayers”, while the joins between different layers are called “interlayers”, E α β   ( α β ) . Hence, the multilayer system ( ) is composed of N nodes, where N = α N α ,   α { 1 , . ,   M } and N α = { n 1 α n N α α } .
According to layer α in the multilayer network, the graph G α   can be represented by an adjacency matrix A [ α ] = ( a i j α ) N α × N α , where each element of the adjacency matrix ( a i j α ) is expressed as follows (1):
a i j α = { 1 , i f   ( n i α ,   n j α ) E α   0 ,                   o t h e r w i s e   1   i , j   N α ,     1 α M
Therefore, two nodes are considered to be adjacent in layer α   ( a i j α = 1 ) when an edge joins them ( E i j α ). In multilayer systems, the concept of adjacency also extends to connections between nodes in different layers. Hence, the edge connecting the node-layer pairs ( n α ,   α )   and ( m β ,   β )   would be adjacent to node n   in layer   α and node   m in layer   β [26].
In multilayer systems, the adjacency matrix corresponding to the links between the α and β layers, denoted as   E α β , is represented by A [ α , β ] = ( a i j α β ) N α × N β , where the elements of the adjacency matrix are obtained using the following Equation (2):
a i j α β = { 1 , i f   ( n i α ,   n j β ) E α β   0 ,                   o t h e r w i s e   1   i , j   N α ,     1 α M
Representing complex systems in layers allows us to model the nodes, the relationships between nodes in the same layer and connections between elements in different layers [22].
In multilayer systems, nodes in different layers are related to each other (i.e., nodes in one layer may depend on control nodes in other layers). Dependencies among nodes in different layers result in a structure known as a mesostructure in the field of complexity sciences. The mesostructure relates a node n α G α with one or more nodes   n β G β ,   1 β M ,   α β . It should be noted that such relationships between nodes are only possible in multilayer representations that allow the existence of the mesostructure.
In addition, multilayer systems can include nodes that are located in different layers. The connection or edges between nodes in different layers is called “coupling” ( C ^ ). An edge belongs to the coupling matrix if it links two nodes ( n ,   m ) that are present in two layers (α and β) (i.e., E n , m   C ^ if     n α G α ,     m β G β ,   1 α , β M ,   n = m ,   α β ). The nodes belonging to the coupling matrix are known as supra-nodes, and the graph formed by the supra-nodes and the coupling matrix is denoted by   G ^ C .
The supra-graph is the linked representation of the intra-layer and coupling graphs in a multiplex system. In multilayer systems with nodes in different layers, the connectivity matrix ( C ) is represented by C = { E α β N α × N β ;   α , β ( 1 , ,   M ) ;   α β } \ C ^ .

2.2. Supra-Adjacency Matrix

A supra-adjacency matrix   ( A ¯ ) is defined as the adjacency matrix used to synthetically represent a multilayer graph ( ). Using the supra-adjacency matrix to represent multilayer systems allows us to use the tools and methods developed for monoplex systems.
The supra-adjacency matrix is obtained from the adjacency matrices corresponding to each layer and the connectivity matrix ( C ) between the different layers of the graph according to the following expression (3):
A ¯ = α A [ α ] +   α , β A [ α , β ]     ,     1 α , β M
where α A [ α ] is the intra-layer adjacency matrix and α , β A [ α , β ] is the inter-layer adjacency matrix corresponding to the connectivity matrix C .
Figure 1 presents an example of a system with two layers; the physical layer contains two OT nodes (1, 2) and the cyber layer comprises three IT nodes (3, 4, and 5). The intra-layer adjacency matrices, corresponding to each layer as well as the intra-layer matrix, are defined by the matrices A [ 1 ] (4), A [ 2 ] (5), and α A [ α ] (6). Similarly, the connectivity matrix between the layers is expressed by C (7), and it is obtained from the inter-layer adjacency matrices A [ 1 , 2 ] (8), where   A [ 2 , 1 ] = A [ 1 , 2 ] T . Finally, the supra-adjacency matrix corresponding to the multilayer system in Figure 1 is represented by A ¯ (9).
A [ 1 ] = [ a 1 _ 1 a 1 _ 2 a 2 _ 1 a 2 _ 2 ]
A [ 2 ] = [ a 3 _ 3 a 3 _ 4 a 3 _ 5 a 4 _ 3 a 4 _ 4 a 4 _ 5 a 5 _ 3 a 5 _ 4 a 5 _ 5 ]
α A [ α ] = [ A [ 1 ] 0 0 A [ 2 ] ]
C = α , β A [ α , β ] = [ 0 A [ 1 , 2 ] A [ 2 , 1 ] 0 ]
A [ 1 , 2 ] = [ a 1 _ 3 a 1 _ 4 a 1 _ 5 a 2 _ 3 a 2 _ 4 a 2 _ 5 ] = A [ 2 , 1 ] T
A ¯ = [ A [ 1 ] A [ 1 , 2 ] A [ 2 , 1 ] A [ 2 ] ]

2.3. Supra-Laplacian Matrix

The Laplacian matrix corresponding to an adjacency matrix is defined as follows (10):
= D A
where   D = d i a g   ( k 1 ,   ,   k M ) is the array containing the degree index for each layer in the system.
In the case of multilayer systems, the Laplacian matrix is expressed as follows (11):
¯ = D ¯ A ¯
where D ¯ = d i a g   ( K 1 ,   ,   K M ) , is a diagonal matrix that collects the degree index associated with the supra-adjacency matrix A ¯ .
From the Laplacian matrix in the multilayer system ( ¯ ), it is possible to obtain the Laplacian matrices for each graph ( G α ) in the system, as well as the mesostructure represented by the connectivity matrix ( C ) using the following Equations (12) and (13):
[ α ] = D [ α ] A [ α ]
C = D [ C ] C
where D [ C ] = d i a g ( c i [ 1 ] ,     c i [ M ] ) .
From (13), we can define the supra-Laplacian matrix corresponding to a multilayer system ( ) using the following Equation (14):
¯ = α [ α ] + C

2.4. Multilayer Indexes for Vulnerability Assessment

Determining the most important nodes within a complex system, such as a multilayer network, is one of the main challenges in complexity sciences. Within the literature, several indices, known as centrality indexes, have been used to rank node vulnerability in the complete system. The main indexes used in multilayer systems are discussed in the following sections.

2.4.1. Topology-Based Indexes

Indexes related to the adjacency matrix (3) can be used to assess a network’s vulnerability. This group includes the following indices: node degree, closeness, and betweenness.
The node degree index refers to the degree of centrality in a node, which measures the node’s level of connectivity with the remaining nodes in the system (in either single- or multilayer systems). Therefore, a node that is connected to many nodes will have a greater influence on the remaining nodes compared to those that have a smaller number of connections.
The degree of centrality of a node,   i   ( i n α   G α ), in the family of graphs belonging to the complex multilayer system   ( G , C ) , is calculated from the vector k i (15):
k i = ( k i [ 1 ] ,   ,   k i [ M ] )
where k i [ α ] is the degree of centrality of node i in layer   α , calculated according to   k i [ α ] = j a i j [ α ] ,   1 α M . It should be noted that (15) is not sufficient to evaluate the vulnerability of a node within a multilayer system (i.e., in   M ) . Therefore, the overlapping degree (hereafter node degree) is used. This is obtained by adding the information collected using the vector (15) for a node n   , in the following expression (16).
O i = α = 1 M k i [ α ]
The closeness index quantifies a node’s vulnerability according to the shortest distance ( d i j ) between the node and all remaining nodes. In general, the closeness of a node ( n i α ) is calculated using the following Formula (17):
C l o s e n e s s i = 1 N α 1 j = 1 i j N α 1 d i j   i , j   N α
The betweenness index quantifies a node’s relevance by measuring the number of shortest paths from one node to the remaining nodes via the minimum number of links. If the betweenness value is high, this implies that the node is critical since the loss of that node reduces the network’s robustness. The betweenness index of a node ( n i α ) can be calculated using the following Equation (18):
B e t w e e n n e s s i = 1 ( N α 1 ) ( N α 2 ) j , s = 1 i j s N α σ j s ( i ) σ j s   i , j   N α
where σ j s   represents the shortest path between the nodes j   and s , and   σ j s ( i ) is the number of paths containing or passing through the node   i .

2.4.2. Indexes Related to Laplacian Matrix

The centrality of a node   i   ( i n α   G α ), c _ e i g i α , can be expressed by (19) from the spectral characteristics of the Laplacian matrix:
λ c _ e i g i α = j = 1 N α a i j c _ e i g j α
where λ is a constant of proportionality and a i j represents the centrality of the node i as a function of its connection with adjacent nodes (i.e., the adjacency matrix). Expressing (19) in matrix format, the graph   G α is obtained using the following Equation (20):
A [ α ] T C _ e i g = λ C _ e i g
The eigenvector index is obtained from the norm of the eigenvector associated with the largest eigenvalue of [27].
According to the Perron–Frobenius theory, the eigenvalues ( λ ) and eigenvectors ( C _ e i g ) of the Laplacian matrix allow us to obtain the algebraic connectivity and the Fiedler vector represented by the second smallest eigenvalue and its associated eigenvector respectively. These indexes determine the subgraphs into which a network can be divided. Algebraic connectivity identifies the most vulnerable connections, as well as those connections that can lead to a network blackout if a sequence of cascade events is initiated.

3. Cyber-Physical Smart Grid Model

A smart grid is a complex CPS composed of an electrical network and a communications network. Both infrastructures are connected via the devices that link the physical equipment in the OT layer with the ICT devices in the IT layer [28]. Consequently, it is necessary to model each infrastructure (electricity and communication) and the connection between them.

3.1. Model of the OT Layer Corresponding to the Power Network

Electrical networks are usually represented by the adjacency matrix. Using complex network theory, the electrical network is represented by a graph: G P = { N B ,   E B } where, N B is the set of electrical ( n B ) nodes, and E B includes the ( e B ) connections between them. The electrical network adjacency matrix is expressed as follows (21):
A [ B ] = a i j p     n B x n B
where a i j p = 1 if there is an electrical connection between nodes, i , j   { 1 , , n B } , and a i j p = 0 if the nodes are not connected.
Traditional vulnerability analyses [21,23,24] consider only the electrical nodes in the G B network and the connections between them.
It is important to note that smart grids are formed of both electrical and communications infrastructures. Measurement and control equipment are installed in the electrical network, and these are linked to ICT devices (e.g., routers). In a smart grid, the consequences of cyberattacks range from altered measurements and control signals to the disconnection of power network elements, such as generators, lines, and loads. Therefore, a model of an electrical network layer must include not only electrical network elements (generators, loads, lines, and substations) but also measurement and control equipment (merging units, controllers and IEDs), which belong to the OT layer and the OT-IT bridge.
Hence, an electrical model of a smart grid must include the set of electrical nodes in the power network ( N B ) and the set of measurement, protection and control devices corresponding to the OT-IT bridge ( N O T / I T ). The extended electrical network ( N P ) graph consists of   N P = N B   N O T / I T .
Figure 2a shows an example of a three-bus smart grid, in which three generators (bus1, bus2 and bus3) and one load (bus3) are connected. The traditional electrical graph representing the network shown in Figure 2a is composed of three electrical nodes (set N B with n B = 3 ) . However, this smart grid also consists of three controllers, responsible for managing the generators, and a merging unit (MU) in the load that performs measurement tasks. The controllers and MU create set N O T / I T with n O T / I T = 4 . Since the controllers and MUs are devices installed in the electrical infrastructure, they must be incorporated into the extended power grid graph. In this case, the three-bus OT network in Figure 2a is represented by an extended graph ( G P ^ = { N P ,   E P } ) comprising seven nodes ( n P = n B + n O T / I T ;   N P = N B   N O T / I T ) that correspond with the three electrical nodes, the three generator controllers and one load’s MU, as shown in Figure 2b.
The adjacency matrix of the graph corresponding to Figure 2a (set   N B ) is given by A [ B ] (22) and has 3 × 3 ( n B × n B ) dimensions. Incorporating OT-IT bridge elements into an extended model adds four nodes to the system (numbered from 4 to 7 in Figure 2b), which belong to set   N O T / I T . Matrix A [ O T / I T ] (23) represents the connection between the electrical nodes in the traditional network and the OT-IT bridge elements. The dimension of the array is therefore A [ O T / I T ] 3 × 4.
The adjacency matrix corresponding to the extended model A [ P ] (25) (Figure 2b) is obtained from the new set of nodes N P . Matrix A [ P ] has dimension 7 × 7 and is composed of the following subarrays:
  • A [ B ] (22) is the adjacency matrix corresponding to the traditional electrical network (nodes 1 to 3).
  • A [ O T / I T ] (23) is the adjacency matrix representing the connection between the OT elements and OT-IT bridge (nodes 4 to 7), and their transpose (   A [ O T / I T ] T ).
  • A [ b r i d g e ] (24) is the connection matrix among bridge elements in the OT network.
    A [ B ] = [ a 1 _ 1 a 1 _ 2 a 1 _ 3 a 2 _ 1 a 2 _ 2 a 2 _ 3 a 3 _ 1 a 3 _ 2 a 3 _ 3 ]
    A [ O T / I T ] = [ a 1 _ 4 a 1 _ 5 a 1 _ 6 a 1 _ 7 a 2 _ 4 a 2 _ 5 a 2 _ 6 a 2 _ 7 a 3 _ 4 a 3 _ 5 a 3 _ 6 a 3 _ 7 ]
    A [ b r i d g e ] = [ a 4 _ 4 a 4 _ 5 a 4 _ 6 a 7 _ 7 a 5 _ 4 a 5 _ 5 a 5 _ 6 a 7 _ 7 a 5 _ 4 a 5 _ 5 a 6 _ 6 a 7 _ 7 a 5 _ 4 a 5 _ 5 a 5 _ 6 a 7 _ 7 ]
    A [ P ] = [ A [ B ] A [ O T / I T ] A [ O T / I T ] T A [ b r i d g e ] ]

3.2. Model of the IT Layer Corresponding to the Communications Network

In a smart grid, the communication network is represented by a graph ( G C = { N C ,   E C } ), which is composed of nodes and edges. The set of nodes N C (comprising n C   nodes) is formed from the set of routers that belong to the communications infrastructure, and the connections between routers form the set of edges E C .
Figure 3 shows the communications graph corresponding to the ICT infrastructure of the smart grid displayed in Figure 2. In this case, set N C is composed of three nodes ( n C = 3 ) corresponding to the three routers (labelled from 8 to 10). The three routers collect information provided by the IEDs, MUs, and controllers installed in the electrical infrastructure.
The communications graph adjacency matrix A [ C ] (26), has 3 × 3 dimensions and expresses the relationship between the elements of set   N C , which comprises nodes 8 to 10.
A [ C ] = [ a 8 _ 8 a 8 _ 9 a 8 _ 10 a 9 _ 8 a 9 _ 9 a 9 _ 10 a 10 _ 8 a 10 _ 9 a 10 _ 10 ]

3.3. Interconnection Model between Physical Layer (OT) and Cyber Layer (IT)

As a CPS, a smart grid can be represented by a multilayer graph composed of two layers: the physical layer (OT) and the cyber layer (IT). The layers are connected by measurement and control devices installed in the OT layer, which transmit and receive information to and from the IT layer. These devices constitute the OT-IT bridge model in the coupling matrix, according to multilayer complex network theory.
In the CPS, the coupling matrix ( C ^ ) comprises the set of elements ( N P ) in the OT layer, and their connections to the elements in the IT layer ( N C )   (27). As in the adjacency matrix, the coupling matrix element a i j = 1 if a connection exists between nodes i and j and a i j = 0 if there is no connection.
C ^ = [ a 1 8 a 1 9 a 1 10 a 2 8 a 2 9 a 2 10 a 3 8 a 3 9 a 3 10 a 4 8 a 4 9 a 4 10 a 5 8 a 5 9 a 5 10 a 6 8 a 6 9 a 6 10 a 7 8 a 7 9 a 7 10 ]

3.4. Cyber-Physical Smart Grid Model

A smart grid can be modelled holistically using the graph   G S G = { N S G , E S G } , which contains the set of nodes   ( N S G ) belonging to the extended electrical graph ( N P ) and the set of communications graph nodes ( N C ) , that is N S G = N P   N C s. Set E S G comprises the connections between all the nodes in the CPS.
The supra-adjacency matrix ( A ¯ ^ ) represents the complete CPS, which comprises the extended physical layer ( G P ), the cyber layer ( G C ) and the interconnection between layers defined by the coupling matrix ( C ^ ), as observed in the following Equation (28):
A ¯ ^ = [ A [ P ] ^ C ^ C ^ T A [ C ] ]
Figure 4 gives the cyber-physical structure corresponding to the three-bus network illustrated in Figure 2a. In this case, set N S G is composed of ten nodes, seven corresponding to the OT layer ( N P )   and three corresponding to the IT layer ( N C ) . The supra-adjacency matrix has 10 × 10 dimensions, where the A [ P ]   ( 25 ) , A [ C ] ( 26 )   and C ^ (27) matrices correspond with the adjacency matrices of the extended physical layer, the cyber layer, and the connection between them, respectively.
Complex theory based on multilayer networks is especially suitable for analysing vulnerabilities in cyber-physical systems (composed by two heterogeneous interconnected networks) due to the fact that the methodology is very fast, and it is scalable to model heterogeneous smart grids (ITC network, power network and interdependencies between both networks). However, if the power network and ICT network have a great number of nodes and the connectivity between both networks is high, the supra-adjacency matrix employed to represent the interconnected cyber-physical system could achieve large dimensions leading to computational burden problems for analysing the smart grid vulnerability. In those situations, other techniques such as hierarchical modelling [8,11,29] can be used to reduce the complexity of the network by means of clustering algorithms which allows the mathematical dimensionality reduction.

4. Vulnerability Assessment: A Case Study

Using multilayer network theory, the cyber-physical model has been applied to the IEEE 14-bus test case network [30], which includes the communications infrastructure (Figure 5). The multilayer cyber-physical model consists of the electrical network layer (the grey layer in Figure 5), the communications network layer (the green layer in Figure 5) and the OT-IT interconnections between the two layers (dashed lines in Figure 5).
The IEEE 14-bus test case consists of 14 nodes, 18 lines, four generators, three transformers with regulation capacity, and 11 loads. In the cyber-physical model, each generator, transformer, or controllable load has two types of devices: a monitoring device (merging units [MUs], represented as squares in Figure 5) and a control device (controllers [C], represented as triangles in Figure 5). Non-controllable loads only have a monitoring device (MU). This case study considers the loads at nodes 11 and 14 to be fully controllable (i.e., they can receive demand response signals from the network operator).
According to the proposed multilayer network methodology (Section 3.1), the OT set N B is composed of 14 buses in the IEEE 14-bus test case, while the OT-IT bridge has 29 elements corresponding to monitoring and control devices located in the OT network (MUs, IEDs and controllers), which are linked to the IT layer N O T / I T . Finally, the extended electricity network is represented by set N P , which is composed of 43 elements.
The communications network in the IEEE 14-bus test case is modelled using five routers, which centralize the information collected from the monitoring and control equipment located in the OT layer. In this case, the five routers form a ring, as shown in Figure 5, with a total of five nodes that form the whole N C .
In this paper, we consider the IEEE 14-bus test case as a CPS consisting of several interconnected layers. The electricity network is the physical layer (OT) and the communication network is the cyber layer (IT). Both layers are connected by elements in the OT-IT bridge. Table 2 demonstrates the relationships throughout the smart grid (electrical infrastructure, communication infrastructure and the OT-IT bridge).
In the modified IEEE 14-bus test case, supra-adjacency and Laplacian matrices have been obtained using the methodology explained in Section 2.2 and Section 2.3. The connections between elements are given in Figure 5 and Table 2.
It has to be noted that the proposed approach is effective for all attack model studies, as long as the ICT communication attacked components are included in the cyber layer and/or in the interconnection layer (cyber-power). Vulnerability assessment based on complex network can deal with random failure, natural hazard, or intentional attacks. Therefore, it is not necessary to take into consideration the attack model for evaluating the vulnerability of the interconnected cyber-physical system.

4.1. Cyber Physiscal System Vulnerability Analysis

The vulnerability of the cyber-physical IEEE 14-bus test case is determined using the centrality indexes defined in Section 2.4. In this section, considered events could be cyberattacks or failures in the measurement, control and communications devices in the CPS system. The CPS is composed of 48 elements: 14 physical electrical nodes, 29 OT-IT bridge nodes (MUs, controllers and IEDs), and the five routers in the cyber layer.
Figure 6, Figure 7, Figure 8 and Figure 9 show the vulnerability levels of each of the 48 elements in the CPS, which are determined using the following multilayer centrality indices: node degree, closeness, between-ness, and eigenvector. Elements of the OT layer are coloured in green, elements of the OT-IT bridge are highlighted in orange, and elements of the IT network are shaded in grey.
Analysis of the multilayer centrality indexes reveals that the most vulnerable nodes in the CPS correspond to cyber nodes (i.e., routers). Moreover, several hubs are detected in the OT layer, and it can also be noted that OT-IT bridge elements are not as critical as the OT and IT elements.
Table 3 ranks the 10 most vulnerable nodes in the CPS according to each of the centrality indexes. Nodes corresponding to the OT layer are highlighted in grey, and those representing the IT layer are coloured in green. First, it is observed that the most vulnerable elements in the CPS correspond to routers located at nodes 46 and 47 (cyber layer) and nodes 4 and 6 (physical layer).
Table 3 demonstrates that routers at nodes 46 and 47 centralize information from the IEDS, MUs and controllers located at nodes 4, 7, 8, and 9, as well as information from nodes 5, 6, 10, and 11. Hence, an attack on routers placed on nodes 46 and 47 results in a loss of information from 17 OT-IT bridge elements, such as IEDs, MUs and controllers, installed at eight electrical nodes. This analysis highlights the importance of considering smart grid networks as CPSs and not independent systems as previously discussed [3,21].
These results demonstrate that vulnerability assessments must consider the smart grid as a unique cyber-physical system rather than two independent networks. The smart-grid CPS modelled in this paper includes elements of the electrical and communications networks and considers the relationships between them.
Traditional vulnerability methods have identified vulnerabilities in electrical networks [12,13,14,15,16,17,18,19,23,24] rather than consider the network as a CPS, as demonstrated in this paper. When applying traditional methods [12,13,14,15,16,17,18,19,23,24] to the IEEE 14-bus test case, node 4 (electrical network) was found to be the most vulnerable. However, we have demonstrated that disruption to router 46 affects the information collected from electrical nodes 4, 7, 8, and 9. Therefore, a cyberattack on router 46 also represents a vulnerability in the OT network, which has not been detected by the methods described in [12,13,14,15,16,17,18,19,23,24].

4.2. Comparative Vulnerability Analysis

This section determines the most vulnerable nodes in the IEEE 14-bus test case using three different methods: (i) traditional OT model [12,13,14,15,16,17,18,19,23,24], (ii) IT network model, and (iii) the cyber physical system model that we propose in this paper.
Table 4 gives the most vulnerable nodes evaluated using two centrality indices: node degree index and betweenness index. The following conclusions are presented:
  • Traditional OT network model [12,13,14,15,16,17,18,19,23,24]: in this case, the vulnerability analysis only covers the electrical network (nodes 1–14), the most vulnerable node is node 4, which corresponds with a substation.
  • Traditional IT network model [21]: when performing the vulnerability assessment [21] on the communication network (nodes 44–48), all the nodes present the same vulnerability level, indicating that there are no critical routers that could affect the vulnerability of the IT network.
  • Holistic model of the cyber-physical network: if the smart grid is considered as a CPS (nodes 1–48), it is observed that the most vulnerable nodes correspond to routers located at nodes 46 and 47. An attack that places nodes 46 and 47 out of service results in the loss of information and communication with OT nodes 4, 7, 8, and 9 and 5, 6, 10, and 11, respectively. Table 4 demonstrates that according to the node degree index in the CPS model, nodes 46 and 47 are two and five times more vulnerable compared to node 4 (in the traditional OT model) and the IT nodes, respectively. Moreover, the CPS model’s betweenness index determines that the router at node 47 has 303 critical links compared to 25 critical connections for node 4 and 1 connection for the IT nodes. Considering the betweenness index, it can be deduced that the loss of node 47 affects more than twelve times the critical connections of node 4. These results indicate that the cyber-physical network model as a whole, proposed in this paper, is the only model that allows us to identify the most vulnerable nodes in the smart grid as a single entity. Moreover, it enables us to determine the scope of a cyberattack upon routers 46 and 47 (IT) and the resulting implications for the OT layer.
Finally, the four indexes presented in Figure 6, Figure 7, Figure 8 and Figure 9 identify critical hubs in the OT network (nodes 4 and 6) and the IT network (nodes 46 and 47).

5. Conclusions

Vulnerability analysis in power networks has traditionally considered only the electrical infrastructure (OT). However, this representation is no longer valid in the field of smart grids, since the OT and IT heterogeneous networks are interconnected via measurement, control, protection, and communication devices.
In this article, we have proposed a new methodology to identify the most vulnerable elements of smart grids as cyber-physical systems. The smart grid has been modelled holistically using multilayer complex network theory and scale-free graphs, in which the power network (OT) is interconnected with the communication network (IT). The connection between both networks, via measurement, communication, and control devices, has also been considered. The proposed methodology is able to identify the most vulnerable elements in a smart grid CPS, which have been overlooked by traditional vulnerability methods.
Since the proposed CPS model is based on multilayer network theory and scale-free graphs, it is possible to conduct a vulnerability analysis that considers the set of elements that may experience a cyberattack, which could subsequently affect the functioning of smart grids (i.e., the communication and/or electrical infrastructure).
From the results obtained in the vulnerability analysis of traditional OT and IT networks, as well as the smart grid as a CPS, the following observations are presented:
Traditional vulnerability assessments which focus on electrical networks do not detect those IT elements in a smart grid that anticipate a greater loss of robustness as a result of disconnection following a cyberattack.
Multilayer centrality indices allow the detection of vulnerabilities in the smart grid as a single CPS. According to the degree index, the vulnerability of the critical node in the CPS is twice as high as the vulnerability detected using traditional methods. Regarding the betweenness index, the vulnerability of the router located at node 46 is twelve times higher than the vulnerability of the primary substation located at node 4.
Moreover, it has been demonstrated that the multilayer centrality indices are the only indices that measure vulnerability in different heterogeneous and interconnected layers. It has been proved that routers placed at nodes 46 and 47 reveal a vulnerability in the CPS that is five times greater than the vulnerability detected in only the IT networks.
Finally, it should be noted that holistic analysis of the smart grid reveals the existence of critical hubs in both the OT network (nodes 4) and the IT network (nodes 46 and 47).
Given these results, it can be concluded that vulnerability analysis should consider the smart grid as a cyber-physical system rather than two independent (electrical and communication) infrastructures.

Author Contributions

All Authors make substantial contributions to conception, design, analysis and interpretation of results. Authors participate in drafting the article, writing and revising it critically. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Fundación Iberdrola España, within the 2020 research support scholarship program.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Reda, H.T.; Ray, B.; Peidaee, P.; Anwar, A.; Mahmood, A.; Kalam, A.; Islam, N. Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid. Sensors 2021, 21, 1554. [Google Scholar] [CrossRef]
  2. Akbarzadeh, A.; Katsikas, S. Identifying and analyzing dependencies in and among complex cyber physical systems. Sensors 2021, 21, 1685. [Google Scholar] [CrossRef]
  3. Kandaperumal, G.; Srivastava, A.K. Resilience of the electric distribution systems: Concepts, classification, assessment, challenges, and research needs. IET Smart Grid 2019, 3, 133–143. [Google Scholar] [CrossRef]
  4. Abedi, A.; Gaudard, L.; Romerio, F. Power flow-based approaches to assess vulnerability, reliability, and contingency of the power systems: The benefits and limitations. Reliab. Eng. Syst. Saf. 2020, 201, 106961. [Google Scholar] [CrossRef]
  5. Lalou, M.; Tahraoui, M.A.; Kheddouci, H. The critical node detection problem in networks: A survey. Comput. Sci. Rev. 2018, 28, 92–117. [Google Scholar] [CrossRef]
  6. Beyza, J.; Gil, P.; Masera, M.; Yusta, J.M. Security assessment of cross- border electricity interconnections. Reliab. Eng. Syst. Saf. 2020, 201, 106950. [Google Scholar] [CrossRef]
  7. Sperstad, I.B.; Kjølle, G.H.; Gjerde, O. A comprehensive framework for vulnerability analysis of extraordinary events in power systems. Reliab. Eng. Syst. Saf. 2020, 196, 106788. [Google Scholar] [CrossRef]
  8. Abedi, A.; Gaudard, L.; Romerio, F. Review of major approaches to analyze vulnerability in power system. Reliab. Eng. Syst. Saf. 2019, 183, 153–172. [Google Scholar] [CrossRef]
  9. Werho, T.; Vittal, V.; Kolluri, S.; Wong, S.M. Power system connectivity monitoring using a graph theory network flow algorithm. IEEE Trans. Power Syst. 2016, 99, 4945–4952. [Google Scholar] [CrossRef]
  10. Cheng, M.X.; Crow, M.; Ye, Q. A game theory approach to vulnerability analysis: Integrating power flows with topological analysis. Int. J. Electr. Power Energy Syst. 2016, 82, 29–36. [Google Scholar] [CrossRef] [Green Version]
  11. Ferrario, E.; Pedroni, N.; Zio, E. Evaluation of the robustness of critical infrastructures by Hierarchical Graph representation, clustering and Monte Carlo simulation. Reliab. Eng. Syst. Saf. 2016, 155, 78–96. [Google Scholar] [CrossRef] [Green Version]
  12. Dong, X.; Nyberg, T.R.; Hämäläinen, P.; Xiong, G.; Liu, Y.; Hou, J. Vulnerability analysis of smart grid based on complex network theory. In Proceedings of the 5th International Conference on Information Science and Technology (ICIST), Kopaonik, Serbia, 8–11 March 2015; pp. 525–529. [Google Scholar]
  13. Srivastava, A.; Morris, T.; Ernster, T.; Vellaithurai, C.; Pan, S.; Adhikari, U. Modeling cyber-physical vulnerability of the smart grid with incomplete information. IEEE Trans. Smart Grid 2013, 4, 235–244. [Google Scholar] [CrossRef]
  14. Campion, M.; Ranganathan, P. Identification of critical buses based on betweenness-centrality in a smart grid. In Proceedings of the 2017 IEEE Electrical Power and Energy Conference (EPEC), Saskatoon, SK, Canada, 22–25 October 2017; pp. 1–5. [Google Scholar]
  15. Bose, D.; Chanda, C.K.; Chakrabarti, A. Vulnerability assessment of a power transmission network employing complex network theory in a resilience framework. Microsyst. Technol. 2020, 26, 2443–2451. [Google Scholar] [CrossRef]
  16. Zang, T.; Gao, S.; Huang, T.; Wei, X.; Wang, T. Complex network-based transmission network vulnerability assessment using adjacent graphs. IEEE Syst. J. 2020, 14, 572–581. [Google Scholar] [CrossRef]
  17. Bompard, E.; Wu, D.; Xue, F. Structural vulnerability of power systems: A topological approach. Electr. Power Syst. Res. 2011, 81, 1334–1340. [Google Scholar] [CrossRef]
  18. Chen, X.; Sun, K.; Cao, Y.; Wang, S. Identification of vulnerable lines in power grid based on complex network theory. In Proceedings of the 2007 IEEE Power Engineering Society General Meeting, Tampa, FL, USA, 24–28 June 2007; pp. 1–6. [Google Scholar]
  19. Beyza, J.; Yusta, J.M.; Correa, G.J.; Ruiz, H.F. Vulnerability assessment of a large electrical grid by new graph theory approach. IEEE Lat. Am. Trans. 2018, 16, 527–535. [Google Scholar] [CrossRef] [Green Version]
  20. Yu, E.-Y.; Wang, Y.-P.; Fu, Y.; Chen, D.-B.; Xie, M. Identifying critical nodes in complex networks via graph convolutional networks. Knowl. Based Syst. 2020, 198, 105893. [Google Scholar] [CrossRef]
  21. Milanović, J.V.; Zhu, W. Modeling of interconnected critical infrastructure systems using complex network theory. IEEE Trans. Smart Grid 2018, 9, 4637–4648. [Google Scholar] [CrossRef]
  22. Boccaletti, S.; Bianconi, G.; Criado, R.; del Genio, C.L.; Gómez-Gardeñes, J.; Romance, M.; Sendiña-Nadal, I.; Wang, Z.; Zanin, M. The structure and dynamics of multilayer networks. Phys. Rep. 2014, 544, 1–122. [Google Scholar] [CrossRef] [Green Version]
  23. Shahpari, A.; Khansari, M.; Moeini, A. Vulnerability analysis of power grid with the network science approach based on actual grid characteristics: A case study in Iran. Phys. A Stat. Mech. Appl. 2019, 513, 14–21. [Google Scholar] [CrossRef]
  24. Cetinay, H.; Devriendt, K.; Van Mieghem, P. Nodal vulnerability to targeted attacks in power grids. Appl. Netw. Sci. 2018, 3, 34. [Google Scholar] [CrossRef] [PubMed]
  25. Sperstad, I.B.; Solvang, E.H.; Jakobsen, S.H. A graph-based modelling framework for vulnerability analysis of critical sequences of events in power systems. Int. J. Electr. Power Energy Syst. 2021, 125, 106408. [Google Scholar] [CrossRef]
  26. Kivelä, M.; Arenas, A.; Barthelemy, M.; Gleeson, J.P.; Moreno, Y.; Porter, M.A. Multilayer networks. J. Complex Netw. 2014, 2, 203–271. [Google Scholar] [CrossRef] [Green Version]
  27. Abedi, A.; Hesamzadeh, M.R.; Romerio, F. An ACOPF-based bilevel optimization approach for vulnerability assessment of a power system. Int. J. Electr. Power Energy Syst. 2021, 125, 106455. [Google Scholar] [CrossRef]
  28. Umar, S.; Felemban, M. Rule-based detection of false data injections attacks against optimal power flow in power systems. Sensors 2021, 21, 2478. [Google Scholar] [CrossRef]
  29. Nguyen, T.A.; Min, D.; Choi, E.; Lee, J.-W. Dependability and security quantification of an internet of medical things infrastructure based on cloud-fog-edge continuum for healthcare monitoring using hierarchical models. IEEE Internet Things J. 2021. [Google Scholar] [CrossRef]
  30. IEEE 14 Buses Test System. Available online: https://icseg.iti.illinois.edu/ieee-14-bus-system/ (accessed on 16 June 2021).
Figure 1. An example of a basic OT-IT multilayer system.
Figure 1. An example of a basic OT-IT multilayer system.
Sensors 21 05826 g001
Figure 2. Three-bus smart grid representation with (a) electrical nodes and (b) electrical and OT-IT nodes.
Figure 2. Three-bus smart grid representation with (a) electrical nodes and (b) electrical and OT-IT nodes.
Sensors 21 05826 g002
Figure 3. A three-buses communication network.
Figure 3. A three-buses communication network.
Sensors 21 05826 g003
Figure 4. A three-buses cyber-physical network representation.
Figure 4. A three-buses cyber-physical network representation.
Sensors 21 05826 g004
Figure 5. A cyber-physical representation of the modified IEEE 14-bus test case.
Figure 5. A cyber-physical representation of the modified IEEE 14-bus test case.
Sensors 21 05826 g005
Figure 6. Node degree vulnerability values of the cyber-physical IEEE 14-bus test case.
Figure 6. Node degree vulnerability values of the cyber-physical IEEE 14-bus test case.
Sensors 21 05826 g006
Figure 7. Betweenness vulnerability values of the cyber-physical IEEE 14-bus test case.
Figure 7. Betweenness vulnerability values of the cyber-physical IEEE 14-bus test case.
Sensors 21 05826 g007
Figure 8. Closeness vulnerability values of the cyber-physical IEEE 14-bus test case.
Figure 8. Closeness vulnerability values of the cyber-physical IEEE 14-bus test case.
Sensors 21 05826 g008
Figure 9. Eigenvector vulnerability values of the cyber-physical IEEE 14-bus test case.
Figure 9. Eigenvector vulnerability values of the cyber-physical IEEE 14-bus test case.
Sensors 21 05826 g009
Table 1. Comparison table of related work with the proposed method in this paper.
Table 1. Comparison table of related work with the proposed method in this paper.
[12][13][14][12][16][17][18][19][21]Our Proposal
Network
vulnerability
Power network
ICT network
ICT components
Power-ICT
interconnection
Complex networkTheoryMultilayer network
Centrality indexesMultilayer
Table 2. Node connection in the OT (power)-IT (ICT) smart grid for the IEEE 14-bus test case.
Table 2. Node connection in the OT (power)-IT (ICT) smart grid for the IEEE 14-bus test case.
Electrical NodesOT-IT Bridge Nodes (Merging Units, Controllers, and IEDs)Routers NodesElectrical NodesOT-IT Bridge Nodes (Merging Units,
Controllers, and IEDs)
Routers Nodes
115–1644832–3346
217–1944934–3646
320–2245103747
423461138–3948
52447124048
625–2947134148
730–31461442–4348
Table 3. Ranked list of vulnerable cyber-physical nodes.
Table 3. Ranked list of vulnerable cyber-physical nodes.
Vulnerable Cyber-Physical Nodes
Degree IndexCloseness IndexBetweenness IndexEigenvector Index
146484647
2646486
347474746
4444444
54844452
62545
7945648
849544
93299
105627
Table 4. Comparison of node vulnerability between models.
Table 4. Comparison of node vulnerability between models.
NetworkModel and Node RangeNode VulnerabilityNode Degree Index Value (Node Connections)Betweenness Index Value (Paths)
OTTraditional power network [12,13,14,15,16,17,18,19,23,24]: {nodes: 1–14}4525
ITTraditional communication network [21]: {nodes: 44–48} 44–4821
OT-ITCyber physical system as a whole: {nodes: 1–48}46, 4710303
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alonso, M.; Turanzas, J.; Amaris, H.; Ledo, A.T. Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks. Sensors 2021, 21, 5826. https://doi.org/10.3390/s21175826

AMA Style

Alonso M, Turanzas J, Amaris H, Ledo AT. Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks. Sensors. 2021; 21(17):5826. https://doi.org/10.3390/s21175826

Chicago/Turabian Style

Alonso, Monica, Jaime Turanzas, Hortensia Amaris, and Angel T. Ledo. 2021. "Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks" Sensors 21, no. 17: 5826. https://doi.org/10.3390/s21175826

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop