Investigating the Vulnerabilities of the Direct Transfer Trip Scheme for Network Protector Units in the Secondary Networks of Electric Power Distribution Grids
Abstract
1. Introduction
- Although the communication-assisted protection of secondary networks has been addressed and utilized, its vulnerability to the communication network disruption is not evaluated in the literature. This paper bridges this gap by evaluating the cyber security of an NPU in the presence of a communication-assisted scheme and provides a list of suggestions for mitigating the impacts.
- This paper investigates the impact of DOS and packet modification (an example of a False Data Injection attack) cyberattacks on the communication-assisted logic of NPUs using a co-simulation hardware-in-the-loop (HIL) testbed that includes both real-time power system and communication network digital simulators.
2. NPU Logic
2.1. Conventional Local NPU’s Trip Logic
2.2. Conventional Local NPU’s Reclose Logic
2.3. Communication-Assisted NPU Logic
3. Vulnerabilities of Communication-Assisted NPU Logic
3.1. Packet Modification Attack
3.2. DOS Attacks
4. HIL Testbed for the Co-Emulation of Power System and Communication Network
5. Experimental Results
- Scenario A1: No fault, no cyberattack.
- Scenario A2: No fault, with packet modification attack.
- Scenario A3: With Single Line to Ground (SLG) fault, no cyberattack.
- Scenario A4: With SLG fault, with packet modification attack.
- Scenario A5: With Three Phase (3PH) fault, no cyberattack.
- Scenario A6: With 3PH fault, with packet modification attack.
- Scenario B1: IP fragmentation attack.
- Scenario B2: TCP SYN attack.
5.1. HIL Test Results for Packet Modification Attack on DTT Signal
5.1.1. Scenario A1: No Fault, No Cyberattack
5.1.2. Scenario A2: No Fault, with Packet Modification Attack
5.1.3. Scenario A3: With SLG Fault, No Cyberattack
5.1.4. Scenario A4: With SLG Fault, with Packet Modification Attack
5.1.5. Scenario A5: With 3PH Fault, No Cyberattack
5.1.6. Scenario A6: With 3PH Fault, with Packet Modification Attack
5.2. HIL Test Results for DOS Attack
5.2.1. Scenario B1: IP Fragmentation Attack Results
5.2.2. Scenario B2: TCP SYN Attack Results
5.3. Scenario C: Multiple Attack Scenario
6. Conclusions and Summary of Observations
Recommendations to Improve the Reliability of the Communication-Assisted NPU Protection
- As an important mitigative action to reduce the impact of cyberattacks, it is recommended that NPUs utilize conventional local trip and reclose logic algorithms in addition to the communication-assisted logic to ensure a reliable operation if the communication-assisted logic is compromised by a cyberattack. Accommodating the conventional local protection logic in the NPU will significantly help with the continuous operation of the NPU under loss of communication. However, the settings of the trip and reclose logic should be desensitized to accommodate the DER presence.
- For the SLG faults, under some circumstances, the conventional local trip logic may fail to detect these faults, which prevents the operation of the NPU if the DTT signal from the upstream protection relay is lost or corrupted. The fault currents going through NPUs under an SLG fault when the service transformer has a delta winding on the primary system side are minimal, resulting in no damage to the equipment.
- Since NPUs prioritize the DTT signal over the conventional local trip logic, when there is no fault in the primary system, the packet modification attack results in false tripping of the NPU’s breaker. In this case, since one of the service transformers in a spot network is down, the other service transformer carries the whole load. The rating of service transformers in spot networks should be based on the total load in that spot network, so the packet modification attack in this case does not overload the active service transformer.
- The packet modification attack can also try to deceive the NPU to reclose on a live fault by corrupting the reclose signal. However, the conventional local reclose logic can act effectively and avoid the reclosure of the NPU’s breaker.
- In some cases, by overwhelming the target, the DOS attack may exhaust critical resources such as CPU, memory, and the network bandwidth. Under these circumstances, the DOS attack’s impact can be more critical than the packet modification attack in which the whole NPU’s CPU and memory can be exhausted, which also renders the local conventional trip and reclose logic algorithms ineffective. Under these circumstances, the following actions are suggested as mitigative and preventive measures: (i) The redundancy of the critical resources will significantly help with the mitigation of the impact of the DOS attack. (ii) The attack surface should be reduced by closing unused ports on relays and NPUs, segmenting networks, and implementing strong access control lists. (iii) The bandwidth should be increased to ensure sufficient bandwidth and server resources to absorb traffic surges during an attack. (iv) Rate limiting should be used to restrict the number of requests from a single source within a specific timeframe, preventing attackers from overwhelming resources. (v) The network traffic should be monitored for suspicious patterns and automatically block malicious activity.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
NPUs | Network Protector Units |
HIL | Hardware In the Loop |
DERs | Distributed Energy Resources |
DTT | Direct Transfer Trip |
IEDs | Intelligent Electronic Devices |
DOS | Denial-of-Service |
TCP SYN | Transmission Control Protocol Synchronization |
MTU | Maximum Transmission Unit |
RP | Raspberry Pi |
References
- Hincapie I., R.A.; Gallego R., R.A.; Mantovani, J.R. A decomposition approach for integrated planning of primary and secondary distribution networks considering distributed generation. Int. J. Electr. Power Energy Syst. 2019, 106, 146–157. [Google Scholar] [CrossRef]
- Montano-Martinez, K.; Thakar, S.; Ma, S.; Soltani, Z.; Vittal, V.; Khorsand, M.; Ayyanar, R.; Rojas, C. Detailed primary and secondary distribution system model enhancement using AMI data. IEEE Open Access J. Power Energy 2021, 9, 2–15. [Google Scholar] [CrossRef]
- IEEE Std 1547.6-2011; Recommended Practice for Interconnecting Distributed Resources with Electric Power Systems Distribution Secondary Networks. IEEE: Piscataway, NJ, USA, 2011.
- IEEEC37.108-2021; Guide for Protection of Secondary Network Systems. IEEE: Piscataway, NJ, USA, 2021.
- Ropp, M.E.; Reno, M.J.; Bower, W.; Reilly, J.; Venkata, S. Secondary Networks and Protection: Implications for der and Microgrid Interconnection; Technical Report; Sandia National Lab.(SNL-NM): Albuquerque, NM, USA, 2020.
- IEEEC57.12.44-2014; Standard Requirements for Secondary Network Protectors. IEEE: Piscataway, NJ, USA, 2014.
- Smith, D.R.; Faulkner, M.A. Network Protector Control for Spot Network Fed from Feeder Sources Having Voltage Differences. US Patent 10,096,991, 9 October 2018. [Google Scholar]
- Mohammadi, P.; Mehraeen, S. Challenges of PV integration in low-voltage secondary networks. IEEE Trans. Power Deliv. 2016, 32, 525–535. [Google Scholar] [CrossRef]
- Cheng, Z.; Udren, E.; Holbach, J.; Reno, M.J.; Ropp, M.E. Protection and Control Challenges of Low-Voltage Networks with High Distributed Energy Resources Penetration-Part 1: Utility Workshop and Low-Voltage Network Modeling. In Proceedings of the 2023 76th Annual Conference for Protective Relay Engineers (CFPR), College Station, TX, USA, 27–30 March 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–15. [Google Scholar]
- Azzolini, J.A.; Ropp, M.E.; Reno, M.J. Options for Upgrading Low-Voltage Spot Network Protection to Increase DER Interconnection Capacity; Technical Report; Sandia National Lab.(SNL-NM): Albuquerque, NM, USA, 2024.
- Joshi, M.; Snow, M.; Bidram, A.; Reno, M.J.; Ropp, M.; Azzolini, J.A. Hardware-in-the-Loop Testing of Direct Transfer Trip for Network Protector Units in the Presence of Distributed Energy Resources. In Proceedings of the 2024 56th North American Power Symposium (NAPS), El Paso, TX, USA, 13–15 October 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–6. [Google Scholar]
- SEHGAL-SIDHU, P.; APUZZO, M. Integrating Distributed Energy Resources into ENMAX’s Secondary Network System. In Proceedings of the 2022 CIGRE Canada Conference & Expo, Calgary, AB, Canada, 31 October–2 November 2022; CIGRE: Paris, France, 2022; pp. 1–9. [Google Scholar]
- Huseinović, A.; Mrdović, S.; Bicakci, K.; Uludag, S. A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access 2020, 8, 177447–177470. [Google Scholar] [CrossRef]
- Ortega-Fernandez, I.; Liberati, F. A review of denial of service attack and mitigation in the smart grid using reinforcement learning. Energies 2023, 16, 635. [Google Scholar] [CrossRef]
- Hussain, S.; Iqbal, A.; Hussain, S.S.; Zanero, S.; Shikfa, A.; Ragaini, E.; Khan, I.; Alammari, R. A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids. Sci. Rep. 2023, 13, 1857. [Google Scholar] [CrossRef] [PubMed]
- Takiddin, A.; Atat, R.; Ismail, M.; Boyaci, O.; Davis, K.R.; Serpedin, E. Generalized graph neural network-based detection of false data injection attacks in smart grids. IEEE Trans. Emerg. Top. Comput. Intell. 2023, 7, 618–630. [Google Scholar] [CrossRef]
- Mahmood, H.; Mahmood, D.; Shaheen, Q.; Akhtar, R.; Changda, W. S-DPs: An SDN-Based DDoS Protection System for Smart Grids. Secur. Commun. Netw. 2021, 2021, 6629098. [Google Scholar] [CrossRef]
- Alyami, S.; Alharbi, R.; Azzedin, F. Fragmentation attacks and countermeasures on 6LoWPAN Internet of Things networks: Survey and simulation. Sensors 2022, 22, 9825. [Google Scholar] [CrossRef] [PubMed]
- Opal-RT. Cyber-Physical Simulation Testbed for Power Systems; Opal-RT: Montreal, QC, Canada, 2025. [Google Scholar]
- Keysight. EXata Network Modeling—Critical Infrastructure; Keysight: Singapore, 2025. [Google Scholar]
Substation Transformer | |
---|---|
Primary: Delta, 230 kV | Secondary: Grounded Y, 13.8 kV |
R = 85.69 mΩ | L = 2.273 mH |
Primary Feeder Voltage and Frequency | |
V = 13.8 kV | f = 60 Hz |
Lines | |
Zero Seq. | Positive Seq. |
R = 295.22 mΩ/km | R = 17.815 mΩ/km |
L = 2.758 mH/km | L = 832.593 μH/km |
C = 6.405 nF/km | C = 9.697 nF/km |
Service Transformers | |
Primary: Delta, 13.8 kV | Secondary: Grounded Y, 208 V |
R = 216 μΩ | L = 5.73 μH |
DER Size | |
S = 180 kVA | Maximum Current = 500 A |
Load | |
P = 150 kW | Q = 15 kVAr |
Event | No Fault | SLG Fault | 3PH Fault | |||
---|---|---|---|---|---|---|
Cyberattack | Packet Modification | DOS | Packet Modification | DOS | Packet Modification | DOS |
Impact | Impacted NPU trips mistakenly and the other service transform carries the whole load. | For IP fragmentation attack: The target NPU’s Modbus communication fails and NPU should rely on its conventional local protection. For TCP SYN attack: The SEL 751 relay will be impacted. NPU should rely on its conventional local protection. | Impacted NPU may trip mistakenly based on corrupted DTT because the conventional local protection of the NPU may not detect the SLG fault. | For IP fragmentation attack: The target NPU’s Modbus communication fails and NPU should rely on its conventional local protection. For TCP SYN attack: The SEL 751 relay will be impacted. NPU should rely on its conventional local protection. | Even with the corrupted DTT signal, the NPU’s conventional local protection detects the fault and trips. | For IP fragmentation attack: The target NPU’s Modbus communication fails and NPU should rely on its conventional local protection. For TCP SYN attack: The SEL 751 relay will be impacted. NPU should rely on its conventional local protection. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Joshi, M.; Snow, M.; Bidram, A.; Reno, M.J.; Azzolini, J.A. Investigating the Vulnerabilities of the Direct Transfer Trip Scheme for Network Protector Units in the Secondary Networks of Electric Power Distribution Grids. Energies 2025, 18, 4691. https://doi.org/10.3390/en18174691
Joshi M, Snow M, Bidram A, Reno MJ, Azzolini JA. Investigating the Vulnerabilities of the Direct Transfer Trip Scheme for Network Protector Units in the Secondary Networks of Electric Power Distribution Grids. Energies. 2025; 18(17):4691. https://doi.org/10.3390/en18174691
Chicago/Turabian StyleJoshi, Milan, Mckayla Snow, Ali Bidram, Matthew J. Reno, and Joseph A. Azzolini. 2025. "Investigating the Vulnerabilities of the Direct Transfer Trip Scheme for Network Protector Units in the Secondary Networks of Electric Power Distribution Grids" Energies 18, no. 17: 4691. https://doi.org/10.3390/en18174691
APA StyleJoshi, M., Snow, M., Bidram, A., Reno, M. J., & Azzolini, J. A. (2025). Investigating the Vulnerabilities of the Direct Transfer Trip Scheme for Network Protector Units in the Secondary Networks of Electric Power Distribution Grids. Energies, 18(17), 4691. https://doi.org/10.3390/en18174691