Research on Hardware-in-the-Loop Test Platform Based on Simulated IED and Man-in-the-Middle Attack
Abstract
1. Introduction
- ◆
- A HIL test platform based on a simulated IED and man-in-the-middle attack is proposed. The existing communication architecture of a given substation is created using the built-in software of IEC61850 protocol. The communication delay, data transmission accuracy, and network security vulnerabilities of GOOSE message, SV messages of IEC61850 standard, and general IEDs of MMS server protocol are analyzed;
- ◆
- By creating three different scenarios to study the protection logic of short-circuit current protection, overload protection, and network imbalance test, scenario 1 introduces microgrid fault isolation, and the time delay for the physical IED to send and receive goose messages is obtained. Scenario 2 introduces the simulated IED, analyzes the protection mechanism behavior of the simulated IED under overload and unbalanced current faults, and compares and analyzes the real performance of the simulated IED and the physical IED. Scenario 3 introduces MITM network attack in the distributed energy system and judges the effectiveness between the test platforms according to the EVCS fault isolation.
2. Smart Grid CPS Business
3. Test Bench Scene Construction
3.1. Scenario 1
- (1)
- Segmented line fault handling: When a fault occurs in segment line L5, only IED41 and IED32 corresponding to CB41 and CB32 will detect the short-circuit current and respond to the short-circuit fault, issuing a trip command for instantaneous short-circuit protection. CB41 and CB32 will activate the fault removal logic and fault isolation logic, respectively, to trip. Meanwhile, CB31 and CB33 are still in the closed position, and busbar 3 will be isolated from the power grid next to the faulty line, resulting in unnecessary power outages (load 3 is not powered). To address this issue, IEDs are pre-programmed to exchange protection and interlock GOOSE messages for isolating only areas where power grid faults occur. IED22 receives the interlock GOOSE message from IED32, confirms that the status of the contact switch CB22 is in the open position, sends a closing signal to prompt CB22 to close, and supplies power to bus 3 through bus 2, ensuring seamless power supply in the shortest possible interruption time.
- (2)
- Load feeder fault: When the load feeder3 fails, the load feeder circuit breaker CB33 cuts off the fault, but there is no need to trigger the “fault isolation successful” GOOSE signal, so the contact switch CB22 does not close.
- (3)
- Abnormal switch failure: L5 malfunctioned, CB32 and CB41 switches failed and refused to trip, adjacent switch CB42 cut off the fault, adjacent switches CB31 and CB33 isolated the fault, CB31 triggered the “fault isolation successful” GOOSE signal, and the contact switch CB22 started the power supply recovery logic closing to complete the power supply and restoration.
- (4)
- GOOSE communication anomaly: BUS3 has malfunctioned, the network cable connecting CB33 to the switch has malfunctioned, and there are communication anomalies between CB31 and CB33, as well as between CB32 and CB33. GOOSE communication anomaly fault removal (overcurrent protection) and isolation logic (voltage loss protection) should be activated. CB32 overcurrent protection action, CB31 and CB33 voltage loss protection action. The contact switch CB22 starts the power supply recovery logic and completes the transfer and restoration of power.
3.2. Scenario 2
3.3. Scenario 3
4. Numerical Study
4.1. Scenario 1 Simulation Analysis
4.2. Scenario 2 Simulation Analysis
4.3. Scenario 3 Simulation Analysis
5. Conclusions
- (1)
- A HIL real-time test platform is built to study the implementation logic of power system protection, and three different scenarios are proposed to help analyze the communication delay, data transmission accuracy and network security vulnerabilities of the analog IED equipped with IEC61850 standard GOOSE message, SV message and MMS server protocol.
- (2)
- Scenario 1 represents microgrid fault isolation, and the time delay of sending and receiving goose messages by physical IED is solved. In scenario 2, the simulated IED is introduced to discuss the protection mechanism behavior of the simulated IED under overload and unbalanced current faults. It is verified that the simulated IED can completely replace the physical IED, and the performance of the two is equivalent. Scenario 3 introduces MITM network attack into distributed energy system, which can accurately isolate EVCS faults. In the 24 h stability operation test and the test of three typical fault scenarios, the simulated IED can achieve 100% of the protocol consistency passing rate, which is completely consistent with the protection action decision of the physical IED, the end-to-end delay is less than 4 ms, and the measurement accuracy matches the accuracy level of the physical IED 0.5, which verifies that the proposed test platform can effectively guide the debugging of intelligent substation.
- (3)
- In the future, the automation protection mechanism and new energy construction of smart substations will lead to more complex and changeable power grids. The next research can expand the platform to the actual distribution network or introduce more network attack scenarios and put forward the corresponding detection methods and coping strategies.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Hu, P.; Li, L.; Zhang, B.; Wang, L.; Wu, B.; Chen, F. Influence analysis of interactive cascading failures in smart grid. Smart Power 2021, 49, 69–76. [Google Scholar]
- Wang, S.; Shi, L.; Gu, R. Evaluation of primary equipment operation state in smart grid based on TOPSIS. Distrib. Util. 2021, 38, 56–60. [Google Scholar] [CrossRef]
- Deng, M. Key technologies of power big data for smart grid application. Sci. Technol. Innov. 2022, 1, 7–9+12. [Google Scholar] [CrossRef]
- Hou, Y.; Xu, X.; Wang, Y.; Zheng, Y.; Hu, W.; Liu, G. Devolopment of a novel on-site tester for AC charging spot. Electr. Meas. Instrum. 2021, 58, 190–195. [Google Scholar] [CrossRef]
- Deng, J.; Jiang, F.; Tu, C. Study of NIST’s interoperable smart grid technology architecture. Power Syst. Prot. Control 2020, 48, 9–21. [Google Scholar] [CrossRef]
- Liu, R.; Li, X.; Du, J.; Lu, Y.; Ding, Y. Integrated marketing, distribution and dispatching modeling method based on smart grid architecture model. Electr. Power Inf. Commun. Technol. 2022, 20, 18–25. [Google Scholar] [CrossRef]
- Zhu, Y. Gommunication network analysis of intelligent substation based on IEC61850. Autom. Appl. 2022, 91–93. [Google Scholar] [CrossRef]
- Sun, Y.; Tu, Q.; Zhao, Z.; Huang, Z.; Zhao, Y.; Li, K. Intelligent transmission technology of fault information in a resilient distribution network based on 5G and IEC61850. Power Syst. Prot. Control 2022, 50, 108–117. [Google Scholar] [CrossRef]
- Yang, H.; Xu, H.; Zhang, J. Stability analysis of cyber-physical systems based on predictive control under denial of service attacks with incomplete information. Inf. Control 2018, 47, 75–80+89. [Google Scholar] [CrossRef]
- Ruan, L.; Shen, Y.; Wang, Z.; Li, G. Application of role-based access control in cyber security of substation. Zhejiang Electr. Power 2022, 41, 86–93. [Google Scholar] [CrossRef]
- Stiawan, D.; Suprapto, B.Y.; Setiawan, H.; Arifin, M.A.S. Introduction to GOOSE Data Communication Attack Traffic Pattern in IEC 61850. In Proceedings of the 2024 11th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia, 26–27 September 2024; pp. 256–261. [Google Scholar] [CrossRef]
- Bhattacharya, S.; Saqib, N.; Govindarasu, M. ML-based Anomaly Detection System for IEC 61850 Communication in Substations. In Proceedings of the 2024 IEEE Power & Energy Society General Meeting (PESGM), Seattle, WA, USA, 21–25 July 2024; pp. 1–5. [Google Scholar] [CrossRef]
- Albarakati, A.; Robillard, C.; Karanfil, M.; Kassouf, M.; Debbabi, M.; Youssef, A. Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Inform. 2022, 18, 1641–1653. [Google Scholar] [CrossRef]
- Boeding, M.; Hempel, M.; Sharif, H.; Lopez, J.; Perumalla, K. A Testbed for Evaluating Performance and Cybersecurity Implications of IEC-61850 GOOSE Hardware Implementations. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Wang, M.; Wang, Y.; Deng, L. Research on Communication Security of Photovoltaic Power Generation System IEC 61850. J. Shanghai Univ. Electr. Power 2022, 38, 48–55. [Google Scholar]
- DL/T 860.6-2012; Communication Networks and Systems for Power Utility Automation—Part 6: Configuration Descriptive Language for Communication in Electrical Substation Related to IEDs. National Energy Administration: Beijing, China, 2012.
- Yan, H. Research on On-Line Monitoring of Equipment in Coal Mine Intelligent Substation. Ph.D. Thesis, Xi’an University of Science and Technology, Xi’an, China, 2021. [Google Scholar] [CrossRef]
- Liu, G.; Wang, X.; Huang, J.; Wan, X.; Wang, K. Analysis of performance for information of distribution network automation under different transmission protocols. Electr. Meas. Instrum. 2020, 57, 99–105+146. [Google Scholar] [CrossRef]
- Yang, X.; Lei, L. Design of fusion communication system for substation based on IEC61850. Mach. Electron. 2021, 39, 28–31+36. [Google Scholar]
- Wang, S.; Chen, Z.; Chen, M. Discussion on configuration file free technology of relay protection in smart substation. Zhejiang Electr. Power 2021, 40, 65–71. [Google Scholar] [CrossRef]
- Hopkinson, K.; Wang, X.; Giovanini, R.; Thorp, J.; Birman, K.; Coury, D. EPOCHS: A platform for agent-based electric power and communication simulation built from commercial off-the-shelf components. IEEE Trans. Power Syst. 2006, 21, 548–558. [Google Scholar] [CrossRef]
- Sun, Z.; Zhao, J.; Zhuang, J.; Cai, G. Research on simulation platform of cyber-physical power system based on OPC. Proc. CSU-EPSA 2022, 34, 70–78. [Google Scholar] [CrossRef]
- Wang, Z.; Qi, D.; Mei, J.; Li, Z.; Wan, K.; Zhang, J. Real-time controller hardware-in-the-loop co-simulation testbed for cooperative control strategy for cyber-physical power system. Glob. Energy Interconnect. 2021, 4, 214–224. [Google Scholar] [CrossRef]
- Lu, D.; Zhang, Q.; Li, H.; Xiao, J. Time delay prediction and compensation based on mathematical model in hardware-in-loop simulation. Power Electron. 2020, 54, 30–35. [Google Scholar]
- Jamborsalamati, P.; Sadu, A.; Ponci, F.; Monti, A. A flexible HiL testing platform for performance evaluation of IEC 61850-based protection schemes. In Proceedings of the Power and Energy Society General Meeting, Boston, MA, USA, 17–21 July 2016. [Google Scholar] [CrossRef]
- Li, Z. Vulnerability Analysis and Countermeasures of Power CPS Under False Data Attack. Ph.D. Thesis, Xi’an University of Science and Technology, Xi’an, China, 2022. [Google Scholar] [CrossRef]
- Zhu, B.; Guo, Y.; Guo, C.; Jiang, Z.; Zhang, X.Y. A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat. Power Syst. Prot. Control 2021, 49, 178–187. [Google Scholar] [CrossRef]
- Rajkumar, V.S.; Tealane, M.; Ştefanov, A.; Palensky, P. Cyber Attacks on Protective Relays in Digital Substations and Impact Analysis. In Proceedings of the 2020 8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, Sydney, NSW, Australia, 21 April 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Sun, P.; Liu, K.; Qi, D. Cyber security simulation based on real-time simulation platform of cyber physical power system. Electr. Power Constr. 2020, 41, 40–46. [Google Scholar]
- Song, G.; Huang, S.; Zhang, L.; Hu, B.; Zhao, J.; Wang, Z.; Su, J. Hardware-in-the-loop simulation platform of distribution system based on RTDS and PLC. Exp. Technol. Manag. 2023, 40, 157–161+177. [Google Scholar] [CrossRef]
- Chen, K.; Feng, L.; Jia, L.Z.; Guojie, M.G. Design of digital/physical hybrid simulation platform for photovoltaic grid-connected system based on RTDS. Power Syst. Prot. Control 2014, 42, 42–48. [Google Scholar]
- Yang, L.; Cao, X.; Zhou, Y.; Lin, Z.; Zhou, J.; Guan, X.; Wu, Q. Frequency-Constrained Coordinated Scheduling for Asynchronous AC Systems under Uncertainty via Distributional Robustness. IEEE Trans. Netw. Sci. Eng. 2025, 1–18. [Google Scholar] [CrossRef]
- Yuan, J. Research on Modeling of Power Electronics Hardware in the Loop Simulation System and FPGA Resource Optimization Method. Ph.D. Thesis, Beijing Jiaotong University, Beijing, China, 2019. [Google Scholar] [CrossRef]
- Kumar, K.; Saini, P.; Prakash, A.; Al Jaafari, K.; Zeineldin, H.H. Real-time cyber-physical co-simulation for resilient wide-area damping control against FDIAs and communication disruptions. IEEE Trans. Ind. Appl. 2025, 1–15. [Google Scholar] [CrossRef]
- Hemmati, M.; Palahalli, H.; Gruosso, G.; Grillo, S. Interoperability analysis of IEC61850 protocol using an emulated IED in a HIL microgrid testbed. In Proceedings of the 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aachen, Germany, 25–28 October 2021; pp. 152–157. [Google Scholar] [CrossRef]
- Zhang, Y.; Llic, M.; Prica, M.; Tonguz, O. Imbedding smart relays in large electric power networks: The scalability problem and a possible solution. In Proceedings of the 2006 38th North American Power Symposium, Carbondale, IL, USA, 17–19 September 2006; pp. 457–464. [Google Scholar] [CrossRef]
- Wu, W.; Shen, W.; Xu, B. A survey review on integrated safety and security risk analysis of power cyber-physical system. Electr. Meas. Instrum. 2020, 57, 51–59. [Google Scholar] [CrossRef]
- Zheng, P. Theoretical architecture and typical scenario applications of cyber physical systems in the distribution network. Electr. Power 2019, 52, 10–16+31. [Google Scholar]
- Aljohani, T.; Almutairi, A. Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations. Ain Shams Eng. J. 2024, 15, 102860. [Google Scholar] [CrossRef]
- Almufleh, F.; Mulla, M.; Alotaibi, K.; Rob, R. Deploying evolution algorithm to secure data of electrical power state estimation from false data injection attack scenario. In Proceedings of the 2023 Saudi Arabia Smart Grid (SASG), Riyadh, Saudi Arabia, 18–20 December 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Tian, M.; Cui, M.; Dong, Z.; Wang, X.; Yin, S.; Zhao, L. Multilevel programming-based coordinated cyber physical attacks and countermeasures in smart grid. IEEE Access 2019, 7, 9836–9847. [Google Scholar] [CrossRef]
- Jena, S.; Padhy, N.P.; Guerrero, J.M. Multi-layered coordinated countermeasures for DC microgrid clusters under man in the middle attack. IEEE Trans. Ind. Appl. 2024, 60, 2127–2141. [Google Scholar] [CrossRef]
- Seo, D.; Yoon, C.; Jo, I.; Park, J.; Kim, Y. Development of AI-based integrated control system for safety management and payment convenience in electric vehicle charging stations. In Proceedings of the CIRED Porto Workshop 2022: E-mobility and Power Distribution Systems, Hybrid Conference, Porto, Portugal, 2–3 June 2022; pp. 47–51. [Google Scholar] [CrossRef]
Literature | Technical Route | Network Protocol | Performance (‘×’ Indicates Not Achieved; ‘√’ Indicates Achieved) |
---|---|---|---|
[25] | HIL-physical IED + RTDS | GOOSE protocol: IED rapid peer-to-peer communication MMS protocol: Client-server communication RTDS: Protection IED integration | ×scalability ×attack automation √fidelity √latency |
[26,28,29] | HIL-physical IED + RTDS | MITM Network Attack on the GOOSE Protocol | ×scalability √attack automation √fidelity √latency |
[32] | HIL-safety testing platform + physical IEDs + Simulated IEDs | GOOSE protocol: IED rapid peer-to-peer communication MMS protocol: Client-server communication RTDS: Protection IED integration | √scalability ×attack automation √fidelity √latency |
[35] | HIL-CPS Safety Testing Platform + Simulated IEDs | GOOSE protocol: IED rapid peer-to-peer communication MMS protocol: Client–server communication | √scalability ×attack automation √fidelity √latency |
This paper | HIL-CPS Safety Testing Platform + Simulated IEDs | GOOSE protocol: IED rapid peer-to-peer communication MMS protocol: Client–server communication | √scalability √attack automation √fidelity √latency |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, K.; Song, R.; Zhang, W.; Guo, H.; Han, J.; Zou, H. Research on Hardware-in-the-Loop Test Platform Based on Simulated IED and Man-in-the-Middle Attack. Processes 2025, 13, 2735. https://doi.org/10.3390/pr13092735
Liu K, Song R, Zhang W, Guo H, Han J, Zou H. Research on Hardware-in-the-Loop Test Platform Based on Simulated IED and Man-in-the-Middle Attack. Processes. 2025; 13(9):2735. https://doi.org/10.3390/pr13092735
Chicago/Turabian StyleLiu, Ke, Rui Song, Wenqian Zhang, Han Guo, Jun Han, and Hongbo Zou. 2025. "Research on Hardware-in-the-Loop Test Platform Based on Simulated IED and Man-in-the-Middle Attack" Processes 13, no. 9: 2735. https://doi.org/10.3390/pr13092735
APA StyleLiu, K., Song, R., Zhang, W., Guo, H., Han, J., & Zou, H. (2025). Research on Hardware-in-the-Loop Test Platform Based on Simulated IED and Man-in-the-Middle Attack. Processes, 13(9), 2735. https://doi.org/10.3390/pr13092735