Physical Attestation of Cyber Processes in the Smart Grid
Cyber-physical system security must consider events in both the cyber and physical layers. This paper proves that a cyber process in the smart grid can lie about its physical behavior and remain undetected by its peers. To avoid this scenario, physical attestation is introduced as a distributed mechanism to validate the behavior of a cyber process using physical measurements. A physical attestation protocol is developed for the smart grid, and the protocol is proven to expose malicious cyber behavior. Through the use of physical attestation, the behavior of cyber processes in cyber-physical systems can be verified.
Keywordspower grid information flow security remote attestation
Unable to display preview. Download preview PDF.
- 1.Akella, R., Meng, F., Ditch, D., McMillin, B., Crow, M.: Distributed power balancing for the FREEDM system. In: First IEEE International Conference on Smart Grid Communications, SmartGridComm, pp. 7–12 (October 2010)Google Scholar
- 2.Falliere, N., Murchu, L., Chien, E.: W32.stuxnet dossier (February 2011), http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf (accessed April 19, 2013)
- 4.Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, New York, NY, USA, pp. 21–32 (2009), http://doi.acm.org/10.1145/1653662.1653666
- 7.Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In: 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), pp. 2195–2201 (December 2011)Google Scholar
- 9.Qin, Z., Li, Q., Chuah, M.C.: Unidentifiable attacks in electric power systems. In: Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, ICCPS 2012, Washington, DC, USA, pp. 193–202 (2012), http://dx.doi.org/10.1109/ICCPS.2012.27
- 10.Roth, T., McMillin, B.: Breaking nondeducible attacks on the smart grid. In: Seventh CRITIS Conference on Critical Information Infrastructures Security. Springer, Lillehammer (2012)Google Scholar
- 11.Sutherland, D.: A model of information. In: Proceedings of the 9th National Computer Security Conference, pp. 175–183 (September 1986)Google Scholar