IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation

Rafiullah Khan, Kieran McLaughlin, David Laverty, Sakir Sezer

Abstract

Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.

References

  1. Allgood, G., Bass, L., Brown, B., Brown, K., Griffin, S., Ivers, J., Kuruganti, T., Lake, J., Lipson, H., Nutaro, J., Searle, J., and Smith, B. (2011). Security profile for wide-area monitoring, protection, and control. In The UCAIug SG Security Working Group.
  2. Baumeister, T. (2010). Literature review on smart grid cyber security. In University of Hawaii, Technical Report.
  3. Beasley, C., Zhong, X., Deng, J., Brooks, R., and Venayagamoorthy, G. K. (2014). A survey of electric power synchrophasor network cyber security. In 5th IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe). IEEE.
  4. Boyer, W. F. and McBride, S. A. (2009). Study of security attributes of smart grid systemscurrent cyber security issues. In INL, USDOE, Battelle Energy Alliance LLC., Rep INL/EXT-09-15500.
  5. Coppolino, L., DAntonio, S., and Romano, L. (2014). Exposing vulnerabilities in electric power grids: An experimental approach. In International Journal of Critical Infrastructure Protection vol:7(1), pp:51-60. ELSEVIER.
  6. D'Antonio, S., Coppolino, L., Elia, I., and Formicola, V. (2011). Security issues of a phasor data concentrator for smart grid infrastructure. In 13th European Workshop on Dependable Computing. ACM.
  7. Grigsby, L. L. (2012). Wide-area monitoring and situational awareness. In Power System Stability and Control - Third Edition, Volume 5. CRC Press.
  8. Martin, K. E., Hamai, D., Adamiak, M. G., Anderson, S., Begovic, M., Benmouyal, G., Brunello, G., Burger, J., Cai, J. Y., Dickerson, B., Gharpure, V., Kennedy, B., Karlsson, D., Phadke, A. G., Salj, J., Skendzic, V., Sperr, J., Song, Y., Huntley, C., Kasztenny, B., and Price, E. (2008). Exploring the ieee standard c37.1182005 synchrophasors for power systems. In IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 23, NO. 4. IEEE.
  9. Morris, T., Pan, S., Lewis, J., Moorhead, J., Younan, N., King, R., Freund, M., and Madani, V. (2011). Cyber security risk testing of substation phasor measurement units and phasor data concentrators. In Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW 7811). ACM.
  10. Schweitzer, E., Gong, Y., and Donolo, M. (2008). Advanced real-time synchrophasor applications. In 35th Annual Western Protective Relay Conference.
  11. Shepard, D., Humphreys, T., and Fansler, A. (2012). Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks. In International Journal of Critical Infrastructure Protection.
  12. Sikdar, B. and Chow, J. (2011). Defending synchrophasor data networks against traffic analysis attacks. In IEEE Transactions on Smart Grid, Vol:2, Issue: 4. IEEE.
  13. Stewart, J., Maufer, T., Smith, R., Anderson, C., and Ersonmez, E. (2011). Synchrophasor security practices. In 14th Annual Georgia Tech Fault and Disturbance Analysis Conference.
  14. Weis, B., Rowles, S., and Hardjono, T. (Oct. 2011). The group domain of interpretation. In Internet Engineering Task Force (IETF) Request For Comments (RFC): 6407.
  15. Yan, Y., Qian, Y., Sharif, H., and Tipper, D. (2012). A survey on cyber security for smart grid communications. In Communications Surveys and Tutorials, vol.14, no.4, pp.998-1010. IEEE.
  16. Yu, D.-Y., Ranganathan, A., Locher, T., Capkun, S., and Basin, D. (2014). Short paper: detection of gps spoofing attacks in power grids. In Int. conference on Security and privacy in wireless & mobile networks. ACM.
  17. Zargar, S., Joshi, J., and Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. In Communications Surveys and Tutorials, vol. 15, no. 4, pp. 2046-2069. IEEE.
Download


Paper Citation


in Harvard Style

Khan R., McLaughlin K., Laverty D. and Sezer S. (2016). IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 167-178. DOI: 10.5220/0005745001670178


in Bibtex Style

@conference{icissp16,
author={Rafiullah Khan and Kieran McLaughlin and David Laverty and Sakir Sezer},
title={IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={167-178},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005745001670178},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation
SN - 978-989-758-167-0
AU - Khan R.
AU - McLaughlin K.
AU - Laverty D.
AU - Sezer S.
PY - 2016
SP - 167
EP - 178
DO - 10.5220/0005745001670178