You are on page 1of 7

Proceedings of the 18th World Congress

The International Federation of Automatic Control


Milano (Italy) August 28 - September 2, 2011

A Cyber Security Study of a SCADA


Energy Management System: Stealthy
Deception Attacks on the State Estimator ⋆
André Teixeira ∗ György Dán ∗∗ Henrik Sandberg ∗
Karl H. Johansson ∗

School of Electrical Engineering - Automatic Control,
KTH Royal Institute of Technology
∗∗
School of Electrical Engineering - Communication Networks,
KTH Royal Institute of Technology

Abstract: In this paper we analyze the cyber security of state estimators in supervisory control
and data acquisition (SCADA) systems for energy management systems (EMS) operating the
power network. Current EMS state estimation algorithms have bad data detection (BDD)
schemes to detect outliers in the measurement data, based on high measurement redundancy.
Although these methods can detect a set of basic cyber attacks, they may fail in the presence of
an intelligent attacker. We explore the latter by considering scenarios where stealthy deception
attacks are performed by sending false information to the control center. We begin by presenting
a recent framework that characterizes the attack as an optimization problem with the objective
specified through a security metric and constraints corresponding to the attack cost. The
framework is used to conduct realistic experiments on a state-of-the-art SCADA EMS software
for a power network example with 14 substations, 27 buses, and 40 branches. To the authors best
knowledge, this is the first such experimental study. The results indicate how state estimators
for power networks can be made more resilient to cyber security attacks.

Keywords: Systems Security; Energy Management Systems; Power System; State Estimation.

1. INTRODUCTION estimate, identifies the most severe consequences in case


of hypothetical equipment outages. A simple schematic
Examples of critical infrastructures in our society are the picture of the SCADA system and EMS is shown in Fig. 1,
power, the gas and the water supply networks. These with measurements denoted by z. Several cyber attacks
infrastructures are operated by means of complex super- on SCADA systems operating power networks have been
visory control and data acquisition (SCADA) systems, reported, see The Wall Street Journal [2009] and CBSNews
which collect measurement data from remote terminal [2009], and major blackouts, such as the August 2003
units (RTUs) installed in the substations, and deliver the Northeast U.S. blackout, are due to the misuse of the
measurement data to the central master station located SCADA systems, see U.S.-Canada Power System Outage
at the control center. The measurement data is usually Task Force [2004]. As discussed in Giani et al. [2009],
transmitted through unencrypted communication chan- there are also several vulnerabilities in the SCADA system
nels, making these critical infrastructures vulnerable to cy- architecture, including the direct tampering of RTUs,
ber attacks, see Giani et al. [2009], Cárdenas et al. [2008]. communication links from RTUs to the control center, and
For a more recent example that also received considerable the IT software and databases in the control center.
media attention, see Symantech [2010]. Our work analyzes the cyber security of the SE in the
SCADA systems for power networks are complemented SCADA system of a power network. In current implemen-
by a set of application specific software, usually called tations of SE algorithms, there are bad data detection
energy management systems (EMS). Modern EMS provide (BDD) schemes designed to detect random outliers in
information support for a variety of applications related to the measurement data based on high measurement redun-
power network monitoring and control. The power network dancy. However, these methods may fail in the presence of
state estimator (SE) is an online application that uses an intelligent attacker. For instance, it is well known that
redundant measurements and a network model to provide for so-called multiple interacting bad data, the BDD system
the EMS with an accurate state estimate at all times. can fail to detect and locate the faulty measurements,
The SE has become an integral tool for EMS, for instance see Monticelli [1999], Abur and Exposito [2004]. That an
for contingency analysis (CA) which, based on the state attacker can exploit this fact has been pointed out in
⋆ This work was supported in part by the European Commission
several recent papers, see Liu et al. [2009], Sandberg et al.
[2010], Bobba et al. [2010]. In these papers, it is assumed
through the VIKING project, the Swedish Research Council, the
Swedish Foundation for Strategic Research, and the Knut and Alice
that the attacker has an accurate linear model of the power
Wallenberg Foundation. grid, and the undetectability of certain corruptions a, see

978-3-902661-93-7/11/$20.00 © 2011 IFAC 11271 10.3182/20110828-6-IT-1002.02210


18th IFAC World Congress (IFAC'11)
Milano (Italy) August 28 - September 2, 2011

Attacker
a
Control Center bus, hence all phase-angles are taken relatively to this bus
z = h(x)
+
State x̂ Bad Data Alarm! and θ1 = 0. The m−dimensional measurement vector z
Estimator r = z − ẑ Detection
can be grouped into two categories: (1) zP , the active

power flow measurements Pij from bus i to j and active
Power Grid Contingency Optimal u∗
Operator
power injection measurement Pi at bus i, and (2) zQ , the
Analysis Power Flow
reactive power flow measurements Qij from bus i to j,
reactive power injection measurement Qi and Vi voltage
u magnitude measurement at bus i. The neighborhood set
of bus i, which consists of all buses directly connected to
Fig. 1. The state estimator under a cyber attack this bus, is denoted by Ni . The power injections at bus i
are described by
Fig. 1, is proven under this assumption. The real power P
network is nonlinear, however, and a nonlinear model is Pi = Vi Pj∈Ni Vj (Gij cos(θij ) + Bij sin(θij ))
,
also typically implemented in the SE. Therefore, it is not Qi = Vi j∈Ni Vj (Gij sin(θij ) − Bij cos(θij ))
clear how a real SE will react to these stealthy deception and the power flows from bus i to bus j are described by
attacks. For example, how large can a be before the SE
does no longer converge? In Teixeira et al. [2010], we have Pij = Vi2 (gsi + gij ) − Vi Vj (gij cos(θij ) + bij sin(θij ))
,
quantified how the SE residual can be bounded based on Qij = −Vi2 (bsi + bij ) − Vi Vj (gij sin(θij ) − bij cos(θij ))
the model errors, but no tests on an actual system were where θij = θi − θj is the phase angle difference between
performed there. bus i and j, gsi and bsi are the shunt conductance and
susceptance of bus i, gij and bij are the conductance
The main practical contribution of this paper is to test
and susceptance of the branch from bus i to j, and
how sensitive a state-of-the-art SCADA system SE is to
Yij = Gij + jBij is the ijth entry of the nodal admittance
stealthy deception attacks. To the best of our knowledge,
matrix. More detailed formulas relating measurements z
this is the first such experimental study on real software.
and state x may be found in Abur and Exposito [2004].
Maybe somewhat surprisingly, for the cases we have stud-
ied, the attacks indeed pass undetected for very large Assuming that the model parameters and the network
corruptions a. This study is important because it shows the topology are exact, the nonlinear measurement model for
simplifying assumptions used in the previously mentioned state estimation is defined by
studies indeed are valid. However, our analysis also shows z = h(x) + ǫ, (1)
that it is possible to make these attacks much more difficult
to perform by allocating new sensors, or by securing some where h(·) is the m−dimensional nonlinear measure-
of them. Secure sensor allocation has also been discussed ment function that relates measurements to states and
in Bobba et al. [2010] and Dán and Sandberg [2010]. is assumed to be twice continuously differentiable, ǫ =
The main theoretical contribution of this paper are the (ǫ1 , . . . , ǫm )⊤ the zero mean measurement error vector,
characterization of operating condition changes for which and usually m ≫ n meaning that there is high measure-
stealthy attacks remain valid and the extension of the ment redundancy. Here ǫi are independent Gaussian vari-
attacker model to include constraints regarding pseudo- ables with respective variances σi2 indicating the relative
measurements and saturation limits. uncertainty about the i−th measurement and thus we have
ǫ ∼ N (0, R) where R = diag(σ12 , . . . , σm
2
) is the covariance
The outline of the paper is as follows. In Section 2 we matrix.
present the theoretical concepts behind state estimation
in power networks. Results from previous work are used 2.2 State Estimator
in Section 3 to develop the analysis framework and some
novel considerations regarding limitations of linear at-
The basic SE problem is to find the best n-dimensional
tack policies are also given. Section 4 contains the main
state x for the measurement model (1) in a weighted
contribution of this paper, the description and results
least square (WLS) sense. Defining the residual vector
of practical experiments conducted in a state-of-the-art
r(x) = z − h(x), we can write the WLS problem as
SCADA/EMS software using the previously mentioned
framework. The conclusions are presented in Section 5. 1
min J(x) = r(x)⊤ R−1 r(x)
x∈Rn 2
(2)
2. PRELIMINARIES such that g(x) = 0
s(x) ≤ 0,
In this section we introduce the power network models and where the inequality constraints generally model satu-
the theory behind the SE and BDD algorithms. ration limits, while the equality constraints are used to
include target setpoints and to ensure physical laws such
2.1 Measurement model as zero power injection transition buses, e.g., transformers,
and zero power flow in disconnected branches. Such data
For an N −bus electric power network, the n = 2N − used in the equality constraints is often seen as pseudo-
1 dimensional state vector x is (θ⊤ , V ⊤ )⊤ , where V = measurements. For sake of simplicity, we will present the
(V1 , . . . , VN ) is the vector of bus voltage magnitudes and solution to the unconstrained optimization problem.
θ = (θ2 , . . . , θN ) vector of phase angles. This state vector
is the minimal information needed to characterize the The unconstrained WLS problem is posed as
operating point of the power network. Without loss of 1
generality, we have considered bus 1 to be the reference minn J(x) = r(x)⊤ R−1 r(x).
x∈R 2

11272
18th IFAC World Congress (IFAC'11)
Milano (Italy) August 28 - September 2, 2011

The SE yields a state estimate x̂ as a minimizer to converged through the Gauss-Newton method. Recalling
this problem. The solution x̂ can be found using the that r(x̂) = z − h(x̂), from (3) we see that the estimate
Gauss-Newton method which solves the so called normal sensitivity matrix is given by ∂∂zx̂ = (H ⊤ H)−1 H ⊤ . Further-
equations: more, we conclude that the weighted residual sensitivity
H ⊤ (xk )R−1 H(xk ) (∆xk ) = H ⊤ (xk )R−1 r(xk ), (3) ∂r
= I − ∂h(x̂) ∂ x̂ ⊤ −1 ⊤

matrix is ∂z ∂ x̂ ∂z = I − H(H H) H . Thus
for k = 0, 1, . . ., where for small measurement errors ǫ ∼ N (0, I) we have the
following weighted measurement residual
k dh(x)
H(x ) := r = Sǫ, (6)
dx kx=x ⊤ −1 ⊤
is called the Jacobian matrix of the measurement model where S = I − H(H H) H .
h(x). For an observable power network, the measurement Through BDD the SE detects measurements corrupted by
Jacobian matrix H(xk ) is full column rank. Consequently, errors whose statistical properties exceed the presumed
the matrix H ⊤ (xk )R−1 H(xk ) in (3) is positive definite

standard deviation or mean. This is achieved by hypoth-
and the Gauss-Newton step generates a descent direction, esis tests using the statistical properties of the weighted
i.e., for the direction ∆xk = xk+1 − xk the condition measurement residual (6). We now introduce one of the
∇J(xk )⊤ ∆xk < 0 is satisfied. BDD hypothesis tests widely used in practice, the largest
Remark 1. Henceforth we consider the covariance matrix normalized residual test.
R to be the identity matrix, for simplicity, i.e., all mea-
surements have unitary weights. Largest normalized residual test From (6), we note that
r ∼ N (0, Ω) with Ω = S. Now consider the normalized
For notational convenience, throughout the next sections residual vector
we will use H(xk ) as H, ∆xk as ∆x, and r(xk ) = z −h(xk ) rN = D−1/2 r, (7)
as r. with D ∈ R m×m
being a diagonal matrix defined as
D = diag(Ω). In the absence of bad data each element
2.3 Decoupled State Estimation riN , i = 1, . . . , m of the normalized residual vector then
follows a normal distribution with zero mean and unit
A useful observation in electric power networks is that of variance, riN ∼ N (0, 1), ∀i = 1, . . . , m. Thus, bad data
active-reactive decoupling, i.e., the active measurements could be detected by checking if riN follows N (0, 1). This
zP (resp. reactive measurement zQ ) predominantly affect can be posed as a hypothesis test for each element riN
the phase angles θ (resp. the voltage magnitudes V ). In
H0 : E riN = 0, H1 : E |riN |) > 0.
 
the decoupled state estimation, the approximate values
of the corrections ∆θ and ∆V are then not computed For this particular case, as shown in Monticelli [1999], the
simultaneously, but independently Wu [1990]. largest normalized residual (LNR) test corresponds to a
Following (3), the correction to state estimate ∆x = threshold test where the threshold τ is computed for a
(∆θ⊤ , ∆V ⊤ )⊤ at each iteration can be obtained from given false alarm rate and H0 is accepted if
the weighted measurement residual r = (rP⊤ , rQ
⊤ ⊤
) as the kD−1/2 rk∞ ≤ τ, (8)
solution to the overdetermined system and rejected otherwise.
    
HP θ HP V ∆θ r
= P , (4)
HQθ HQV ∆V rQ 3. STEALTHY DECEPTION ATTACKS
where the submatrices HP θ and HP V correspond to active
measurements and HQθ and HQV correspond to reactive Using the theory and models described in the previous
measurements. The traditional version of fast decoupled section, we present the framework used throughout the
state estimation is based on the following decoupled nor- next sections to study the cyber security of SCADA EMS
mal equations, where the coupling submatrices HP V and software and algorithms.
HQθ have been set to zero:
∆θk = HP† θ rP (θk , V k ), 3.1 Attacker Model
k † (5)
∆V = HQV rQ (θk , V k ).
The goal of a stealthy deception attacker is to compro-
Equations (5) are alternately solved for ∆θk and ∆V k , mise the telemetered measurements available to the SE
where the mismatches rP and rQ are evaluated at the such that: 1) The SE algorithm converges; 2) The attack
latest estimates. The submatrices HP θ and HQV are remains undetected by the BDD scheme; and 3) For the
evaluated at flat start and branch series resistances are targeted set of measurements, the estimated values at
ignored in forming HP θ . By flat start we mean the power convergence are close to the compromised ones introduced
network’s state in which all voltage magnitudes are 1 pu by the attacker.
and all phase angles are 0.
Let the corrupted measurement be denoted z a . We assume
the following additive attack model
2.4 Bad Data Detection
z a = z + a, (9)
m
The measurement residual when random bad data is where a ∈ R is the attack vector introduced by the
present is characterized as follows. Assume there are no attacker, see also Fig. 1. The vector a has zero entries
measurement errors, i.e. z = h(x), and that the SE has for uncompromised measurements.

11273
18th IFAC World Congress (IFAC'11)
Milano (Italy) August 28 - September 2, 2011

The BDD scheme for SE is based on a threshold test. core of the linear policies is to have a ∈ Im(H). Two main
Thus the attacker’s action will be undetected by the BDD limitations arise from this policy, which are now discussed.
scheme provided that the following condition holds:
Varying operating conditions. The power network is a
2) The measurement residual under attack ra := dynamical system and its state is frequently changing.
r(x̂a ) = z a − h(x̂a ), satisfies the condition (8). Thus it might be the case that the attacker has previously
We will occasionally use the notation x̂a (z a ) to emphasize obtained a linear model H̃ for a state x̃ and the attack
the dependence on z a . is performed only when the system is in a different state
x∗ where the linear approximation is H. Hence for small
Finally, consider that the attacker aims at corrupting attack vectors or for cases where x∗ ≈ x̃, the residual will
measurement i. This means the attacker would like the be small and the attack may pass undetected. For larger
estimated measurement ẑia := hi (x̂a (z a )) to be equal to attacks, however, this might not hold. These scenarios can
the actual corrupted measurement zia . Therefore, we arrive be analyzed using the framework presented in Teixeira
at the following condition which will additionally govern et al. [2010]
the synthesis of attack vector a:
One interesting fact to observe is that, under certain
3) The attack vector a is chosen such that |zia − ẑia | = 0. assumptions, the attack vector a and the security metric α
The aim of a stealthy deception attacker is then to find will be the same, independently of the system’s state. We
and apply an attack a that satisfies conditions 1), 2), and now present a useful lemma and the required assumptions
3). This problem can be posed as to formulate this result.
find a Lemma 1. Consider an optimal attack a∗ that is unde-
(10) tectable with respect to H, i.e., a∗ ∈ Im(H) and has
s.t. a ∈ G ∩ C ∩ U ,
minimum cardinality. Denote by U the set of measure-
where G is the set of goals in condition 3), C the set ments not affected by a∗ , i.e., a∗i = 0 ∀i ∈ U and
of constraints ensuring condition 1) is met and that no a∗i 6= 0 ∀i 6∈ U . Let the Jacobian matrix be partitioned
protected or pseudo-measurements are corrupted, and U
as H = [HU⊤ HŪ⊤ ]⊤ . Recalling that n is the number of
the set of stealthy attacks satisfying condition 2).
states and that rank(H) = n, then rank(HU ) = n − 1, and
3.2 Security Metric for every i 6∈ U we have rank(HU ∪{i} ) = n.

In general a stealthy attack requires the corruption of more Proof. See Dán and Sandberg [2010].
measurements than the targeted one, see Liu et al. [2009] Assumption
1. For any measurement element
zi we have
and Sandberg et al. [2010]. Such requirement relates to the ∂hi (x)
= 0 if and only if ∂hi (x̃)
= 0, for all
∂xj ∂xj
fact that a stealthy attack must have the attack vector a x=x∗ x=x̃
fitting the measurement model. j = 1, . . . , n.
Proposition 2. Denote F as the set of power flow measure-
Considering that the system’s state is x∗ and the attacks ments. Consider H = HP θ (θ)|θ=θ∗ , H̃ = HP θ (θ)|θ=θ̃ , and
are sufficiently small, the measurement model can be let a be a stealthy deception attack vector with respect to
linearized around x∗ , obtaining H. Denote the set of measurements not corrupted by a as

dh(x) U . Then for all the line parameter perturbations and state
z= (x∗ + c) = H(x∗ + c), (11)
dx x=x
∗ changes from θ∗ to θ̃ that satisfy Assumption 1 and do not
where c is the perturbation added to x∗ . Previous results affect measurements j ∈ F \ U , we have that a is also a
show that the class of stealthy attacks for this linear model stealthy attack with respect to H̃.
is characterized by a ∈ Im(H), which is equivalent to have
a = Hc, for some c 6= 0. Based on this linear model, we Proof. In the following we consider the matrix HP Θ and
present a security metric αk for each measurement k. This use H instead to simplify the notation. We consider a
metric corresponds to the minimum cost of a valid attack perturbation in the linear model, e.g., due to varying
satisfying (10) and targeting to corrupt measurement k by operating conditions, such that for a measurement k ∈ F
adding it one unit, i.e., ak = 1. It is computed by solving corresponding to a transmission line we have H̃k = bHk .
the problem Let us denote the buses at the two ends of the transmission
αk = min kak0 line by k1 and k2 . For the power injection at bus k1 (closest
a (12) to measurement k) we have H̃k1 = Hk1 + (b − 1)Hk , for
s.t. a ∈ G ∩ C ∩ U ,
where here a ∈ G corresponds to having ak = 1, a ∈ C to bus k2 we have H̃k2 = Hk2 − (b − 1)Hk . In the following
ai = 0 , ∀i if measurement i is a pseudo-measurement, and we show that if k ∈ F ∩ U , then for every a ∈ Im(H)
a ∈ U to a ∈ Im(H). Note that k · k0 is a pseudo-norm there is ã ∈ Im(H̃) such that a = ã. Since this also holds
corresponding to the cardinality, i.e., number of non-zero for minimum cardinality attack vectors, we have that the
entries, of the argument. Hence the cost αk corresponds to security metric α is the same for both linearized models.
the minimum number of sensors that need to be corrupted For the case when k ∈ U we can prove the proposition by
for a valid attack. performing elementary row operations on H̃U . If k1 ∈ U we
3.3 Limitations of Linear Policies subtract (b−1)/bH̃k from H̃k1 . We proceed similarly for k2 .
Finally, we divide H̃k by b. Clearly, after these operations
In this section we comment on the limitations of the linear we obtained HU , which, following Lemma 1, proves that
attack policies described in Section 3.2. Recall that the rank(H̃U ) = n − 1. Observe that since we used elementary

11274
18th IFAC World Congress (IFAC'11)
Milano (Italy) August 28 - September 2, 2011

11275
18th IFAC World Congress (IFAC'11)
Milano (Italy) August 28 - September 2, 2011

Table 1. Example: adding 100MW to target Attacks on measurement 33


measurement 33 40
naive
stealthy
Measurement Normalized Correct value False value 30
no attack

index, k attack, āk (MW), zk∗ (MW), zka


4 -1 1005.7041 905.7042
20

Estimated value (MW)


21 -0.7774 157.8541 80.1103
24 0.9665 507.7171 604.3638
27 2.7439 40.0006 314.3911 10

33 1 -14.7971 85.2029
62 0.7774 -123.3764 -45.6327 0
104 -0.9665 -334.8826 -431.5293

Information regarding which measurements were assumed −10

to be tamper-proof, i.e. pseudo-measurements, was taken


in account. −20
−20 −10 0 10 20 30 40
Target measurement value (MW)
The result is presented in Fig. 3. Given the current con-
figuration of the SCADA EMS, specifically which mea-
surements are available, we computed the security metric Fig. 4. Stealthy deception attack
αk (the red full circles) as defined in Section 3.2. We see such attack only corrupts 7 measurements in total, which
that the result is very heterogeneous. Recalling that αk is are taken from 5 substations, namely TROY, BLOO,
the minimum number of measurements needed to perform JUNE, MONR, and CROS, all situated in the right side
a stealthy attack on measurement k, we conclude that of Fig. 2. Hence we see that to stealthily attack a single
measurements with low αk are relatively easily attacked measurement, a local coordinated attack suffices, even for
while the ones with αk = ∞ are fully protected. such a large system. Additionally, as discussed in Dán
Increasing the redundancy of the system by adding more and Sandberg [2010], note that usually all measurements
measurements to the SCADA system increases the security within a given substation are gathered at a single RTU.
level, as we see by looking at how ᾱk is larger than This means that by breaking into the substation’s RTU
αk , since ᾱk is the security metric computed assuming the attacker gains access to all those measurements, so
that all possible measurements are being taken. However, we can argue that although 7 measurements need to be
note that this does not guarantee full protection, as all corrupted, only 5 RTUs need to be compromised.
measurements with finite αk still have finite ᾱk .
4.3 Experimental Results
Security metric
20
The normalized attack vector ā, whose non-zero entries are
15
shown in Table 1, was used to corrupt the measurement
10 data according to the attacker’s objective. For instance, in
5 Table 1 we can see the correct value of the compromised
measurements, denoted by z ∗ , and the false values sent to
0
0 10 20 30 40 50 60 the control center, z a , when the objective was to induce a
Target measurement index
bias of 100MW in the target measurement, having z a =
z ∗ + 100ā.
Fig. 3. Security metrics for each measurement k: αk (red
full circles) was computed taking into account which In Fig. 4 we show the results obtained by performing
measurements are available in the SCADA EMS, stealthy deception attacks as described before and naive
while ᾱk (blue rings) was computed assuming that deception attacks where only the target measurement is
all possible measurements are taken. Both represent compromised. In both cases, the bias in the target mea-
the minimum number of measurements needed to surement was sequentially increased by 10MW at each
stealthily attack the target measurement k. step. From these results we see that the naive attack was
undetected up to a bias of 20MW, while for bias above
30MW this attack was detected and the compromised mea-
4.2 Attack Scenario
surement removed. The coordinated stealthy attack, how-
ever, remained undetected for all the bias values showed
To conduct our experiment we considered measurement
in the figure. Furthermore we see that the naive attack did
number 33, corresponding to the active power flow on the
not influence the estimate as much as the stealthy one. For
tie-line between TROY and BLOO substations, to be the
the stealthy attacks relationship between the false and the
target measurement that the attacker desires to corrupt. In
estimated values is an almost unitary slope.
order to do so without being detected, the attacker needs
to perform a coordinated attack by corrupting the value Table 2 shows the results obtained for large bias, where the
of other power measurements. Following the framework attacks were performed sequentially with steps of 50MW.
presented in Section 3, the set of such malicious changes We observe that the stealthy attacks were successful with
is encoded in the attack vector a, and z a follows from (9). no BDD alarm triggered up to a bias of 150MW, beyond
which the SE no longer converged.
Using HDC , we computed the additive normalized attack
vector required to stealthily change the target measure- Although the SE did not converge for attacks above
ment by 1 MW, presented in Table 1. As seen in Fig. 3, 200MW, it is still surprising to see that attacks based on

11276
18th IFAC World Congress (IFAC'11)
Milano (Italy) August 28 - September 2, 2011

Table 2. Results from the stealthy attack for ACKNOWLEDGEMENTS


large bias
The authors would like to thank Mr. Moustafa Chenine
Target bias, False value Estimate #BDD #CA
a a and Mr. Nicholas Honeth for their helpful technical sup-
a33 (MW), z33 (MW), ẑ33 Alarms Alarms
0 -14.8 -14.8 0 2
port.
50 35.2 36.2 0 2
100 85.2 86.7 0 10 REFERENCES
150 135.2 137.5 0 27
200 185.2 - - -
A. Abur and A.G. Exposito. Power System State Estima-
tion: Theory and Implementation. Marcel-Dekker, 2004.
R. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrst-
the linearized model as large as 150MW are successful. To
edt, and T. Overbye. Detecting false data injection
better understand what such quantity indicates, note that
attacks on DC state estimation. In Preprints of the
the nominal value of the targeted tie-line is 260MW. Thus
First Workshop on Secure Control Systems, CPSWEEK
the attack was able to induce a bias of more than 50% of
2010, Stockholm, Sweden, April 2010.
the nominal value, which reveals that the SCADA EMS
A.A. Cárdenas, S. Amin, and S.S. Sastry. Research
software is indeed sensitive to stealthy deception attacks.
challenges for the security of control systems. In Proc.
Furthermore, notice that the number of warnings given by
3rd USENIX Workshop on Hot topics in security, July
the CA component increase with the size of the attack. The
2008.
increased number of CA warnings could lead the operator
CBSNews. Cyber war: Sabotaging the system. CBSNews,
to take corrective actions. Therefore, we conclude that
November 8th 2009. URL http://www.cbsnews.
operators and utilities should care about these scenarios.
com/stories/2009/11/06/60minutes/main5555565.
We also want to highlight that these results were achieved shtml.
with a simplified linear model where several parame- G. Dán and H. Sandberg. Stealth attacks and protection
ters, including the correct operating conditions and cross- schemes for state estimators in power systems. In Proc.
coupling effects between active and reactive measure- of IEEE SmartGridComm, October 2010.
ments, were disregarded. However in these scenarios we A. Giani, S. Sastry, K. H. Johansson, and H. Sandberg.
assumed the attacker had a large amount of resources The VIKING project: an initiative on resilient control
such as a rather detailed knowledge regarding the net- of power networks. In Proc. 2nd Int. Symp. on Resilient
work model, the available measurements, and the pseudo- Control Systems, Idaho Falls, ID, USA, August 2009.
measurements, and access to several RTUs. Most likely, an Y. Liu, M. K. Reiter, and P. Ning. False data injection
attacker with such resources could find easier alternative attacks against state estimation in electric power grids.
attacks on the power network than the one considered in In Proc. 16th ACM Conf. on Computer and Communi-
this paper. cations Security, New York, NY, USA, 2009.
A. Monticelli. State Estimation in Electric Power Systems:
A Generalized Approach. Kluwer Academic Publishers,
5. CONCLUSIONS 1999.
H. Sandberg, A. Teixeira, and K. H. Johansson. On
In this paper we presented a comprehensive framework security indices for state estimators in power networks.
to analyze and study a class of stealthy deception at- In Preprints of the First Workshop on Secure Control
tacks specifically targeting the SE component of SCADA Systems, CPSWEEK 2010, Stockholm, Sweden, April
EMS software through measurement data corruption. This 2010.
framework provides attacker and attack cost models, pos- Symantech. Stuxnet introduces the first known rootkit
sible attack synthesis policies, and system security metrics. for industrial control systems. August 6th 2010.
Results obtained using this framework indicate that local URL http://www.symantec.com/connect/blogs/
attacks are possible. The system security metric can be stuxnet-introduces-first-known-rootkit-scada-
used by the utility to strengthen the security of the sys- devices.
tem by allocation of new sensors. Some limitations of the A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and
linear attack policies were briefly discussed. To validate S. S. Sastry. Cyber security analysis of state estimators
this framework, we took a novel approach and conducted in electric power systems. In Proc. of 49th IEEE Conf.
a set of deception attacks to a state-of-the-art SCADA on Decision and Control, December 2010. To appear.
EMS software. The results obtained by this experiment The Wall Street Journal. Electricity grid in U.S. pen-
show that computations based on linear models of the etrated by spies. The Wall Street Journal, April 8th
system provide valid attacks that successfully corrupt the 2009.
target measurements without triggering any BDD alarms. U.S.-Canada Power System Outage Task Force. Final
The results also indicate that linear models can be used report on the August 14th blackout in the United States
for large attacks as well, although otherwise expected. and Canada. Technical report, April 2004.
Additionally, we showed that besides the measurement F. F. Wu. Power system state estimation: a survey. Int.
model, information concerning pseudo-measurements and J. Elec. Power and Energy Systems, April 1990.
saturation limits is needed for a successful stealthy attack. R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J.
This fact can be used by the utility to protect the system. Thomas. MATPOWER’s extensible optimal power flow
This study also shows that improved BDD schemes and architecture. In Power and Energy Society General
methods to ensure measurement and data protection are Meeting. IEEE, July 2009.
desirable.

11277

You might also like