Cascading attacks against smart grid using control command disaggregation and services

Byungho Min, Vijay Varadharajan

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    5 Citations (Scopus)

    Abstract

    In this paper, we propose new types of cascading attacks against smart grid that use control command disaggregation and core smart grid services. Although there have been tremendous research efforts in injection attacks against the smart grid, to our knowledge most studies focus on false meter data injection, and false command and false feedback injection attacks have been scarcely investigated. In addition, control command disaggregation has not been addressed from a security point of view, in spite of the fact that it is becoming one of core concepts in the smart grid and hence analysing its security implications is crucial to the smart grid security. Our cascading attacks use false control command, false feedback or false meter data injection, and cascade the effects of such injections throughout the smart grid subsystems and components. Our analysis and evaluation results show that the proposed attacks can cause serious service disruptions in the smart grid. The evaluation has been performed on a widely used smart grid simulation platform.

    Original languageEnglish
    Title of host publication2016 Symposium on Applied Computing, SAC 2016
    Place of PublicationNew York, USA
    PublisherAssociation for Computing Machinery
    Pages2142-2147
    Number of pages6
    Volume04-08-April-2016
    ISBN (Electronic)9781450337397
    DOIs
    Publication statusPublished - 4 Apr 2016
    Event31st Annual ACM Symposium on Applied Computing, SAC 2016 - Pisa, Italy
    Duration: 4 Apr 20168 Apr 2016

    Other

    Other31st Annual ACM Symposium on Applied Computing, SAC 2016
    Country/TerritoryItaly
    CityPisa
    Period4/04/168/04/16

    Fingerprint

    Dive into the research topics of 'Cascading attacks against smart grid using control command disaggregation and services'. Together they form a unique fingerprint.

    Cite this