Cascading verification initiated by switching attacks through compromised digital relays

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attackers are able to enumerate all devices and computers within a compromised substation network. Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial-and-error search. This paper is concerned with studies of cyberattacks manipulating digital relays to disruptively disconnect the associated breakers. The plausible enumeration of such disruptive attack for each relay in a substation is verified with the dynamic simulation studies with the special protection system for frequency, voltage, and rotor angle stability. A pertinent approach with smaller scale contingency analysis results is proposed to reduce the enormous computation burden. The devised enumeration reduction method is evaluated using IEEE test cases. The proposed method provides an extensive enumeration strategy that can be used by utility engineers to identify the pivotal relays in the system and can be further strengthened with security protection.

Cite

CITATION STYLE

APA

Yamashita, K., Yang, Z., Ten, C. W., Kar, S., & Ginter, A. (2022). Cascading verification initiated by switching attacks through compromised digital relays. IET Smart Grid, 5(3), 189–202. https://doi.org/10.1049/stg2.12062

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free