论文标题
可扩展的网络物理测试床用于电力系统中同步主管的网络安全评估
Scalable Cyber-Physical Testbed for Cybersecurity Evaluation of Synchrophasors in Power Systems
论文作者
论文摘要
本文为电力系统提供了一个实时网络物理(CPS)测试床,该电源系统具有不同的攻击方案,对同步量的测量单元(PMU)。测试床专注于带有组件的实时网络安全仿真,包括数字实时模拟器,虚拟机(VM),通信网络仿真器和软件包操作工具。基于脚本的VM部署和软件定义的网络仿真促进了高度可观的网络物理测试床,该测试床可以在不同的攻击场景下进行真实电力系统的模仿,例如地址分辨率协议(ARP)中毒攻击,中间(MITM)中间(MITM)攻击,错误数据注射攻击(FDIA)和驱动攻击。命名为Pysynphasor的常见同步量IEEE C37.118.2已针对其安全漏洞进行了分析和分析。本文还提出了一个交互式框架,用于利用Pysynphasor模块将虚假数据注入现实系统。该框架可以剖析和重建C37.118.2数据包,该数据包扩大了测试和开发基于PMU的系统及其安全性的潜力,并使电力行业和学术界受益。将FDIA攻击对线性状态估计的案例以及坏数据检测程序的案例作为测试平台能力的一个例子。
This paper presents a real-time cyber-physical (CPS) testbed for power systems with different real attack scenarios on the synchrophasors-phasor measurement units (PMU). The testbed focuses on real-time cyber-security emulation with components including a digital real-time simulator, virtual machines (VM), a communication network emulator, and a package manipulation tool. The script-based VM deployment and the software-defined network emulation facilitate a highly-scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as Address Resolution Protocol (ARP) poisoning attack, Man In The Middle (MITM) attack, False Data Injection Attack (FDIA), and Eavesdropping Attack. The common synchrophasor, IEEE C37.118.2 named pySynphasor has been implemented and analyzed for its security vulnerabilities. The paper also presented an interactive framework for injecting false data into a realistic system utilizing the pySynphasor module. The framework can dissect and reconstruct the C37.118.2 packets, which expands the potential of testing and developing PMU-based systems and their security in detail and benefits the power industry and academia. A case for the demonstration of the FDIA attack on the linear state estimation together with the bad-data detection procedure are presented as an example of the testbed capability.