International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022
p-ISSN: 2395-0072
www.irjet.net
A Review of Cybersecurity in Power Substations S Vaishnav Ghautham1, Varsha Madhukar2, Sanjana Koppella3, Ron CM4, Sangeeta Modi5 1 2 3 4UG
Student, Dept. of Electrical and Electronics Engineering, PES University, Bangalore, Karnataka, India Dept. of Electrical and Electronics Engineering, PES University, Bangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------1.1 CHALLENGES IN SUBSTATION Abstract - In recent times, automation has taken over 5Professor,
major sectors of industry and society in attempts to overcome past constraints. Although it solved a set of issues it also gave rise to a new set of threats and problems. The electricity and power industry has also faced its fair share of such benefits and limitations with respect to its integration with automation. In this paper a deep dive into this integration with a special focus on power substations is discussed. The focus is fixed towards cybersecurity in digital electrical substations: what it is, what has been done, benefits and challenges faced, present solutions, our solutions and future scope of the same. The research is further concised to two major areas being the Grid components and the WAN as higher priority attack targets in case of a breach of security. Index Terms—Substation, measures
Cybersecurity,
With the advent of technology, the transfer of data and information has faced a new set of limitations. The sensitivity of data to manipulation is quite high thereby its protection is often in the form of data encryption. Such types of data corruption issues are also faced in power system grids where manipulations to the output data and error in parameter readings can cause an entire sector of a system to be shut down. This data corruption could be due to a hardware fault or due to unauthorized access to data points. A solution to such an issue would be to monitor the system parameters via a checkpoint format.
2. SIMULATION A. Implementation of WAN Connectivity
Protection
A substation network where operators will be connected via an Ethernet switch to gain access to control the households in the network. Focus was to prevent an intruder in the network from controlling the substation.
1. INTRODUCTION The word substation comes from the time before the distribution system became an electrical grid. As the central generating systems got larger and larger, the smaller generating systems were used as centers to further distribute power over a larger area. They became the intermediate steps between the consumer and generating stations in the process of power transfer. They are normally left unattended and rely on SCADA for remote control and access [3]. Cybersecurity refers to a set of devices/technology that provide defense and protection against cyber-attacks. It aims to protect against unauthorized exploitation of systems, networks and technologies [1]. With a lot of information being traversed and communication technology incorporated, power systems are exposed to cyber threats. By targeting the information exchange process, malicious attackers can inject false data to cause power outage, economic loss, and system instability. False injection of data can also be employed to mask existing power system faults.
A substation system network was developed, to which the operators would be connected via an Ethernet switch. The assumption was that anyone in the above network will have the access to controlling the households in the substation. The operators can control the power distribution to the households. The Wi-Fi router was considered as an Ethernet switch. To the server machine households where connected, for this a Microcontroller (Arduino) was connected to a Windows laptop (server machine) via Serial Communication. The Arduino was connected to 3 households (3 LED’s). A text file is shared in the network by the server machine with read and write access to everyone in the network. By modifying parameters in this file, the substation/ power supply to the households can be controlled. So a network where there are 3 operators out of which two are the trusted ones was considered. Every operator in the network would be recognized by their respective IP addresses.
This will affect the operator’s visibility on the faults and prevent proper countermeasures from being taken. Malicious attackers can also penetrate a power system by attacking system state measurement and estimation and cause damage to the integrity of power system state information.
© 2022, IRJET
|
Impact Factor value: 7.529
The server machine which monitors the connections of the network will be hard fed with the trusted operators’ IP addresses. The server machine checks for the IP addresses of the operators connected to the network. And if there is an address that does not exist in the trusted addresses list,
|
ISO 9001:2008 Certified Journal
|
Page 457