Document Type
Article
Publication Date
3-19-2022
Department
Department of Electrical and Computer Engineering
Abstract
Attackers are able to enumerate all devices and computers within a compromised substation network. Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial-and-error search. This paper is concerned with studies of cyberattacks manipulating digital relays to disruptively disconnect the associated breakers. The plausible enumeration of such disruptive attack for each relay in a substation is verified with the dynamic simulation studies with the special protection system for frequency, voltage, and rotor angle stability. A pertinent approach with smaller scale contingency analysis results is proposed to reduce the enormous computation burden. The devised enumeration reduction method is evaluated using IEEE test cases. The proposed method provides an extensive enumeration strategy that can be used by utility engineers to identify the pivotal relays in the system and can be further strengthened with security protection.
Publication Title
IET Smart Grid
Recommended Citation
Yamashita, K.,
Yang, Z.,
Ten, C.,
Kar, S.,
&
Ginter, A.
(2022).
Cascading verification initiated by switching attacks through compromised digital relays.
IET Smart Grid.
http://doi.org/10.1049/stg2.12062
Retrieved from: https://digitalcommons.mtu.edu/michigantech-p/15850
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Version
Publisher's PDF
Publisher's Statement
© 2022The Authors. IET Smart Grid published by John Wiley& Sons Ltd on behalf of The Institution of Engineering and Technology. Publisher’s version of record: https://doi.org/10.1049/stg2.12062