Vous êtes sur la page 1sur 12

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE SYSTEMS JOURNAL 1

Development and Application of a Real-Time


Test Bed for Cyber–Physical System
Ceeman B. Vellaithurai, Member, IEEE, Saugata S. Biswas, Student Member, IEEE, and
Anurag K. Srivastava, Senior Member, IEEE

Abstract—Enhanced integration of information and communi- the seven properties required by the smart grid to meet future
cation technologies in the smart grid has led to an increase in the demands [4].
number of cyber assets and has also opened up the possibility of a The EPG has been recognized as a critical infrastructure with
cyberattack. It is necessary to understand the complex relation-
ship between the cyber and physical domains, and its potential a high risk of becoming the target of a cyberattack [5]. Because
impact on the power grid because of a successful cyber–physical of the idiosyncrasies of the power grid, the application of
attack. A cyber–physical test bed that can model and simulate the existing technologies to prevent or mitigate cyberattacks is not
smart grid is necessary to test and validate algorithms and devices. a direct possibility. The disruptions because of a cyberattack on
This paper presents the development of an end-to-end, real-time the smart grid transcend the cyber realm to affect the physical
cyber–physical test bed using Real-Time Digital Simulator and
Network Simulator 3 (ns-3). A methodology for integrating the realm as well. Hence, the approach to security of the smart
hardware phasor measurement unit and the phasor data con- grid must combine cyber security and power system security
centrator in the test bed is presented along with the detailed into cyber–physical security (CPS). Cyberattacks include false-
modeling of the communication network for the power system. data injection attacks on state estimation and electricity markets
The developed test bed is validated and used to demonstrate the [6], [7], denial-of-service (DoS) attacks on a critical asset [8],
impact of different cyberattacks on the power system and tested
algorithms. malicious intrusion, and the recent Distributed Network Pro-
tocol, Version 3.0 (DNP3) implementation vulnerability doc-
Index Terms—Cyber security, cyber–physical test bed, Network umented by the Industrial Control Systems Cyber Emergency
Simulator 3 (ns-3), real time, Real-Time Digital Simulator (RTDS),
smart grid. Response Team [9]. The impact of these kinds of attacks on the
physical devices in the EPG can be catastrophic. Power equip-
ment usually has high costs associated with it, and replacements
I. I NTRODUCTION
for some of these devices may have a long lead time to obtain.

T HE smart-grid investments resulted in a major upgrade of


the electric power grid (EPG) infrastructure by improv-
ing efficiency, reliability, and sustainability [1]. Technological
Typically, attackers do not have complete information of the
system. A weak attack may be based on limited information
such as topology of the system and limited local measurement
advancements that support smart grid include phasor measure- data [10]. Undetectable attacks and countermeasures to defend
ment units (PMUs), digital fault recorders, smart meters for such attacks based on topological and limited measurement
measurements, wired and wireless communications technology information of the system have been presented in [11]. Tech-
for data transfer, and distributed and parallel computing for fast niques and challenges of intrusion detection in cyber–physical
analysis of data using various applications. The requirements systems are discussed in [12]. Algorithms, devices, and ap-
that must be satisfied by smart-grid communication technolo- plications to be used in the smart grid must be tested before
gies and comparative analysis on the available technologies deployment. To enable testing of such devices and applications,
are provided in [2]. The National Institute for Standards and a prototype that can simulate the actual operating conditions
Technology has documented the cyber vulnerabilities associ- with sufficient detail and accuracy is required. Cyber–physical
ated with the use of existing technologies [3]. Additionally, the test beds serve as one of the ideal tools to be used in order
U.S. Department of Energy has listed attack resilience as one of to understand the relationship between cyber and physical
domains associated with the smart grid. It can be also used for
testing and validating the research on CPS of the EPG. The
development of test beds can be a difficult process because
of the complexity of integrating the cyber system and power
Manuscript received December 12, 2014; revised June 24, 2015; accepted system simulators to run in real time. Majority of the studies
July 29, 2015. This work was supported in part by the Department of Energy
under Award DE-OE0000097 (Trustworthy Cyber Infrastructure for the Power related to the development of test beds deal with simulated
Grid). and emulated tools; however, these tools are not run in real
C. B. Vellaithurai is with Schweitzer Engineering Laboratories, Pullman, WA time. The primary difference between simulation and emulation
99163 USA (e-mail: ceeman_vellaithurai@selinc.com).
S. S. Biswas is with Alstom, Bellevue, WA 98004 USA (e-mail: is that, in emulation, the packets generated in the external
saugatasbiswas@gmail.com). hardware can be sent to the destination through the emulator
A. K. Srivastava is with The School of Electrical Engineering and Computer incorporating communication delays.
Science, Washington State University, Pullman, WA 99164-2752 USA (e-mail:
asrivast@eecs.wsu.edu). The major value of this paper compared with other similar
Digital Object Identifier 10.1109/JSYST.2015.2476367 test beds include: 1) the integration of hardware PMUs and
1932-8184 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE SYSTEMS JOURNAL

associated infrastructure into the real-time cyber–physical sim- is aimed at simulating the smart-grid environment and studying
ulator using Real Time Digital Simulator (RTDS) and Network the effects of cyberattacks on the EPG.
Simulator 3 (ns-3); 2) the methodology for validation and SCADASim, which is a framework for building supervisory
testing the real-time test bed; 3) flexibility for integrating real control and data acquisition (SCADA) simulations, is built on
and simulated components in the test bed; 4) a detailed model top of OMNeT++ network simulator [17]. It is similar in
of the power-system communication network in real time with operation to EPOCHS, except that the simulator also allows for
support for different protocols; 5) the use of simulated entities, the possibility of including real devices to a limited extent. By
such as a virtual host with the capability to interact with real using schedulers, it is possible to test the effect of attacks on real
hosts; and 6) the use of ns-3, which is an open-source software devices, although it uses a simulated environment. GridSpice,
tool. Therefore, the source code is available to users to modify which is a distributed simulation platform for the smart grid,
and implement features as needed. The developed test bed uses Gridlab-D and MATPOWER as the network and power
is limited by resources to model the large system, which can simulation tools, respectively [18]. This is a cloud-based simu-
be easily solved by securing additional financial resources. lation platform aimed at simulating large networks with hun-
The major advantage of the test bed is that the operations dreds of connected generators and distribution networks. In
and actions do not need to be scheduled beforehand. Events addition to power and communication network simulation, it
can be triggered or performed at any desired time with the also allows market operations. Potential applications include
consequences reflected as in a real system. This makes the renewable energy integration, home area control and smart
test bed ideal for studying cyber–power system attacks and algorithms, electric vehicle infrastructure, distributed energy
developing methodologies to mitigate the effects of these resources, microgrids, demand response and distribution oper-
attacks. ation, and utility-scale storage. GridSim is built using Gridstat
In the following sections, the development of a real-time and TSAT [19]. GridStat is a wide-area data delivery framework
cyber–physical test bed using both RTDS and ns-3 is described. based on a publish–subscribe architecture [20]. It is used to
Section II provides a short summary of related work for mod- deliver data simulating the communication network. A transient
eling the power system and the cyber system. In addition, the stability simulator, i.e., TSAT, is used for power system simu-
uniqueness of using RTDS and ns-3 in the test bed is also lation. GridSim simulates the power grid, the information and
examined. Section III provides an introduction to cyber–power communication technology (ICT) infrastructure that overlays
system modeling. Section IV examines the architecture of the the grid, and the control systems. The primary focus is the
developed real-time test bed. Section V presents the validation design and testing of wide-area control applications using PMU
of the test bed. Section VI describes the potential applications and other high-rate timestamped data for large systems. The
and presents actual case studies of the test bed. ORNL Power System Simulator setup uses ns-2 and A Discrete
EVent system Simulator (ADEVS) simulation tools [21]. An-
other variation that uses OPNeT++ instead of ns-2 has also
II. R ELATED W ORK
been developed. The IBCN Smart Grid Simulator simulation
Cybersecurity research needs have driven the development environment is implemented using OMNeT++ and MATLAB
of smart-grid cyber–physical test beds. There have been sev- [22]. The environment is designed as layered architecture, in
eral efforts aimed at the development of cost-effective and which three layers are defined: application, middleware, and
accurate test beds. Cosimulation of heterogeneous systems is support layers. It is used to evaluate demand-side management
common in other areas of research and has gained popularity algorithms for electric vehicles.
in cyber–physical simulation. This section provides a detailed Some test beds are more specific in their purpose, such
look into cosimulation environments that have been developed as the Test Bed for Analyzing Security of SCADA Control
for studying the smart grid. In [13] and [14] a hybrid simu- Systems (TASSCS) developed by the University of Arizona,
lation architecture, which is based on IEEE 1516 High-Level which is meant for research on SCADA systems only [23]. It
Architecture, was presented, and it enabled combined simu- uses OPNeT++ system-in-the-loop simulation for the com-
lation of power and communication systems in an integrated munication system, and the PowerWorld simulator to provide
environment. EPG simulation. It is primarily used for research on intrusion
The Electric Power and Communication Synchronizing Sim- detection. SCADA CST [24] is another platform that is similar
ulator (EPOCHS) is a platform for agent-based electric power to TASSCS, except that RINSE is used to simulate the cyber
and communication network simulation. It is the integration system. The National SCADA Test Bed is a foundational test-
of three different simulators: PSCAD/EMTDC for transient bed initiative, which represents a national laboratory collabo-
timescales, PSLF for power system modeling, and ns-2 for rative project [25]. The Virtual Control Systems Environment
communication network modeling [15]. A carefully designed developed by Sandia National Laboratory uses OPNeT++ and
software mediator called runtime infrastructure is responsi- PowerWorld simulator such as the TASSCS test bed. It uses
ble for interfacing and synchronizing between the individual simulated, emulated, and physical devices to provide a ver-
simulators by allowing them to exchange data periodically. A satile reconfigurable platform [26]. The Global Event-Driven
cyber–physical test bed using Internet-Scale Event and Attack Cosimulation Framework (GECO) combines the power-system
Generation Environment for emulating wide-area network com- load flow and ns-2 to provide a cosimulation framework. The
munications and RTDS/DigSilent for simulating power systems main goal here is the modeling and simulation of wide-area
has been developed at Iowa State University [16]. The test bed monitoring, protection, and control schemes [27].
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

VELLAITHURAI et al.: DEVELOPMENT AND APPLICATION OF REAL-TIME TEST BED FOR CPS 3

III. C YBER AND P OWER S YSTEM M ODELING


The developed cyber–physical test bed is the outcome of the
integration of RTDS, which simulates the power system in real
time, and Network Simulator 3 (ns-3), which emulates the com-
munication network with controllers and energy management
tools. This section provides a brief overview of the modeling
of these two systems. The hardware and software resources for
monitoring and control are part of the test bed.

A. Power System Modeling


RTDS is a dynamic virtual power system simulator designed
for continuous real-time operation. A model of the simulated
power system is defined using a graphical modeling language
called RSCAD. The operation is in real time because the typical
time step of operation is around 50 ms. RTDS can be connected
to external devices through dedicated analog and digital signal
exchange devices, making it possible to perform hardware- Fig. 1. Conceptual cyber–physical test-bed representation.
in-the-loop simulations. In addition, the RTDS is modular,
allowing for the use of DNP3 protocol; software PMUs, which
comply with the IEEE C37.118.1 standard; GOOSE mes-
saging; and IEC 61850-9-2 standard [28]. These expansion
modules/cards provide software devices capable of exchanging
information with other equipment. These definitive features
make the RTDS one of the better power-system simulators.

B. Cyber System Modeling


ns-3 is used for emulating the communication network,
which overlays the simulated power system. ns-3 has a modular
implementation and contains a core library that provides the ba-
sic framework of the communication network. The simulator li-
brary specifies simulation time objects, schedulers, and events.
Protocol entities implemented in ns-3 are written to mimic a
real-world implementation facilitating data exchange between
a simulated host in ns-3 and hardware in the test system. This
makes ns-3 suitable for emulation purposes. ns-3 is run on a Fig. 2. Reduction of IEEE 14 bus system into substations.
dedicated server to emulate the communication network in real
time. Note here that the real-time implementation of ns-3 uses
may be leased if required. Multiprotocol Label Switching is
the system time to schedule events. This time is synchronized
used for managing the IP network traffic. The service segrega-
to a GPS clock input that is used to time-synchronize the
tion used to differentiate traffic includes telemetry protection,
devices in the test bed. ns-3 has been successfully used in the
AMI, SCADA, and engineering access [29]. The conceptual
Open-Access Research Test Bed for Next-Generation Wireless
cyber–physical test-bed representation integrating the power
Networks (ORBIT) to emulate communication.
and cyber simulators is shown in Fig. 1.
At the transmission level in the power grid, fiber-optic cables
are generally used between all the major substations and the
control center forming redundant paths for data transfer. Cables IV. C YBER –P HYSICAL T EST B ED
are typically run along the transmission lines on the same tower.
A. Cyber Network Architecture
All-dielectric self-supporting fiber-optic cables are installed
along the transmission lines and use the same tower support in- It is beneficial to derive the power-system communica-
frastructure. Redundancy is provided to cover for the failure of tion network topology based on the power network topology
one or more links in the system. If it is not feasible to lay a fiber- because it will resemble a real system. The communication
optic line, private Worldwide Interoperability for Microwave network topology derived for the IEEE 14 bus system shown
Access networks are used. For distribution network communi- in Fig. 2 will be used to explain the working of the test bed.
cations, such as advanced metering infrastructure (AMI) and Two or more buses that are connected via a transformer are
distributed automation, low-speed networks with bandwidth in assumed located in the same substation and are modeled as
the range of 200 kb/s are used. Public communications lines a single communication node. Ten substations are identified
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE SYSTEMS JOURNAL

Fig. 3. Network IP for each node in the IEEE 14 bus system.

in the IEEE 14 bus system. Each node in Fig. 3 represents


a private local area network (LAN). Interconnection of the
LANs is represented by the communications links between
them. Because the IEEE 14 bus system is a transmission-level
system, fiber-optic links are considered for communications
links. The length of fiber-optic cables is calculated based on the
impedance of the transmission line by converting it to miles,
as done in [30]. The distance is then used to calculate the
propagation delay associated with that link. Fig. 3 shows the Fig. 4. LAN simulation.
communication network topology representation along with
the propagation delay for the IEEE 14 bus system. The control
center is assumed located near the slack bus because, typically, with devices external to the private LAN, packets are routed
the spinning reserve with the largest generation is located at the through the local gateway.
slack bus.
1) Wide-Area Communication Network: The delays to be
B. Power System Architecture
emulated by the simulator include processing, transmission,
queuing, and propagation delays. These delays are calculated in The network nodal view can be split into two major views,
runtime depending on the network state. The processing delay i.e., the substation and the control center.
is based on the number of data packets flowing through each 1) Substation View: A substation might have several devices
network node, the transmission delay is calculated based on the interconnected and interacting with each other through IEC
bandwidth and size of the packet, and the queuing delays are 61850-compliant protocols or other standard protocols. The
emulated as required and depend on the congestion in the sys- interaction between the devices is flexible and configurable
tem at any given point of time. The communication network is according to user requirements. In this paper, it is assumed that
essentially an IP-based routing network. Each private network the transmission level system is fully PMU enabled and that
(node) communicates with other private networks through their each bus has at least one PMU. The substation view of this type
respective gateway. The gateway routing tables are populated of a system is shown in Fig. 5.
with network routes based on the shortest path method using Only one PMU is shown per node because of space con-
Dijkstras algorithm. Fig. 3 provides the different IP addresses straints. The number of PMUs may vary depending on the size
assigned to each substation. of the substation in question. Interaction between the PMUs is
2) LAN: The measurement devices interface with the RTDS also a possibility. The PMU output is concentrated in a phasor
to receive measurement signals through dedicated wires. In data concentrator (PDC) for transmission to super PDCs. Each
some cases, the devices maybe simulated within the RTDS. substation is considered to be on its own private network, with
Therefore, measurement signals are internally assigned. At access to other private networks through its local gateway.
each node, there may be several of these devices. Fig. 4 shows Engineering access is used to gain access to the private network
the separation between the ns-3 simulated environment and the to change settings and configuration files in the relays from
physical devices, such as the RTDS and measurement devices. the control center. A substation computer may or may not be
The gateway of a particular LAN is located inside the ns-3 present locally to make use of the data archived locally in order
simulation environment, as shown in the figure. The hardware to run any applications.
and software devices responsible for measurement and data 2) Control Center View: The generalized control center view
transfer are located outside of the ns-3 environment. These is shown in Fig. 6. Depending on the application and data to be
devices communicate with the gateway inside ns-3 as if it were used, the devices and software can be customized. Fig. 7 shows
a real gateway located on its own LAN. For communication the control center view for the PMU-enabled transmission
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

VELLAITHURAI et al.: DEVELOPMENT AND APPLICATION OF REAL-TIME TEST BED FOR CPS 5

Fig. 7. Control center view for the PMU-enabled transmission system.

Fig. 5. Substation view for the PMU-enabled transmission system.

Fig. 8. Data transfer from Node 9 PMU to control center PDC.

Six hardware PMUs from different vendors, including SEL,


Fig. 6. Generalized control center view. Alstom, GE, and ERLPhase Power Technologies Ltd., are used
in the test bed. Eight software PMUs are simulated in the RTDS
system being considered. The super PDC at the control center expansion card. The data from these PMUs are aggregated at
is responsible for receiving data from all substation PDCs. the PDCs to generate an output stream that is sent to the PDC at
Human–machine interface (HMI) and visualization tools may the control center. This connection is through the ns-3 network
be used depending on the application or algorithm to be run in emulation, thereby incorporating the cyber network dynamics.
the test bed. It is assumed that there is one super PDC in the SEL-5073 Synchrowave PDC software, SEL-3373 Station PDC
entire system, which is present at the control center. (hardware), and OpenPDC are the PDCs used in the test bed.
The authors would like to clarify that the test bed is not
restricted to the use of IEEE C37.118-format PMU device
C. Monitoring and Control Devices
data delivery alone. For example, DNP3 traffic may be used
To complete the test bed, it is necessary to have monitoring simultaneously with the current setup if devices with DNP3
and control devices such as relays, measurement units, data protocols are available. The network simulator can carry any IP-
collection, and data retrieval units. A combination of hardware based traffic. The ability to emulate a communication network
and software devices is used to implement the measurement and for any combination of IP protocol-enabled devices makes the
control layer of the test bed. A total of 14 PMUs are required if test bed versatile.
a PMU is placed at each bus in the IEEE 14 bus system. This
can be achieved through the use of real hardware PMUs and
D. Integrated Cyber–Physical Test Bed
simulated software PMUs in the RTDS. Similarly, PMU data
collection and aggregation through PDCs can be accomplished The test bed consists of three major layers: the power-
using a combination of hardware and software PDCs. system layer, the monitoring-and-control-system layer, and the
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE SYSTEMS JOURNAL

Fig. 9. Overall cyber–physical test bed integrating different resources.

communication-network layer. There is no direct coupling control center. The complete integrated cyber–physical test bed
between RTDS and ns-3. RTDS simulates the power system is shown in Fig. 9.
and provides measurement signals to the measurement layer.
The measurement devices then communicate to the destination,
V. VALIDATION OF THE T EST B ED
through ns-3, emulating the required communication network
characteristics. The substations, each having their own private In order to validate the integrated test bed, component-
network of devices, are interconnected through a multihop level performance and system-level performance were com-
network topology. Data flow is possible between substations pared with benchmark performance. For component-level
and with the control center. If data flow occurs between two performance, the RTDS factory test certification was obtained
substations, the data packet is passed through ns-3, which from the manufacturer. Additionally, the results from several
simulates the appropriate delays associated with the transmis- test cases obtained using RTDS were compared with other
sion of that packet between the two substation gateways. For software tools, such as MATPOWER, and published results
wide-area communication system emulation, a similar process for the standard IEEE system. The development of the open-
is used. source communication network simulator ns-3 started in 2006
Consider the scenario shown in Fig. 8, where a PMU at and is still in active development. Both of these simulators have
Node 9 needs to send data to the control center. In this case, been used extensively and validated by other researchers at
the PMU data are first concentrated at the local substation PDC. the component level. ns-3 is used in emulation mode, which
This process of intrasubstation communication occurs on a real means that the virtual applications, which generate packets, are
LAN network. The local PDC sends data to the super PDC replaced with real hosts. As far as ns-3 is concerned, the only
through the highlighted path in ns-3. This adds the communi- change is that the virtual packets are replaced with real packets.
cation network dynamics based on packet origin, destination, Therefore, the working of ns-3 is essentially the same for real
and network configuration while delivering the packet to the packets as it is for virtual packets.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

VELLAITHURAI et al.: DEVELOPMENT AND APPLICATION OF REAL-TIME TEST BED FOR CPS 7

TABLE I
VALIDATION R ESULTS

Control-center components and other devices were also val-


Fig. 10. Delay difference with and without ns-3.
idated individually with offline results using commercialized
software tools for a specific application. Note that most of the
source. The values shown are for data transfer from Node 4
hardware components used are industrial devices with compre-
to the control center. Hence, it is shown that ns-3 is adding the
hensive quality testing. Hence, it is reasonable to assume that
communication delays as required. The results presented earlier
the test bed developed through the integration of all components are for normal operating conditions where congestion is not an
should result in a validated integrated test bed. Although vali-
issue. During congestion cases, the amount of data handled by
dation of a real-time test bed is difficult to accomplish because
the network increases, thereby causing potential for errors in the
of the unavailability of a benchmark, limited performance tests emulation. However, it was observed that the network simulator
can be conducted for validation.
was able to handle and manage the congestion in the network
To validate the integrated test bed, the online results are
as per the network characteristics. It was found that ns-3 was
compared with the offline simulation results, which are per-
able to emulate successfully congestion during a DoS kind of
formed in ns-3 and presented in Table I as an example. The
attack simulation on the system using the test bed presented in
values presented are the average round-trip times of 50 packets, the succeeding section.
each having a size of 200 B, from each node in the network
to the control-center node. For Node 0, the offline simulation
delay is given as 0.4309 ms, as shown in the second column of VI. A PPLICATIONS OF THE T EST B ED
Table I. This value includes the propagation delay, transmission
A. Aurora Attack Simulation—Impact Analysis
delay, and queuing delay. It does not take into account the
processing delay at each node. It is assumed that the processing In 2007, Idaho National Laboratories (INL) demonstrated
delay is negligible because the value is measured on the order an attack on a generator that was termed as the Aurora attack.
of microseconds. However, in emulation mode, the network The attack involves opening and closing of a breaker associated
simulator is running in real time, and this processing delay with a generator over fixed intervals. The assumption is that
is taken into account. The estimated online simulation delay the synchronism-check element is disabled in the relay leading
presented in the third column of Table I is therefore calculated to the possibility of reclosing the generator onto the system
after factoring in the processing delay. The processing delay when it is out of sync [31]. The synchronism-check element is
is assumed very small at 50 ms, and the estimated value is responsible for ensuring that the breaker does not close unless
0.5809 ms. The fourth column in Table I shows the actual delay the angle difference is within tolerable limits. Fig. 11 shows
observed in the test bed. the phase difference between the A phase voltage of the system
The values presented in Table I are slightly higher than the and voltage measured at the generating transformer. The blue
estimated delay values. This is partly because, in the final signal represents the generator transformer’s voltage starting to
implementation, data delivery is from nodes outside the ns-3 separate from the system voltage. Initially, when the breaker
simulation environment. LAN delays were not included as part is opened, the voltages start to develop an angle difference.
of the estimated delay because the delay calculation is from After ten cycles, the breaker is closed when the voltages are
gateway to gateway. As such, the LAN delay must be accounted not in phase with each other. The angle separation between
for in each substation network. The actual delay for Node 0 was the voltages is caused by acceleration of the generator upon
observed to be 0.6551 ms. Hence, it is shown that the values breaker opening because the load on the generator is lost.
in Table I agree with what is expected, thereby validating the When the breaker is reclosed, the generator is pulled back into
test bed. synchronism. This causes the generator to experience very high
Fig. 10 presents a graph showing the delay incurred by mechanical torque, which can lead to permanent damage.
a packet when sent from substation to control center with To simulate the attack in the test bed, a new node is placed
and without ns-3. The values shown were calculated in the in the communication network where the attacker is assumed
SEL-3373 station PDC, which is synchronized to a GPS clock to reside. Attackers are typically present on the Internet from
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE SYSTEMS JOURNAL

Fig. 11. Phase separation of system and generator voltage during an Aurora attack.

Fig. 12. Interface between RTDS and relay.

where they gain access to private networks through hacking.


The attacker is assumed to have hacked into the control center
by connecting to the private network through a compromised
username and password. The attacker obtains access to one of
the resources used for engineering access to the relay, which is
used to control the breaker at Bus 2 of the test system. The relay
is an SEL-421 Protection, Automation, and Control System that
is interfaced with the RTDS and controls the breaker at Bus 2.
Output OUT101 is used to open the breaker, and OUT102 is
used to close the breaker.
The interface between the RTDS and relay for digital signal
exchange is shown in Fig. 12. The attacker can gain access
to the relay settings file, which can be modified for malicious
purposes. The settings file is reprogrammed by the attacker Fig. 13. Current at the generating transformer because of reclosing out of sync.
to open the breaker and to reclose within ten cycles, and the
sequence is repeated. The timing is achieved by the use of
timers in the relay. Two timers are programmed to carry out in Fig. 13 reveals that an overcurrent relay is unlikely to trip for
the attack. The first timer is used to pulse the output contact this variation because the pickup for the instantaneous element
OUT101 every 1 s, resulting in the opening of the breaker. is typically higher. The time-overcurrent element is unlikely to
The second timer is used to pulse OUT102 every ten cycles pick up because of the variation stabilizing quickly. Although
after breaker opening, to reclose the breaker. This sequence is not shown in the figure, it was observed that the frequency
repeated until the generator is damaged. The 1-s interval allows deviation is not very high. This proves that it is possible to cause
enough time for the system to recover and not trip because of an Aurora attack without causing the other protective elements
any other relays picking up the induced fault condition in the to trip.
system. In Fig. 14, it is clear that the large and repeated variation
Figs. 13 and 14 show the impact of the attack described in torque experienced by the system will lead to mechanical
earlier on the operation of the generator. The current plot shown damage in the generator. In a practical system, if successfully
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

VELLAITHURAI et al.: DEVELOPMENT AND APPLICATION OF REAL-TIME TEST BED FOR CPS 9

300
Real Power (MW)

200

100

60
Reactive Power (MVAR)

40

20

-20

1.5

Fig. 15. Packets per second during the DoS attack at different locations.
1
Torque (PU)

0.5

substation. However, because of limited availability of re-


0
sources, a single PDC is used to emulate up to four substations.
-0.5 A combination of openPDC and SEL-5073 PDCs are used.
0 0.33333 0.66667 1 1.33333 1.66667 2
Time (s)
Relays: The relays are placed at each bus in the system to pro-
vide measurements. Additionally, relays are placed at strategic
Fig. 14. Swing in real power, reactive power, and electrical torque at locations where overloads are likely to occur. Control Center:
Generator 2. The visualization console shown in Fig. 8 is provided as part of
the voltage stability algorithm.
coordinated Aurora attacks were to take place, resulting in N-2 The implementation is similar to that in Fig. 7, except for the
or higher contingencies, it could lead to a blackout situation. absence of an SEL-3354 substation computer at the substations.
Restoration procedures might also be stalled because of the To illustrate the impact on the performance of the algorithm,
unavailability of critical generators lost during the attack. Using a DoS attack is simulated by flooding the selected node with
the developed test bed, it is possible to simulate attack scenar- attack packets. The bandwidth of the attack is not too high
ios, such as an Aurora attack, in real time. This means that, if a because flooding with too many packets will cause the node
security layer were to be added to the existing test bed, it would to go offline. Instead, the bandwidth of the attack is controlled
be possible to do attack–defense scenarios to evaluate defense randomly.
mechanisms and algorithms from a security perspective. The Figs. 15 and 16 show the plot for the number of pack-
test bed also serves as a means of testing defensive techniques ets per second and the number of bytes per second, respec-
against attacks. For example, to detect an Aurora type of attack, tively, obtained from a wireshark packet capture. IP addresses
the rate-of-change-of-frequency protection device can be used 192.168.3.10, 192.168.4.10, and 192.168.5.10 refer to the
to determine if the frequency shift is occurring too fast and PDCs located at Nodes 1, 2, and 3, respectively. The DoS attack
therefore block the reclosing of the breaker. is simulated for Nodes 2 and 3. At Node 3, the attack bandwidth
is very low and infrequent, which is reflected in the minimal
changes in the plot. At Node 2, the attack bandwidth is higher
B. Implementation and Testing of Algorithms
and frequent, which is reflected in the larger spikes. Because
1) Wide-Area Voltage Stability Monitoring: The wide-area there are two PDC streams at Node 3, the number of packets is
voltage stability monitoring algorithm is a PMU data-based doubled, as can be seen at Nodes 1 and 2. Note that the transport
application to be executed at the control center. The algorithm layer protocol used in this simulation is Transmission Con-
requires the voltage magnitude and angles at each substation to trol Protocol. Simulations results showed that an acknowledge
calculate the voltage stability index, which is a measure of the message was transmitted back to the source for every two
stability of the system. The following devices are used for the packets received. Therefore, 30 acknowledge packets are sent
implementation: for every 60 data packets received. Hence, for each PMU
PMU: Six hardware PMUs and eight software PMUs are sending data at the rate of 60 samples per second, 90 packets
used to make up the full complement of 14 PMUs required are expected to be seen. In the wireshark capture, it was
for the simulation. PDC: A total of 14 separate PDC devices observed that the size of each data packet was 140 B, and each
would be needed if individual PDCs would be used for each acknowledge packet size was 54 B for data sent from Node 2.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE SYSTEMS JOURNAL

TABLE II
P ROPAGATION D ELAY B ETWEEN G ATEWAY

Fig. 16. Bytes per second during the DoS attack at different locations.

A total of 60 data packets plus 30 acknowledge packets amounts


to 10 020 B, as observed in Fig. 16. During the attack, it was ob-
served that packets were retransmitted with sizes up to 1514 B.
This explains the spike in the bytes per second, whereas the
number of packets observed is relatively lower. For a real-time
algorithm, it is important that data is available as quickly as
possible. Due to the DoS, it was observed that the algorithm
was not able to execute due to data unavailability. Therefore,
the actual state of the system is not known during the attack. Fig. 17. Change in routing of packets between Nodes 0 and 4.
Transient fault conditions typically need to be cleared within
ten cycles (167 ms). If data are unavailable or delayed because impact for this algorithm, the possibility of a communication
of a cyberattack, the control action will be delayed, leading to line failure was considered. The communication line between
an instability condition. Nodes 0 and 4 is selected for failure simulation.
2) Local-Area Voltage Stability Monitoring: The local-area Initially, all the lines are considered to be in service. After 60 s,
voltage stability monitoring algorithm is also a PMU-based the communications line between Nodes 0 and 4 goes offline.
application [32]. It is run at each substation using only the This leads to the network being reconfigured. Fig. 17 shows
phasor measurements at that particular bus. It requires the slack the information flow path between Nodes 0 and 4. Here, the
bus angle as a reference to the measurement of the voltage counter refers to the seconds at which the data were printed.
angle. The following devices are used for the implementation: The data printed in Fig. 17 are only for transmission of data
PMU: At the slack bus, a software PMU (RTDS) is used, packets through that interface and not for reception. At Node 0,
PDC: At the substation, openPDC is used, and at the slack bus, Interface 3 is used for transmission to Node 4, and Interface 2
SEL-5073 software PDC is used. SEL-3354: SEL-3354 is a is used for transmission to Node 1. At Node 4, Interface 2
substation computer. In this paper, this device is used to retrieve is used for communication with Node 0, and Interface 3 is
data from the PDC database and execute the proposed real-time used for communication with Node 1. Fig. 17 shows that,
voltage stability algorithm. The computed index, VSAI, along At the 58th second, acknowledge packets are greater in bytes
with the other measured parameters, is sent to the control center through Interface 3 at Node 0. However, at the 61st second,
for visualization. Relays: The inverse-time overcurrent element after loss of communication line, Interface 3 has no data flow.
of the SEL-421 Relays is used to monitor and trip transmission Additionally, the data received at Node 4 has decreased because
lines in case an overcurrent is detected. The relays monitor the of reconfiguration of the data flow path. During this process, it
transmission lines in the test case. was observed that there was a momentary addition in the delay
The setup for the implementation of this algorithm is similar experienced by the packets. Since the system has redundant
to that shown in Fig. 7. The algorithm is implemented at Bus 12, communication lines, the loss of a single communication line
which corresponds to Node 7 in the communication network did not pose any major problems.
topology. Table II lists the propagation delay to be emulated 3) Training and Learning: The test bed operates in real time,
by ns-3 for the given implementation. To illustrate the cyber meaning that any change made in the physical or cyber system
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

VELLAITHURAI et al.: DEVELOPMENT AND APPLICATION OF REAL-TIME TEST BED FOR CPS 11

causes dynamics, as in a real system. This provides an ideal R EFERENCES


platform for training and learning purposes. Test scenarios may [1] C. Cecati, C. Citro, A. Piccolo, and P. Siano, “Smart operation of wind
be created where a sequence of cyber–physical contingencies turbines and diesel generators according to economic criteria,” IEEE
are simulated and the operator’s response is studied. Hence, Trans. Ind. Electron., vol. 58, no. 10, pp. 4514–4525, Oct. 2011.
[2] Y. Mo et al., “Cyber – physical security of a smart grid infrastructure,”
the interrelated dynamics of the power and cyber systems can Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
be studied. In [33], a method for operator training using the [3] V. Gungor et al., “Smart grid technologies: Communication technologies
IncSys PowerSimulator was presented. Because of the absence and standards,” IEEE Trans. Ind. Informat., vol. 7, no. 4, pp. 529–539,
Nov. 2011.
of a control center, such as HMI screens in this test bed, it is not [4] “A systems view of the modern grid,” U.S. Dept. Energy (DOE), Nat.
ideal for operator training at this point. However, it is useful for Energy Technol. Lab. (NETL), Washington, DC, USA, 2007.
teaching and learning purposes. [5] “Critical infrastructure protection challenges and efforts to secure con-
trol systems,” U.S. Gov. Accountability Office, Washington, DC, USA,
Mar. 2007.
[6] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
VII. C ONCLUSION state estimation in electric power grids,” in Proc. 16th ACM Conf. CCS,
New York, NY, USA, 2009, pp. 21–32.
To understand the coupling between cyber and physical [7] L. Xie, Y. Mo, and B. Sinopoli, “False data injection attacks in elec-
systems in a cyber–physical system such as the smart grid, tricity markets,” in Proc. IEEE Int. Conf. SmartGridComm, Oct. 2010,
the development of test beds, which can model the system pp. 226–231.
[8] H. Khurana, M. Hadley, N. Lu, and D. Frincke, “Smart-grid secu-
accurately, is required. An overview of the existing test bed rity issues,” IEEE Trans. Security Privacy, vol. 8, no. 1, pp. 81–85,
and the developed real-time cyber–physical test bed using ns-3 Jan./Feb. 2010.
and RTDS are provided in this paper. The test bed uses a com- [9] “Advisory, ‘dnp3 implementation vulnerability’,” ICS-CERT, Washington,
DC, USA, Oct. 2013.
bination of simulated, emulated, and physical devices, which [10] T. Ernster and A. Srivastava, “Power system vulnerability analysis—
allows for an easily reconfigurable system. Different types of Towards validation of centrality measures,” in Proc. IEEE PES Transmiss.
traffic, such as DNP3 and C37.118.1 PMU data, can be passed Distrib. Conf. Expo., May 2012, pp. 1–6.
[11] J. Kim and L. Tong, “On topology attack of a smart grid: Undetectable
through the cyber network emulated in ns-3. The scalability of attacks and countermeasures,” IEEE J. Sel. Areas Commun., vol. 31,
the developed test bed is limited by the available hardware ca- no. 7, pp. 1294–1305, Jul. 2013.
pabilities. Hardware capabilities depend on financial resources. [12] S. Han, M. Xie, H.-H. Chen, and Y. Ling, “Intrusion detection in cyber-
physical systems: Techniques and challenges,” IEEE Syst. J., vol. 8, no. 4,
The cost of an RTDS upgrade is the highest to model bigger pp. 1049–1059, Dec. 2014.
test systems, but another EMTP-based simulators with capa- [13] S. Muller, H. Georg, C. Rehtanz, and C. Wietfeld, “Hybrid simulation of
bilities similar to the RTDS can be directly substituted. ns-3 power systems and ICT for real-time applications,” in Proc. 3rd IEEE PES
Int. Conf. Exhib. ISGT Europe, Oct. 2012, pp. 1–7.
by itself is scalable subject to computing facilities used for [14] H. Georg, C. Wietfeld, S. Muller, and C. Rehtanz, “A HLA based sim-
implementing ns-3. Hardware devices that are interfaced are ulator architecture for co-simulating ICT based power system control
also subject to financial resources. A control-center software and protection systems,” in Proc. IEEE 3rd Int. Conf. SmartGridComm,
Nov. 2012, pp. 264–269.
tool can easily be scaled up to analyze a much bigger system, [15] K. Hopkinson et al., “Epochs: A platform for agent-based electric
subject to computational facilities. The developed interface power and communication simulation built from commercial off-the-shelf
and methodology for integrating all the components for the components,” IEEE Trans. Power Syst., vol. 21, no. 2, pp. 548–558,
May 2006.
integrated real-time test bed are scalable. [16] A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu, “Cyber-physical se-
The practical application of the test bed for impact analysis is curity testbeds: Architecture, application, and evaluation for smart grid,”
demonstrated through the description of an Aurora type of gen- IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 847–855, Jun. 2013.
[17] C. Queiroz, A. Mahmood, and Z. Tari, “Scadasima framework for building
erator attack that is simulated in the test bed. For applications SCADA simulations,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 589–597,
to be deployed in critical cyber–physical systems, such as the Dec. 2011.
EPG, test beds assist in the testing and validation processes. [18] K. Anderson and A. Narayan, “Simulating integrated volt/var control
and distributed demand response using gridspice,” in Proc. IEEE 1st Int.
Manipulation of the cyber network topology and simulation Workshop SGMS, Oct. 2011, pp. 84–89.
of cyberattacks, such as DoS attacks and false-data injection [19] D. Anderson et al., “A virtual smart grid—Real-time simulation for smart
attacks, aid in understanding the cyber impacts on a smart-grid grid control and communications design,” IEEE Power Energy Mag.,
application. The implementation and testing of applications is vol. 10, no. 1, pp. 49–57, Jan./Feb. 2012.
[20] H. Gjermundrod, D. Bakken, C. Hauser, and A. Bose, “Gridstat: A flexible
demonstrated through the practical implementation of the local- QOS-managed data dissemination framework for the power grid,” IEEE
and wide-area voltage stability monitoring algorithms. Future Trans. Power Del., vol. 24, no. 1, pp. 136–143, Jan. 2009.
work will involve the exploration of the impact of more sophis- [21] J. Nutaro, “Designing power system simulators for the smart grid: Com-
bining controls, communications, and electro-mechanical dynamics,” in
ticated coordinated attacks and the various impact mitigation Proc. IEEE PES Gen. Meet., Jul. 2011, pp. 1–5.
effort through a cyber–physical approach. The next step in the [22] K. Mets, T. Verschueren, C. Develder, T. Vandoorn, and L. Vandevelde,
test-bed development process is to add a security layer, which “Integrated simulation of power and communication networks for smart
grid applications,” in Proc. IEEE 6th Int. Workshop CAMAD, Jun. 2011,
would reflect a real-world scenario. By defining access policies pp. 61–65.
and firewall rules for each private network, the attack–defense [23] M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, “A Testbed
mechanism testing can be made possible. Recent developments for Analyzing Security of SCADA Control Systems (TASSCS),” in Proc.
IEEE PES ISGT, Jan. 2011, pp. 1–7.
in ns-3, with the implementation of network address translation [24] C. M. Davis et al., “Scada cyber security testbed development,” in Proc.
(NAT) and Netfilter, provide a basic framework for the imple- 38th North Amer. Power Symp., Sep. 2006, pp. 483–488.
mentation of a security layer. These improvements are still in [25] “National Scada Test Bed: Fact Sheet,” Idaho Nat. Lab. (INL), Idaho
Falls, ID, USA, 2007.
development and need validation and testing before deployment [26] M. McDonald, “Modeling and for Cyber-physical System Security Re-
in the test bed. search,” Dev. Appl., Sandia Nat. Lab., Livermore, CA, USA, Feb. 2010.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE SYSTEMS JOURNAL

[27] H. Lin, S. Veda, S. Shukla, L. Mili, and J. Thorp, “GECO: Global Saugata S. Biswas (S’12) received the B.E. degree
event-driven co-simulation framework for interconnected power system in electrical engineering from Nagpur University,
and communication network,” IEEE Trans. Smart Grid, vol. 3, no. 3, Maharashtra, India, in 2007 and the Ph.D. degree
pp. 1444–1456, Sep. 2012. from Washington State University, Pullman, WA,
[28] P. Forsyth, T. Maguire, and R. Kuffel, “Real time digital simulation for USA, in 2014.
control and protection system testing,” in Proc. IEEE 35th Annu. Power From 2007 to 2009, he was with the Design and
Electron. Spec. Conf., Jun. 2004, vol. 1, pp. 329–335. Development Department of a switchgear industry
[29] C. Vellaithurai, “Cyber-Power System Analysis Using a Real Time in India. From 2009 to 2010, he was a Ph.D. Stu-
Test Bed,” M.S. Thesis, Washington State Univ., Pullman, WA, USA, dent with Mississippi State University, Starkville,
Jul. 2013. MS, USA, before continuing his doctoral study at
[30] P. Anderson and A. Fouad, “Power System Control and Stability,” Iowa Washington State University. He is currently work-
State Univ. Press: Ames, IA, USA, 1977. ing with Alstom, Bellevue, WA, USA.
[31] A. Srivastava et al., “Modeling cyber-physical vulnerability of the smart Dr. Biswas received several Gold Medal awards from Nagpur University
grid with incomplete information,” IEEE Trans. Smart Grid, vol. 4, no. 1, for his academic achievements from 2003 to 2007, and the EECS Outstanding
pp. 235–244, Mar. 2013. Ph.D. Student in Electrical Engineering Award from Washington State Univer-
[32] S. Biswas, C. Vellaithurai, and A. Srivastava, “Development and real time sity in 2013.
implementation of a synchrophasor based fast voltage stability monitoring
algorithm with consideration of load models,” in Proc. IEEE Ind. Appl.
Soc. Annu. Meet., Oct. 2013, pp. 1–9.
[33] C. Vellaithurai, A. Srivastava, and S. Zonouz, “SECPSIM: A training
simulator for cyber-power infrastructure security,” in IEEE Int. Conf.
SmartGridComm, Oct. 2013, pp. 61–66. Anurag K. Srivastava (S’00–M’05–SM’09) re-
ceived the Ph.D. degree from Illinois Institute of
Technology, Chicago, IL, USA, in 2005.
Ceeman B. Vellaithurai (S’09–M’12) received Since August 2010, he has been with Washington
the B.E. degree in electrical and electronics en- State University, Pullman, WA, USA, as an Assistant
gineering from Anna University Tiruchirappalli, Professor. From 2005 to 2010, he was an Assistant
Tiruchirappalli, India, in 2011 and the M.S. degree Research Professor with Mississippi State Univer-
in electrical engineering with specialization in power sity, Starkville, MS, USA. His research interests
systems from Washington State University, Pullman, include power-system operation and control using
WA, USA, in 2013. smart-grid data.
He is currently working with Schweitzer Engi- Dr. Srivastava served as the Chair of the IEEE
neering Laboratories Inc., Pullman, as a Protection Power and Energy Society (IEEE PES) Career Promotion Subcommittee and
Engineer. His research interests include real-time as the Chair of the IEEE PES Student Activities Subcommittee. He currently
modeling and simulation of cyber–power systems. serves in other several IEEE PES Technical Committees and as an Associate
Mr. Vellaithurai received the Best Outgoing Student Award from Anna Editor for the IEEE T RANSACTIONS ON S MART G RID, and as an IEEE
University Tiruchirappalli for his academic achievements. Distinguished Lecturer.

Vous aimerez peut-être aussi