skip to main content
10.1145/2502524.2502544acmconferencesArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Combating time synchronization attack: a cross layer defense mechanism

Published: 08 April 2013 Publication History

Abstract

A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified recently. A cross layer detection mechanism is proposed to combat TSA in this paper. In the physical layer, we propose a GPS carrier carrier to noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, the a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

References

[1]
K. Borre, D. M. Akos, N. Bertelsen, P. Rinder, and S. H. Jensen, "A software-Defined GPS and Galileo Receiver", Birkhäuser, Boston, 2007.
[2]
A. Cavaleri, B. Motella, M. Pini and M. Fantino, "Detection of spoofed GPS signals at code and carrier tracking level," in Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), pp. 1--6, 8--10, Dec. 2010.
[3]
A. Cavaleri, M. Pini, L. Lo Presti and M. Fantino, "Signal quality monitoring applied to spoofing detection," in Proc. of ION GNSS 2011, Portland, OR., Sep. 2011.
[4]
J. De La Ree, V. Centeno, J. Thorp, and A. Phadke, "Synchronized phasor measurement applications in power systems," IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 20--27, 2010.
[5]
Y. Zhang, P. Markham, and X. Tao, etc., "Wide-area frequency monitoring network (FNET) architecture and applications," IEEE Transactions on smart grid, vol. 1, no. 2, pp. 159--167, 2010.
[6]
S. Daneshmand, A. Jafarnia-Jahromi, A. Broumandan, G. Lachapelle, "Low-complexity spoofing mitigation," GPS World magazine, December Issue, 2011.
[7]
A. Ipakchi and F. Albuyeh, "Grid of the future," IEEE Power and Energy Magazine, vol. 7, no. 2, pp. 52--62, 2009.
[8]
H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, "Smart-grid security issues," IEEE Security Privacy, vol. 8, no. 1, pp. 81--85, 2010.
[9]
H. Kwakernaak and R. Sivan, Linear Optimal Control Systems, 1st Edition, Wiley-Interscience, 1972.
[10]
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Transactions on Smart Grid, vol. 2 no. 4, pp. 645--658, 2011
[11]
B. M. Ledvina, W. J. Bencze, B. Galusha and I. Miller, "An in-Line anti-spoofing device for legacy civil GPS receivers," Institute of Navigation ITM, San Deigo, CA., Jan. 2010.
[12]
H. Li, L. Lai and S. M. Djouadi "Combating false reports for secure networked control in smart grid via trustiness evaluation", in Proc. of IEEE ICC 2011, Kyoto, Japan, 2011.
[13]
J. Liu, A. Gusrialdi, S. Hirche, A. Monti, "Joint controller communication topology design for distributed wide-area damping control of power systems," IFAC, Milan Italy, 2011.
[14]
J. Lin, and H. Pan, "A static state estimation approach including bad data detection and identification in power systems," in Proceedings of the IEEE Power Engineering Society General Meeting, pp. 1--7, Los Alamitos, CA, 2007.
[15]
R. Lemos, "SCADA system makers pushed toward security," Security Focus, 2007.
[16]
J. Machowski, J. Bialek, and J. Dr Bumby, Power System Dynamics: Stability and Control, Wiley, 2008.
[17]
P. Y. Montgomery, T. E. Humphreys, and B. M. Ledvina "Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer," in Proc. of 2009 International Technical Meeting, Anaheim, CA., Jan. 2009.
[18]
J. Nielsen, A. Broumandan, G. Lachapelle, "Spoofing detection and mitigation with a moving handheld receiver," GPS World magazine, vol. 21, no. 9, Sep. 2010.
[19]
H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd edition, Springer, 1994.
[20]
P. Papadimitratos, A. Jovanovic, "GNSS-based positioning: Attacks and countermeasures," in Proc. of IEEE Military Communications Conference, 2008.
[21]
D. Shepard and T. Humphreys, "Characterization of receiver response to a spoofing attack," in Proc. of ION GNSS 2011, Portland, OR., Sep. 2011.
[22]
J. Vesely, and P. Hubacek, "The analysis of the error estimation and ambiguity of 2-D time difference of arrival localization method," International Journal of Communications, vol. 4, no. 4, pp. 95--102, 2010
[23]
B. Wu, and O. P. Malik, "Multivariable adaptive control of synchronous machines in a multimachine power system," IEEE Transactions on Power Systems, vol. 21, no. 4, pp. 1772--1781, 2006.
[24]
H. Wen, P. Y. Huang, J. Dyer, A. Archinal and J. Fagan, "Countermeasures for GPS Signal Spoofing," in Proc. of ION GNSS 18th International Technical Meeting of the Satellite Division, Long Beach, CA., Sep. 2005.
[25]
J. Weimer, S. Kar, and K. H. Johansson, "Distributed detection and isolation of topology attacks in power networks," in Proc. of The 1st ACM International Conference on High Confidence Networked Systems (HiCoNS), Beijing, CHINA, Apr. 2012.
[26]
L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations," IEEE Transactions on Smart Grid, Vol. 2, no. 4, pp. 659--666, 2011.
[27]
Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, "Time Synchronization Attack in Smart Grid: Impact and Analysis" Accepted by IEEE Transactions on Smart Grid.

Cited By

View all

Index Terms

  1. Combating time synchronization attack: a cross layer defense mechanism

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICCPS '13: Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems
      April 2013
      278 pages
      ISBN:9781450319966
      DOI:10.1145/2502524
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 April 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ICCPS '13
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media