Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Transient Analysis of Cyber-Attacks on Power SCADA using RTDS


Affiliations
1 Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038, India
2 Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038,, India
     

   Subscribe/Renew Journal


Cyber security in the SCADA domain has become one of the major concerns of all the stakeholders in the energy sector. The SCADA architecture that the power industry adopts is drawing more attention from a dedicated cyber attacker due to the extent of damage a catastrophe can promise. The usage of open standard protocols for communication among SCADA components that are not designed with security in mind is one of those vulnerable areas for any attacker. The SCADA components in the control region viz., the MTU and the RTU communicate via these insecurely designed open protocols without any authentication. An attacker can target this communication; launch an attack like the manin- the-middle attack resulting in a disastrous situation. An experiment was conducted at CPRI using their Real Time Digital Simulator (RTDS) simulating a substation to study the impact of an attack. This paper brings out the details of the experiment conducted and the results thus obtained.

Keywords

SCADA, RTU, MTU, RTDS, IEC 60870-5-104/101 protocol& vulnerabilities, cyber-attack. *Real
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 257

PDF Views: 0




  • Transient Analysis of Cyber-Attacks on Power SCADA using RTDS

Abstract Views: 257  |  PDF Views: 0

Authors

Abhiram Amaraneni
Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038, India
Mahendra Lagineni
Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038,, India
Rajesh Kalluri
Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038,, India
R. K. Senthilkumar
Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038,, India
G. L. Ganga Prasad
Real Time Systems & Smart Grid Group, Center for Development of Advanced Computing, No. 1, Old Madras Road, Byappanahalli, Bengaluru - 560038,, India

Abstract


Cyber security in the SCADA domain has become one of the major concerns of all the stakeholders in the energy sector. The SCADA architecture that the power industry adopts is drawing more attention from a dedicated cyber attacker due to the extent of damage a catastrophe can promise. The usage of open standard protocols for communication among SCADA components that are not designed with security in mind is one of those vulnerable areas for any attacker. The SCADA components in the control region viz., the MTU and the RTU communicate via these insecurely designed open protocols without any authentication. An attacker can target this communication; launch an attack like the manin- the-middle attack resulting in a disastrous situation. An experiment was conducted at CPRI using their Real Time Digital Simulator (RTDS) simulating a substation to study the impact of an attack. This paper brings out the details of the experiment conducted and the results thus obtained.

Keywords


SCADA, RTU, MTU, RTDS, IEC 60870-5-104/101 protocol& vulnerabilities, cyber-attack. *Real



DOI: https://doi.org/10.33686/prj.v11i1.189384