Hardware-Based Randomized Encoding for Sensor Authentication in Power Grid SCADA Systems
- Georgia Institute of Technology, Atlanta, GA (United States)
Supervisory Control and Data Acquisition (SCADA) systems are utilized extensively in critical power grid infrastructures. Modern SCADA systems have been proven to be susceptible to cyber-security attacks and require improved security primitives in order to prevent unwanted influence from an adversarial party. One section of weakness in the SCADA system is the integrity of field level sensors providing essential data for control decisions at a master station. In this paper we propose a lightweight hardware scheme providing inferred authentication for SCADA sensors by combining an analog to digital converter and a permutation generator as a single integrated circuit. Through this method we encode critical sensor data at the time of sensing, so that unencoded data is never stored in memory, increasing the difficulty of software attacks. We show through experimentation how our design stops both software and hardware false data injection attacks occurring at the field level of SCADA systems.
- Research Organization:
- Georgia Institute of Technology, Atlanta, GA (United States)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- CR0000004
- OSTI ID:
- 1997020
- Report Number(s):
- DOE-GATECH-00004-1
- Journal Information:
- 2022 IEEE Texas Power and Energy Conference (TPEC), Conference: 2022 IEEE Texas Power and Energy Conference 28 February 2022 - 1 March 2022 College Station, TX, USA
- Country of Publication:
- United States
- Language:
- English
False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey
|
journal | April 2017 |
Stuxnet and the Future of Cyber War
|
journal | January 2011 |
False data injection attacks against state estimation in electric power grids
|
conference | January 2009 |
Sensing with Random Encoding for Enhanced Security in Embedded Systems
|
conference | June 2021 |
The 2015 Ukraine Blackout: Implications for False Data Injection Attacks
|
journal | July 2017 |
Similar Records
Authentication Protocol for ICS without Encryption
Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment