{"id":278,"date":"2022-10-24T10:10:09","date_gmt":"2022-10-24T10:10:09","guid":{"rendered":"https:\/\/www.simlab40.deib.polimi.it\/?p=278"},"modified":"2022-11-22T14:36:49","modified_gmt":"2022-11-22T14:36:49","slug":"simulation-of-architectures-for-electrical-vehicles","status":"publish","type":"post","link":"https:\/\/www.simlab40.deib.polimi.it\/?p=278","title":{"rendered":"Analysis of cybersecurity vulnerabilities of the smart grid using IEC61850 standard"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"278\" class=\"elementor elementor-278\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-276d1831 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"276d1831\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74699f0\" data-id=\"74699f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3782fc03 elementor-widget elementor-widget-image\" data-id=\"3782fc03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.simlab40.deib.polimi.it\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"900\" height=\"387\" src=\"https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/logo_poli_reduced2.png\" class=\"attachment-large size-large wp-image-211\" alt=\"\" srcset=\"https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/logo_poli_reduced2.png 900w, https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/logo_poli_reduced2-300x129.png 300w, https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/logo_poli_reduced2-768x330.png 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28bc645 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28bc645\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7566e06a\" data-id=\"7566e06a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-340bf440 elementor-widget elementor-widget-spacer\" data-id=\"340bf440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33982b0f elementor-widget elementor-widget-heading\" data-id=\"33982b0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analysis of cybersecurity vulnerabilities of the smart grid using IEC61850 standard<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69f78c7f elementor-widget elementor-widget-spacer\" data-id=\"69f78c7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fb9629e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3fb9629e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fb7edcf\" data-id=\"4fb7edcf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43ca5643 elementor-widget elementor-widget-text-editor\" data-id=\"43ca5643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The goal of this activity was to recreate a given substation using built-in IEC61850 communication protocols in typhoon HIL and build a Hardware-in-the-loop testbed setup to investigate cyber-attack vulnerabilities by studying the application of MMS, GOOSE, and SV messages in Intelligent Electronic Devices (IEDs). The following listed measures are taken to fulfill this goal.<\/p><p>\u00a0<\/p><p>1.An emulated IED is designed to recreate the physical IEDs in a typhoon HIL device to be used in scenarios with multiple IEDs. This emulated IED is a digital twin of a generic protection IED.<\/p><p>\u00a0<\/p><ol start=\"2\"><li>A microgrid equipped with IEC61850 protocols in different application layers is designed (GOOSE for interlock and protection messages, MMS for supervisory messages, and SV for sending measured signals to protection IEDs)<\/li><\/ol><p>\u00a0<\/p><ol start=\"3\"><li>The microgrid is also equipped with an EV aggregator that acts as an interface between the grid and EVs and takes the information of EV drivers, such as charging power demand and connection time via the smart meter and sends them to the grid operators. These exchanges of information are done via IEC61850 protocols too.<\/li><\/ol><p>\u00a0<\/p><ol start=\"4\"><li>A set of fault protection scenarios are performed using the emulated IED and physical IEDs, and the introduced delays related to each protocol implemented are investigated under different conditions. Also, functionality and robustness of the protection mechanisms and communication protocols are confirmed.<\/li><\/ol><p>\u00a0<\/p><ol start=\"5\"><li>Finally, vulnerability of smart grids that use IEC61850 as their primary communication protocol to data injection attacks such as man-in-the-middle and DDOS attack are studied. This study includes sniffing the local network, capturing and monitoring the exchanged packets and injecting the spoofed data with the same structure into the network to conduct false data injection attacks on the supervisory unit.<\/li><\/ol><p>Results:<\/p><p>\u00a0<\/p><ol><li>Vulnerabilities to false data injection attacks in GOOSE, SV messages, and MMS protocols are confirmed provided that having physical access to the LAN network.<\/li><li>Some countermeasures are suggested to deploy in the areas connected to the LAN network and accessible by public such EV charging stations.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27f9ba81 elementor-widget elementor-widget-image\" data-id=\"27f9ba81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"839\" height=\"1024\" src=\"https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/scenario3.outline-839x1024.jpg\" class=\"attachment-large size-large wp-image-992\" alt=\"\" srcset=\"https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/scenario3.outline-839x1024.jpg 839w, https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/scenario3.outline-246x300.jpg 246w, https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/scenario3.outline-768x937.jpg 768w, https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/scenario3.outline-1259x1536.jpg 1259w, https:\/\/www.simlab40.deib.polimi.it\/wp-content\/uploads\/2022\/10\/scenario3.outline-1679x2048.jpg 1679w\" sizes=\"(max-width: 839px) 100vw, 839px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f408ac elementor-widget elementor-widget-spacer\" data-id=\"9f408ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a4445c7 elementor-widget elementor-widget-text-editor\" data-id=\"4a4445c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Publications:<\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9903440\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9903440<\/a><\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9842109\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9842109<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-57ff1713 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"57ff1713\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-df0848d\" data-id=\"df0848d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a9c70ef elementor-position-block-start animated-fast elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"1a9c70ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.simlab40.deib.polimi.it\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Back to Home\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-left\"><\/i>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.simlab40.deib.polimi.it\/\" >\n\t\t\t\t\t\t\tBack to Home\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e73829b elementor-widget elementor-widget-spacer\" data-id=\"5e73829b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This project aims to study vulnerabilities in IEC61850 standard MMS protocol widely used in supervisory level of smart grids. A Hardware-in-the-loop testbed setup is designed to investigate cyber-attack vulnerabilities by studying the application of MMS servers in Intelligent Electronic Devices (IEDs). The built-in communication protocols in Typhoon HIL are used instead of conventional co-simulations to study the performance and cyber vulnerabilities of this protocol in a more realistic architecture. A series of data injection attacks are performed on the testbed, first by sniffing the local network and capturing and monitoring the pockets. Then, spoofed data with the same structure are injected into the network to conduct false data injection attacks on the supervisory unit. Vulnerability to cyber-attacks of the IEC61850 protocol in specific situations is proved during this study.<\/p>\n","protected":false},"author":2,"featured_media":992,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[],"footnotes":""},"categories":[9,8],"tags":[],"class_list":["post-278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-projects","category-projects","entry","has-media"],"_links":{"self":[{"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=278"}],"version-history":[{"count":12,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":1024,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions\/1024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=\/wp\/v2\/media\/992"}],"wp:attachment":[{"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.simlab40.deib.polimi.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}