Cargando…

A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids

IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks...

Descripción completa

Detalles Bibliográficos
Autores principales: Hussain, Shahbaz, Iqbal, Atif, Hussain, S. M. Suhail, Zanero, Stefano, Shikfa, Abdullatif, Ragaini, Enrico, Khan, Irfan, Alammari, Rashid
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9892490/
https://www.ncbi.nlm.nih.gov/pubmed/36725897
http://dx.doi.org/10.1038/s41598-022-27157-z
_version_ 1784881335394893824
author Hussain, Shahbaz
Iqbal, Atif
Hussain, S. M. Suhail
Zanero, Stefano
Shikfa, Abdullatif
Ragaini, Enrico
Khan, Irfan
Alammari, Rashid
author_facet Hussain, Shahbaz
Iqbal, Atif
Hussain, S. M. Suhail
Zanero, Stefano
Shikfa, Abdullatif
Ragaini, Enrico
Khan, Irfan
Alammari, Rashid
author_sort Hussain, Shahbaz
collection PubMed
description IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks such as false data injection (FDI) attacks. Hence, there is a need to develop a cybersecurity testbed and novel mitigation strategies to study the impact of attacks and mitigate them. This paper presents a testbed and methodology to simulate FDI attacks on IEC 61850 standard compliant Generic Object-Oriented Substation Events (GOOSE) protocol using real time digital simulator (RTDS) together with open-source tools such as Snort and Wireshark. Furthermore, a novel hybrid cybersecurity solution by the name of sequence content resolver is proposed to counter such attacks on the GOOSE protocol in smart grids. Utilizing the developed testbed FDI attacks in the form of replay and masquerade attacks on are launched and the impact of attacks on electrical side is studied. Finally, the proposed hybrid cybersecurity solution is implemented with the developed testbed and its effectiveness is demonstrated.
format Online
Article
Text
id pubmed-9892490
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-98924902023-02-03 A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids Hussain, Shahbaz Iqbal, Atif Hussain, S. M. Suhail Zanero, Stefano Shikfa, Abdullatif Ragaini, Enrico Khan, Irfan Alammari, Rashid Sci Rep Article IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks such as false data injection (FDI) attacks. Hence, there is a need to develop a cybersecurity testbed and novel mitigation strategies to study the impact of attacks and mitigate them. This paper presents a testbed and methodology to simulate FDI attacks on IEC 61850 standard compliant Generic Object-Oriented Substation Events (GOOSE) protocol using real time digital simulator (RTDS) together with open-source tools such as Snort and Wireshark. Furthermore, a novel hybrid cybersecurity solution by the name of sequence content resolver is proposed to counter such attacks on the GOOSE protocol in smart grids. Utilizing the developed testbed FDI attacks in the form of replay and masquerade attacks on are launched and the impact of attacks on electrical side is studied. Finally, the proposed hybrid cybersecurity solution is implemented with the developed testbed and its effectiveness is demonstrated. Nature Publishing Group UK 2023-02-01 /pmc/articles/PMC9892490/ /pubmed/36725897 http://dx.doi.org/10.1038/s41598-022-27157-z Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Hussain, Shahbaz
Iqbal, Atif
Hussain, S. M. Suhail
Zanero, Stefano
Shikfa, Abdullatif
Ragaini, Enrico
Khan, Irfan
Alammari, Rashid
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
title A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
title_full A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
title_fullStr A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
title_full_unstemmed A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
title_short A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
title_sort novel hybrid methodology to secure goose messages against cyberattacks in smart grids
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9892490/
https://www.ncbi.nlm.nih.gov/pubmed/36725897
http://dx.doi.org/10.1038/s41598-022-27157-z
work_keys_str_mv AT hussainshahbaz anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT iqbalatif anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT hussainsmsuhail anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT zanerostefano anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT shikfaabdullatif anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT ragainienrico anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT khanirfan anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT alammarirashid anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT hussainshahbaz novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT iqbalatif novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT hussainsmsuhail novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT zanerostefano novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT shikfaabdullatif novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT ragainienrico novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT khanirfan novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids
AT alammarirashid novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids