Cargando…
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids
IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9892490/ https://www.ncbi.nlm.nih.gov/pubmed/36725897 http://dx.doi.org/10.1038/s41598-022-27157-z |
_version_ | 1784881335394893824 |
---|---|
author | Hussain, Shahbaz Iqbal, Atif Hussain, S. M. Suhail Zanero, Stefano Shikfa, Abdullatif Ragaini, Enrico Khan, Irfan Alammari, Rashid |
author_facet | Hussain, Shahbaz Iqbal, Atif Hussain, S. M. Suhail Zanero, Stefano Shikfa, Abdullatif Ragaini, Enrico Khan, Irfan Alammari, Rashid |
author_sort | Hussain, Shahbaz |
collection | PubMed |
description | IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks such as false data injection (FDI) attacks. Hence, there is a need to develop a cybersecurity testbed and novel mitigation strategies to study the impact of attacks and mitigate them. This paper presents a testbed and methodology to simulate FDI attacks on IEC 61850 standard compliant Generic Object-Oriented Substation Events (GOOSE) protocol using real time digital simulator (RTDS) together with open-source tools such as Snort and Wireshark. Furthermore, a novel hybrid cybersecurity solution by the name of sequence content resolver is proposed to counter such attacks on the GOOSE protocol in smart grids. Utilizing the developed testbed FDI attacks in the form of replay and masquerade attacks on are launched and the impact of attacks on electrical side is studied. Finally, the proposed hybrid cybersecurity solution is implemented with the developed testbed and its effectiveness is demonstrated. |
format | Online Article Text |
id | pubmed-9892490 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-98924902023-02-03 A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids Hussain, Shahbaz Iqbal, Atif Hussain, S. M. Suhail Zanero, Stefano Shikfa, Abdullatif Ragaini, Enrico Khan, Irfan Alammari, Rashid Sci Rep Article IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks such as false data injection (FDI) attacks. Hence, there is a need to develop a cybersecurity testbed and novel mitigation strategies to study the impact of attacks and mitigate them. This paper presents a testbed and methodology to simulate FDI attacks on IEC 61850 standard compliant Generic Object-Oriented Substation Events (GOOSE) protocol using real time digital simulator (RTDS) together with open-source tools such as Snort and Wireshark. Furthermore, a novel hybrid cybersecurity solution by the name of sequence content resolver is proposed to counter such attacks on the GOOSE protocol in smart grids. Utilizing the developed testbed FDI attacks in the form of replay and masquerade attacks on are launched and the impact of attacks on electrical side is studied. Finally, the proposed hybrid cybersecurity solution is implemented with the developed testbed and its effectiveness is demonstrated. Nature Publishing Group UK 2023-02-01 /pmc/articles/PMC9892490/ /pubmed/36725897 http://dx.doi.org/10.1038/s41598-022-27157-z Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Hussain, Shahbaz Iqbal, Atif Hussain, S. M. Suhail Zanero, Stefano Shikfa, Abdullatif Ragaini, Enrico Khan, Irfan Alammari, Rashid A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids |
title | A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids |
title_full | A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids |
title_fullStr | A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids |
title_full_unstemmed | A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids |
title_short | A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids |
title_sort | novel hybrid methodology to secure goose messages against cyberattacks in smart grids |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9892490/ https://www.ncbi.nlm.nih.gov/pubmed/36725897 http://dx.doi.org/10.1038/s41598-022-27157-z |
work_keys_str_mv | AT hussainshahbaz anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT iqbalatif anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT hussainsmsuhail anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT zanerostefano anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT shikfaabdullatif anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT ragainienrico anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT khanirfan anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT alammarirashid anovelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT hussainshahbaz novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT iqbalatif novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT hussainsmsuhail novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT zanerostefano novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT shikfaabdullatif novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT ragainienrico novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT khanirfan novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids AT alammarirashid novelhybridmethodologytosecuregoosemessagesagainstcyberattacksinsmartgrids |