Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaics (PV) generators.
IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA) (2015)
IEC Standards, IP networks, Inverters, Object oriented modeling, Protocols, Density estimation robust algorithm
DOI ]
[@conference{ author = "BooJoong Kang and Peter Maynard and Kieran McLaughlin and Sakir Sezer and Filip Andren and Christian Seitl and Friederich Kupzog and Thomas Strasser", title = "Investigating Cyber-Physical Attacks against IEC 61850 Photovoltaic Inverter Installations", journal = "IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA)", year = "2015", doi = "http://dx.doi.org/10.1109/ETFA.2015.7301457" }