Security Analysis of Smart Grid Data Collection Technologies

  • Luigi Coppolino
  • Salvatore D’Antonio
  • Ivano Alessandro Elia
  • Luigi Romano
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6894)


In the last few years we are witnessing a dramatic increase in cyber-attacks targeted against Critical Infrastructures. Attacks against Critical Infrastructures are especially dangerous because they are tailored to disrupt assets which are essential to the functioning of the society as a whole. Examples of Critical Infrastructure sectors include transportation, communication, and utilities. Among these, power grids are possibly the most critical, due to the strong dependency of virtually all Critical Infrastructures on the power infrastructure. We have conducted a security analysis of two key technologies which enable data collection in Power Grids, namely synchrophasor devices and Phasor Data Concentrators. We emphasize that the study has been conducted on a commercial synchrophasor produced by a major vendor, and on a widely used open source product for the Phasor Data Concentrator application. We describe the experimental setup, present the main results, and comment the findings of our research.


Phasor Measurement Units Synchrophasors Phasor Data Concentrators Security Analysis Power Grids Smart Grids 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    IT and Operational Technology: Convergence, Alignment and Integration, Gartner (February 2011), (last accessed 30/05/2011)
  2. 2.
    Beech E.: Cyberspies penetrate electrical grid: report. Reuters top ten news stories (April 2009), (last accessed 30/05/2011)
  3. 3.
    Details of the first-ever control system malware, cnet, (last accessed 30/05/2011)
  4. 4.
    McAfee, Global Energy Cyberattacks: Night Dragon (February 2011)Google Scholar
  5. 5.
    Symantec Intelligence Quarterly Report: October- December - Targeted Attacks on Critical Infrastructures (December 2010)Google Scholar
  6. 6.
    1344 IEEE Standard for Syncrophasors for Power Systems, IEEE (1995)Google Scholar
  7. 7.
  8. 8.
    Postel J. B., Reynolds J. K.: TELNET Protocol Specification, (RFC854). IETF Network Working Group (May 1983)Google Scholar
  9. 9.
    Postel J. B., Reynolds J. K.: File Transfer Protocol (FTP) (RFC959). IETF Network Working Group (October 1985)Google Scholar
  10. 10.
    Zhang J., Gunter C. A.: IEC 61850 - Communication Networks and Systems in Substations: An Overview of Computer Science, University of Illinois at Urbana-ChampaignGoogle Scholar
  11. 11.
    DNP3 (Distributed Network Protocol),
  12. 12.
    Phadke, A.: Synchronized phasor measurements in power systems, vol. 6(2), pp. 10–15 (April 1993)Google Scholar
  13. 13.
    Dagle, J.: The north american synchrophasor initiative (naspi). In: 2010 IEEE Power and Energy Society General Meeting, pp. 1–3 (2010)Google Scholar
  14. 14.
    The North American Electric Reliability Corporation (NERC),
  15. 15.
    Zhong, Z., Xu, C., Billian, B., Zhang, L., Tsai, S.-J., Conners, R., Centeno, V., Phadke, A., Liu, Y.: Power system frequency monitoring network (fnet) implementation, vol. 20(4), pp. 1914–1921 (2005)Google Scholar
  16. 16.
    Gardner, R., Liu, Y.: Fnet: A quickly deployable and economic system to monitor the electric grid. In: 2007 IEEE Conference on Technologies for Homeland Security, pp. 209–214 (May 2007)Google Scholar
  17. 17.
    Tennessee Valley Authority (TVA),
  18. 18.
    NASPI Network (NASPInet),
  19. 19.
    Secure Communications, Schweitzer Engineering Laboratories, Inc., (last accessed 30/05/2011)
  20. 20.
    Cybersecurity, Schweitzer Engineering Laboratories, Inc., (last accessed 30/05/2011)
  21. 21.
    Stewart J., Maufer T., Smith R., Anderson C., Ersonmez E.: Synchrophasor Security Practices, Schweitzer Engineering Laboratories, Inc., (last accessed 30/05/2011)
  22. 22.
    Smith R.: Cryptography Concepts and Effects on Control System Communications, Schweitzer Engineering Laboratories, Inc., (last accessed 30/05/2011)
  23. 23.
    Hurd S., Smith R., Leischner G.: Tutorial: Security in Electric Utility Control Systems, Schweitzer Engineering Laboratories, Inc., (last accessed 30/05/2011)
  24. 24.
    Mix S.: Primer Discussion on Cyber Security: What do the CIP Standards Mean for SynchroPhasors in the future?, North American Electric Reliability Corporation (NERC), (last accessed 30/05/2011)
  25. 25.
    Introduction to NISTIR 7628, Guidelines for Smart Grid Cyber Security, The Smart Grid Interoperability Panel Cyber Security Working Group, (last accessed 30/05/2011)
  26. 26.
    Braendle M.: Cyber security - effectively and efficiently tackling the challenges ahead, ABB, (last accessed 30/05/2011)
  27. 27.
    Hadley M.D., McBride J.B., Edgar T.W., O’Neil L.R., Johnson J.D.: Securing Wide Area Measurement System, Pacific Northwest National Laboratory, (last accessed 30/05/2011)
  28. 28.
    Larsson, S., Danell, A.: The black-out in southern Sweden and eastern Denmark September 23, 2003. In: Power Systems Conference and Exposition, pp. 309–313 (2006)Google Scholar
  29. 29.
    Corsi, S., Sabelli, C.: General blackout in Italy Sunday September 28, 2003. Power Engineering Society General Meeting, 2, 1691–1702 (2004)Google Scholar
  30. 30.
    U.S. - Canada Power System Outage Task Force, Final report on the august 14, 2003 blackout in the united states and canada: Causes and recommendations (April 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Luigi Coppolino
    • 1
  • Salvatore D’Antonio
    • 1
  • Ivano Alessandro Elia
    • 1
  • Luigi Romano
    • 1
  1. 1.Department of TechnologyUniversity of Naples “Parthenope”Italy

Personalised recommendations