Analysis of Communication Channel Attacks on Control Systems—SCADA in Power Sector

  • Rajesh Kalluri
  • Lagineni Mahendra
  • R. K. Senthil Kumar
  • G. L. Ganga Prasad
  • B. S. Bindhumadhava
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 487)

Abstract

Usage of open standard protocols such as IEC 60870-5-101/104 in supervisory control and data acquisition (SCADA) systems which are not provided with security features leaves vulnerabilities for the attacker. Adopting these protocols in power SCADA draws more attention to attacker since a successful attack at one location may lead to catastrophic failure and may lead to a blackout. The critical communication channel in power SCADA is between remote terminal unit (RTU) and master terminal unit (MTU), and they communicate over IEC 60870-5-101/104 protocols. Any successful attack on this channel may lead to disastrous effect [1, 2, 3]. Simulation of attacks targeting this communication channel provides a better perception of impact for any successful attack. In this paper, attacks on communication channel have been discussed using an influence diagram. Experiments are also conducted to study the impact of communication channel attacks on power system which is simulated using real-time digital simulator (RTDS). This paper brings out the details of the experiment conducted and the results thus obtained. This paper also discusses countermeasures to protect systems from such kind of attacks.

Keywords

Remote terminal unit (RTU) Master terminal unit (MTU) Real-time digital simulator (RTDS) IEC 60870-5-104/101 protocol and vulnerabilities Cyber attack Supervisory control and data acquisition (SCADA) 

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    IEC standard for IEC 60870-5-101 protocol Google Scholar
  5. 5.
    IEC standard for IEC 60870-5-104 protocolGoogle Scholar
  6. 6.
  7. 7.
    Amaraneni A, Lagineni M, Kalluri R, Senthil Kumar RK, Ganga Prasad GL (2015, March) Transient analysis of cyber-attacks on power SCADA using RTDS. J CPRI 11(1):77–80Google Scholar
  8. 8.
    Samanth DP, Kalluri R, Senthil Kumar RK, Bindhumadhava BS (2012) SCADA systems security: threat analysis using defense graphs. In: International conference on physical, cyber & system security for power sector from 27th to 28 Feb 2012Google Scholar
  9. 9.
    Sommestad T, Ekstedt M, Nordström L (2009) Modeling security of power communication systems using defense graphs and influence diagrams. IEEE Trans Power Deliv 24(4)Google Scholar
  10. 10.
    Samanth D, Kalluri R, Senthil Kumar RK, Bindhu Madhava BS (2013) SCADA communication protocols: vulnerabilities, attacks and possible mitigations, CSI transaction on ICT 1.2, pp 135–141Google Scholar
  11. 11.
    IEC security standard—IEC 62351Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Rajesh Kalluri
    • 1
  • Lagineni Mahendra
    • 1
  • R. K. Senthil Kumar
    • 1
  • G. L. Ganga Prasad
    • 1
  • B. S. Bindhumadhava
    • 1
  1. 1.Real Time Systems and Smart Grid GroupCentre for Development of Advanced ComputingBengaluruIndia

Personalised recommendations