[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks

Published: 07 September 2022 Publication History

Abstract

In this work, we investigate that the abundance of Electric Vehicles (EVs) can be exploited to target the stability of the power grid. Through a cyber attack that compromises a lot of available EVs and their charging infrastructure, we present a realistic coordinated switching attack that initiates inter-area oscillations between different areas of the power grid. The threat model as well as linearized state-space representation of the grid are formulated to illustrate possible consequences of the attack. Two variations of switching attack are considered, namely, switching of EV charging and discharging power into the grid. Moreover, two possible attack strategies are also considered (i) using an insider to reveal the accurate system parameters and (ii) using reconnaissance activities in the absence of the grid parameters. In the former strategy, the system equations are used to compute the required knowledge to launch the attack. However, a stealthy system identification technique, which is tailored based on Eigenvalue Realization Algorithm (ERA), is proposed in latter strategy to calculate the required data for attack execution. The two-area Kundur, 39-Bus New England, and the Australian 5-area power grids are used to demonstrate the attack strategies and their consequences. The collected results demonstrate that by manipulation of EV charging stations and launching a coordinated switching attack to those portions of load, inter-area oscillations can be initiated. Finally, to protect the grid from this anticipated attack, a Support Vector Machine (SVM) based framework is proposed to detect and eliminate this attack even before being executed.

References

[1]
Power Systems Test Case Archive. (n.d.). Retrieved March 28, 2021 from https://labs.ece.uw.edu.
[2]
Mohammad Abdolkarimzadeh and Farid Hamzeh Aghdam. 2019. A novel and efficient power system state estimation algorithm based on weighted least square (WLS) approach service. Journal of Power Technologies 99, 1 (2019), 15.
[3]
Ali Abur and Antonio Gomez Exposito. 2004. Power System State Estimation: Theory and Implementation. CRC press.
[4]
Samrat Acharya, Yury Dvorkin, and Ramesh Karri. 2019. Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable?IEEE Transactions on Smart Grid 11, 6 (2020), 5099–5113. DOI:
[5]
Cristina Alcaraz, Javier Lopez, and Stephen Wolthusen. 2017. OCPP protocol: Security threats and challenges. IEEE Transactions on Smart Grid 8, 5 (2017), 2452–2459.
[6]
O. C. Alliance. 2018. Open charge point protocol 2.0-part 2-specification. Open Standard. Arnhem, Netherlands.
[7]
Joseph Antoun. 2020. A detailed security assessment of the EV charging ecosystem. IEEE Network Magazine 34, 3 (2020), 200–2007.
[8]
T. Bi, J. Guo, K. Xu, L. Zhang, and Q. Yang. 2017. The impact of time synchronization deviation on the performance of synchrophasor measurements and wide area damping control. IEEE Transactions on Smart Grid 8, 4 (July 2017), 1545–1552. DOI:
[9]
Zeng Bo, Ouyang Shaojie, Zhang Jianhua, Shi Hui, Wu Geng, and Zeng Ming. 2015. An analysis of previous blackouts in the world: Lessons for China’s power industry. Renewable and Sustainable Energy Reviews 42 (2015), 1151–1163. https://www.sciencedirect.com/science/article/pii/S1364032114008946?casa_token=MiMyiV4Wf5kAAAAA:-_8xeOdd3JDsiq8TcGLT2wYfvs7UzQNow09-tsJRzxdIlRbVRlO6H2fFzc0Q-NfSKd0u1MncQQ.
[10]
A. Dwivedi and X. Yu. 2013. A maximum-flow-based complex network approach for power system vulnerability analysis. IEEE Transactions on Industrial Informatics 9, 1 (Feb 2013), 81–88. DOI:
[11]
Hossam ElHussini, Chadi Assi, Bassam Moussa, Ribal Atallah, and Ali Ghrayeb. 2021. A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid. ACM Transactions on Internet of Things 2, 2 (2021), 1–21.
[12]
L. Fan and Z. Miao. 2020. Time-domain measurements-based DQ-frame admittance model identification of inverter-based resources. IEEE Transactions on Power Systems 36, 3 (2020), 1–1. DOI:
[13]
Raihana Ferdous, Renato Lo Cigno, and Alessandro Zorat. 2012. Classification of SIP messages by a syntax filter and SVMs. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, 2714–2719.
[14]
Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, and Leila Azouz Saidane. 2018. Cyber security issues of internet of electric vehicles. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE.
[15]
S. Ghosh, M. S. El Moursi, E. El-Saadany, and K. Al Hosani. 2019. Online coherency based adaptive wide area damping controller for transient stability enhancement. IEEE Transactions on Power Systems 35, 4 (2019), 3100–3113.
[16]
Raju Gottumukkala, Rizwan Merchant, Adam Tauzin, Kaleb Leon, Andrew Roche, and Paul Darby. 2019. Cyber-physical system security of vehicle charging stations. In Proceedings of the IEEE Green Technologies Conference (GreenTech).
[17]
E. Hammad, A. M. Khalil, A. Farraj, D. Kundur, and R. Iravani. 2018. A class of switching exploits based on inter-area oscillations. IEEE Transactions on Smart Grid 9, 5 (Sep. 2018), 4659–4668. DOI:
[18]
H. Huang, C. Y. Chung, K. W. Chan, and H. Chen. 2013. Quasi-monte carlo based probabilistic small signal stability analysis for power systems with plug-in electric vehicle and wind power integration. IEEE Transactions on Power Systems 28, 3 (Aug 2013), 3335–3343. DOI:
[19]
Jer-Nan Juang and Richard Pappa. 1985. An eigensystem realization algorithm for modal parameter identification and model reduction. Journal of Guidance Control and Dynamics 8, 5 (1985), 620–627. DOI:
[20]
S Sathiya Keerthi and Chih-Jen Lin. 2003. Asymptotic behaviors of support vector machines with Gaussian kernel. Neural Computation 15, 7 (2003), 1667–1689.
[21]
Omniyah Gul M. Khan, Ehab El-Saadany, Amr Youssef, and Mostafa Shaaban. 2019. Impact of electric vehicles botnets on the power grid. In Proceedings of the IEEE Canada Electrical Power and Energy Conference.
[22]
B. J. Kirby, J. Dyer, C. Martinez, R. A. Shoureshi, R. Guttromson, J. Dagle et al. 2003. Frequency control concerns in the North American electric power system. United States. Department of Energy.
[23]
Meir Klein, Graham J Rogers, and Prabha Kundur. 1991. A fundamental study of inter-area oscillations in power systems. IEEE Transactions on Power Systems 6, 3 (1991), 914–921.
[24]
Robert M. Lee, Michael J. Assante, and Tim Conway. 2016. Analysis of the cyber attack on the ukrainian power grid. SANS ICS Report 388 (2016), 1–29.
[25]
Jianming Lian, Shaobu Wang, Marcelo A Elizondo, Jacob Hansen, Renke Huang, Rui Fan, Harold Kirkham, Laurentiu D. Marinovici, Dave Schoenwald, and Felipe Wilches-Bernal. 2017. Universal Wide-Area Damping Control for Mitigating Inter-Area Oscillations in Power Systems. Technical Report. Pacific Northwest National Lab. (PNNL), Richland.
[26]
Gaoqi Liang, Steven R. Weller, Junhua Zhao, Fengji Luo, and Zhao Yang Dong. 2016. The 2015 ukraine blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems 32, 4 (2016), 3317–3318.
[27]
Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, and Karen Butler-Purry. 2014. A coordinated multi-switch attack for cascading failures in smart grid. IEEE Transactions on Smart Grid 5, 3 (2014), 1183–1195.
[28]
Shan Liu, Deepa Kundur, Takis Zourntos, and Karen L. Butler-Purry. 2012. Coordinated variable structure switching attack in the presence of model error and state estimation. In Proceedings of the 2012 IEEE 3rd International Conference on Smart Grid Communications (SmartGridComm). IEEE, 318–323.
[29]
S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, and K. Butler-Purry. 2013. A framework for modeling cyber-physical switching attacks in smart grid. IEEE Transactions on Emerging Topics in Computing 1, 2 (Dec 2013), 273–285. DOI:
[30]
Adrian Gabriel Morosan and Florin Pop. 2017. Ocpp security-neural network for detecting malicious traffic. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems. 190–195.
[31]
P. W. Sauer and M. A. Pai. 2006. Power System Dynamics and Stability. Stipes Publishing L.L.C. Retrieved from 97017360https://books.google.ca/books?id=yWi9PAAACAAJ.
[32]
Alex J. Smola and Bernhard Schölkopf. 2004. A tutorial on support vector regression. Statistics and Computing 14, 3 (2004), 199–222.
[33]
Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In Proceedings of the 27th \(\lbrace\)USENIX\(\rbrace\) Security Symposium (\(\lbrace\)USENIX\(\rbrace\) Security 18). 15–32.
[34]
Vaithianathan Venkatasubramanian and Yuan Li. 2004. Analysis of 1996 western american electric blackouts. Bulk Power System Dynamics and Control-VI, Cortina D’Ampezzo (2004), 22–27.
[35]
Q. Wang, X. Liu, J. Du, and F. Kong. 2016. Smart charging for electric vehicles: A survey from the algorithmic perspective. IEEE Communications Surveys Tutorials 18, 2 (2016), 1500–1517.
[36]
F. Wilches-Bernal, R. H. Byrne, and J. Lian. 2019. Damping of inter-area oscillations via modulation of aggregated loads. IEEE Transactions on Power Systems 35, 3 (2019), 1–1. DOI:
[37]
Sze Zheng Yong, Minghui Zhu, and Emilio Frazzoli. 2018. Switching and data injection attacks on stochastic cyber-physical systems: Modeling, resilient estimation, and attack mitigation. ACM Transactions on Cyber-Physical Systems 2, 2 (2018), 1–2.

Cited By

View all
  • (2025)Designing a Security Metric for EV-Based Load-Altering Attacks in Transmission SystemsIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2024.349706274(1-18)Online publication date: 2025
  • (2024)Data-Enabled Modeling and PMU-Based Real-Time Localization of EV-Based Load-Altering AttacksIEEE Transactions on Smart Grid10.1109/TSG.2024.342365415:6(6063-6079)Online publication date: Nov-2024
  • (2024)Charge Manipulation Attacks Against Smart Electric Vehicle Charging Stations and Deep Learning-Based Detection MechanismsIEEE Transactions on Smart Grid10.1109/TSG.2024.340109015:5(5182-5194)Online publication date: Sep-2024
  • Show More Cited By

Index Terms

  1. Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Cyber-Physical Systems
    ACM Transactions on Cyber-Physical Systems  Volume 6, Issue 3
    July 2022
    251 pages
    ISSN:2378-962X
    EISSN:2378-9638
    DOI:10.1145/3551653
    • Editor:
    • Chenyang Lu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 07 September 2022
    Online AM: 21 July 2022
    Accepted: 01 March 2022
    Revised: 01 November 2021
    Received: 01 March 2021
    Published in TCPS Volume 6, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Electric Vehicle (EV)
    2. charging stations
    3. switching attacks
    4. inter-area oscillations
    5. support vector machine

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)193
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Designing a Security Metric for EV-Based Load-Altering Attacks in Transmission SystemsIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2024.349706274(1-18)Online publication date: 2025
    • (2024)Data-Enabled Modeling and PMU-Based Real-Time Localization of EV-Based Load-Altering AttacksIEEE Transactions on Smart Grid10.1109/TSG.2024.342365415:6(6063-6079)Online publication date: Nov-2024
    • (2024)Charge Manipulation Attacks Against Smart Electric Vehicle Charging Stations and Deep Learning-Based Detection MechanismsIEEE Transactions on Smart Grid10.1109/TSG.2024.340109015:5(5182-5194)Online publication date: Sep-2024
    • (2024)Integrated Deep Learning-Based Detection and Robust State Observer Mitigation of Time-Synchronization Attacks: A WADC Case StudyIEEE Transactions on Smart Grid10.1109/TSG.2024.338040915:5(5055-5071)Online publication date: Sep-2024
    • (2024)Deep Learning Detection and Robust MPC Mitigation for EV-Based Load-Altering Attacks on Wind-Integrated Power GridsIEEE Transactions on Industrial Cyber-Physical Systems10.1109/TICPS.2024.34247692(244-263)Online publication date: 2024
    • (2024)Electric Vehicle-Based Load-Altering Attacks and Their Impacts on Power Grids OperationsIEEE Reliability Magazine10.1109/MRL.2024.34514291:4(79-89)Online publication date: Dec-2024
    • (2024)Attack Design for Maximum Malware Spread Through EVs Commute and Charge in Power-Transportation SystemsIEEE Systems Journal10.1109/JSYST.2024.344623118:3(1809-1820)Online publication date: Sep-2024
    • (2024)MaDEVIoT: Cyberattacks on EV Charging Can Disrupt Power Grid Operation2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)10.1109/ISGT59692.2024.10454199(1-5)Online publication date: 19-Feb-2024
    • (2024)Enhancing Anomaly Detection in Electric Vehicle Supply Equipment (EVSE) Networks Using Classical and Ensemble Learning Approaches2024 Control Instrumentation System Conference (CISCON)10.1109/CISCON62171.2024.10696830(1-5)Online publication date: 2-Aug-2024
    • (2024)Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stationsInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2023.109735156(109735)Online publication date: Feb-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media