IEEE Electrification - December 2020 - 103

Network Layer

Attack Mitigation

The attack detection mechanisms deployed in the network layer can be divided into pattern detection, anomaly
detection, and third-party detection. Pattern detection
monitors the communication network with a database
that stores the signatures of known attacks. The obvious
drawback is that it cannot detect new attacks. The anomaly detection method periodically compares the system
performance with a predefined model under normal conditions. The model can be a fixed standard model or a
well-trained, time-varying model. The third-party detection approach, such as authentication, watermarking,
encryption methods, and key management methods,
relies on an external message that can provide characterizations to the secure signals by a variety of protocols or
low-cost hardware. The data without the related characterizations are deemed as malicious attacks. However, the
cost of this approach is delay performance because it
requires encoding and decoding the external message
before and after data communication. The longer and
more complicated the message, the more secure the
authentication scheme is but the worse the delay performance. Therefore, there is a tradeoff between communication security and computational efficiency.

Attack mitigation of the MG plays a key role in securing
the system. It aims at maintaining stability and providing acceptable performance to the grids under malicious attacks, especially in some cases where it is not
possible to shut down a system (e.g., at hospitals and
large power plants).

Physical Layer
In the physical layer, the detection is mainly achieved by
well-designed controllers of the MG and converters. For such
detection schemes, all kinds of attacks can be treated as the
modification of operations and measurements, which is an
FDI attack. Generally speaking, the studies on attack detection can be classified into two categories: model-based and
data-based schemes. The model-based scheme, such as
state estimation, is observer based, and the statistical methods rely heavily on the system model. Thus, the appropriate
model-based detection scheme should have a high model
fidelity to handle the parameter uncertainties and unknown
disturbances. On the other hand, data-based approaches
rely on machine learning or statistical mechanism techniques to infer a model for the system under inspection
from both the historical data and online measured signals.
However, these methods usually face a heavy computational
burden to train a fully connected network.
Although remarkable progress has been made in
detecting attacks during the past decade, most of the
studies mainly focus on centralized architectures. These
approaches are becoming increasingly unpractical to
deal with attacks as a result of the complexity induced
by large-scale distributed MG systems. Therefore, distributed attack detection schemes should be further investigated in terms of different ways to deal with the
relationships among interconnected subsystems. Model
decomposition methods and disturbance decoupling
methods can be addressed to deal with distributed
attack detection problems for small- and large-scale MG
systems, respectively.

Network Layer
The principle of attack mitigation in the network layer is
to reduce the impact of the attack on the communication
links. Rate limiting is one approach that imposes a rate
limit on the packets, such that it can prevent DoS attacks.
Furthermore, the packets can be dropped if their source
addresses come from a blacklist. Another way to mitigate
the attack is to add more communication channels or
topologies. An attacker can delay, alter, drop, or inject new
packets in the communication link. Thus, once having
detected an attack on a specific channel, the system can
isolate the channel and move to another predefined channel, thus isolating the attack sources or machines.

Physical Layer
The essence of attack mitigation in the physical layer is
the discussion of different ways to recover the system
states and achieve secure control. In terms of a DoS attack
or an FDI attack, respectively, a variety of attack mitigation
strategies can be designed.
According to the impact of DoS attacks on the system,
they can be defined as either weak attack scenarios or
strong attack scenarios. Weak attack scenarios are relatively moderate, meaning that they are cases where only
additional time delays and packet losses are introduced
into the system. Thus, a simple secure control strategy can
be obtained by considering the network under attack as a
time delay system. In other cases, where the induced
packet loss has compromised some of the communication
links, model prediction or state prediction can be adopted
to compensate the data dropouts and thus lead to secure
control. Strong attack scenarios are situations where the
communication networks between controllers and plants
are almost completely congested. In such cases, secure
control can be obtained by considering the networks as
switching systems between normal conditions and
attacked conditions.
FDI attacks can generate more intense effects on the
system than DoS attacks, thus making it unreliable to
model the system as either a time delay system or a
switching system. To provide secure control, secure state
estimation, which aims to estimate the states from corrupted measurements, has attracted considerable attention. The secure state estimation problems can be
categorized into the attack space search method, the convex relaxation method, and the attack estimation method.
It is worth pointing out that the output signals are guaranteed to be reconstructible only if a particular upper bound
	

IEEE Elec trific ation Magazine / D EC EM BE R 2 0 2 0

103



IEEE Electrification - December 2020

Table of Contents for the Digital Edition of IEEE Electrification - December 2020

Contents
IEEE Electrification - December 2020 - Cover1
IEEE Electrification - December 2020 - Cover2
IEEE Electrification - December 2020 - Contents
IEEE Electrification - December 2020 - 2
IEEE Electrification - December 2020 - 3
IEEE Electrification - December 2020 - 4
IEEE Electrification - December 2020 - 5
IEEE Electrification - December 2020 - 6
IEEE Electrification - December 2020 - 7
IEEE Electrification - December 2020 - 8
IEEE Electrification - December 2020 - 9
IEEE Electrification - December 2020 - 10
IEEE Electrification - December 2020 - 11
IEEE Electrification - December 2020 - 12
IEEE Electrification - December 2020 - 13
IEEE Electrification - December 2020 - 14
IEEE Electrification - December 2020 - 15
IEEE Electrification - December 2020 - 16
IEEE Electrification - December 2020 - 17
IEEE Electrification - December 2020 - 18
IEEE Electrification - December 2020 - 19
IEEE Electrification - December 2020 - 20
IEEE Electrification - December 2020 - 21
IEEE Electrification - December 2020 - 22
IEEE Electrification - December 2020 - 23
IEEE Electrification - December 2020 - 24
IEEE Electrification - December 2020 - 25
IEEE Electrification - December 2020 - 26
IEEE Electrification - December 2020 - 27
IEEE Electrification - December 2020 - 28
IEEE Electrification - December 2020 - 29
IEEE Electrification - December 2020 - 30
IEEE Electrification - December 2020 - 31
IEEE Electrification - December 2020 - 32
IEEE Electrification - December 2020 - 33
IEEE Electrification - December 2020 - 34
IEEE Electrification - December 2020 - 35
IEEE Electrification - December 2020 - 36
IEEE Electrification - December 2020 - 37
IEEE Electrification - December 2020 - 38
IEEE Electrification - December 2020 - 39
IEEE Electrification - December 2020 - 40
IEEE Electrification - December 2020 - 41
IEEE Electrification - December 2020 - 42
IEEE Electrification - December 2020 - 43
IEEE Electrification - December 2020 - 44
IEEE Electrification - December 2020 - 45
IEEE Electrification - December 2020 - 46
IEEE Electrification - December 2020 - 47
IEEE Electrification - December 2020 - 48
IEEE Electrification - December 2020 - 49
IEEE Electrification - December 2020 - 50
IEEE Electrification - December 2020 - 51
IEEE Electrification - December 2020 - 52
IEEE Electrification - December 2020 - 53
IEEE Electrification - December 2020 - 54
IEEE Electrification - December 2020 - 55
IEEE Electrification - December 2020 - 56
IEEE Electrification - December 2020 - 57
IEEE Electrification - December 2020 - 58
IEEE Electrification - December 2020 - 59
IEEE Electrification - December 2020 - 60
IEEE Electrification - December 2020 - 61
IEEE Electrification - December 2020 - 62
IEEE Electrification - December 2020 - 63
IEEE Electrification - December 2020 - 64
IEEE Electrification - December 2020 - 65
IEEE Electrification - December 2020 - 66
IEEE Electrification - December 2020 - 67
IEEE Electrification - December 2020 - 68
IEEE Electrification - December 2020 - 69
IEEE Electrification - December 2020 - 70
IEEE Electrification - December 2020 - 71
IEEE Electrification - December 2020 - 72
IEEE Electrification - December 2020 - 73
IEEE Electrification - December 2020 - 74
IEEE Electrification - December 2020 - 75
IEEE Electrification - December 2020 - 76
IEEE Electrification - December 2020 - 77
IEEE Electrification - December 2020 - 78
IEEE Electrification - December 2020 - 79
IEEE Electrification - December 2020 - 80
IEEE Electrification - December 2020 - 81
IEEE Electrification - December 2020 - 82
IEEE Electrification - December 2020 - 83
IEEE Electrification - December 2020 - 84
IEEE Electrification - December 2020 - 85
IEEE Electrification - December 2020 - 86
IEEE Electrification - December 2020 - 87
IEEE Electrification - December 2020 - 88
IEEE Electrification - December 2020 - 89
IEEE Electrification - December 2020 - 90
IEEE Electrification - December 2020 - 91
IEEE Electrification - December 2020 - 92
IEEE Electrification - December 2020 - 93
IEEE Electrification - December 2020 - 94
IEEE Electrification - December 2020 - 95
IEEE Electrification - December 2020 - 96
IEEE Electrification - December 2020 - 97
IEEE Electrification - December 2020 - 98
IEEE Electrification - December 2020 - 99
IEEE Electrification - December 2020 - 100
IEEE Electrification - December 2020 - 101
IEEE Electrification - December 2020 - 102
IEEE Electrification - December 2020 - 103
IEEE Electrification - December 2020 - 104
IEEE Electrification - December 2020 - 105
IEEE Electrification - December 2020 - 106
IEEE Electrification - December 2020 - 107
IEEE Electrification - December 2020 - 108
IEEE Electrification - December 2020 - 109
IEEE Electrification - December 2020 - 110
IEEE Electrification - December 2020 - 111
IEEE Electrification - December 2020 - 112
IEEE Electrification - December 2020 - 113
IEEE Electrification - December 2020 - 114
IEEE Electrification - December 2020 - 115
IEEE Electrification - December 2020 - 116
IEEE Electrification - December 2020 - 117
IEEE Electrification - December 2020 - 118
IEEE Electrification - December 2020 - 119
IEEE Electrification - December 2020 - 120
IEEE Electrification - December 2020 - 121
IEEE Electrification - December 2020 - 122
IEEE Electrification - December 2020 - 123
IEEE Electrification - December 2020 - 124
IEEE Electrification - December 2020 - Cover3
IEEE Electrification - December 2020 - Cover4
https://www.nxtbook.com/nxtbooks/pes/electrification_december2022
https://www.nxtbook.com/nxtbooks/pes/electrification_september2022
https://www.nxtbook.com/nxtbooks/pes/electrification_june2022
https://www.nxtbook.com/nxtbooks/pes/electrification_march2022
https://www.nxtbook.com/nxtbooks/pes/electrification_december2021
https://www.nxtbook.com/nxtbooks/pes/electrification_september2021
https://www.nxtbook.com/nxtbooks/pes/electrification_june2021
https://www.nxtbook.com/nxtbooks/pes/electrification_march2021
https://www.nxtbook.com/nxtbooks/pes/electrification_december2020
https://www.nxtbook.com/nxtbooks/pes/electrification_september2020
https://www.nxtbook.com/nxtbooks/pes/electrification_june2020
https://www.nxtbook.com/nxtbooks/pes/electrification_march2020
https://www.nxtbook.com/nxtbooks/pes/electrification_december2019
https://www.nxtbook.com/nxtbooks/pes/electrification_september2019
https://www.nxtbook.com/nxtbooks/pes/electrification_june2019
https://www.nxtbook.com/nxtbooks/pes/electrification_march2019
https://www.nxtbook.com/nxtbooks/pes/electrification_december2018
https://www.nxtbook.com/nxtbooks/pes/electrification_september2018
https://www.nxtbook.com/nxtbooks/pes/electrification_june2018
https://www.nxtbook.com/nxtbooks/pes/electrification_december2017
https://www.nxtbook.com/nxtbooks/pes/electrification_september2017
https://www.nxtbook.com/nxtbooks/pes/electrification_march2018
https://www.nxtbook.com/nxtbooks/pes/electrification_june2017
https://www.nxtbook.com/nxtbooks/pes/electrification_march2017
https://www.nxtbook.com/nxtbooks/pes/electrification_june2016
https://www.nxtbook.com/nxtbooks/pes/electrification_december2016
https://www.nxtbook.com/nxtbooks/pes/electrification_september2016
https://www.nxtbook.com/nxtbooks/pes/electrification_december2015
https://www.nxtbook.com/nxtbooks/pes/electrification_march2016
https://www.nxtbook.com/nxtbooks/pes/electrification_march2015
https://www.nxtbook.com/nxtbooks/pes/electrification_june2015
https://www.nxtbook.com/nxtbooks/pes/electrification_september2015
https://www.nxtbook.com/nxtbooks/pes/electrification_march2014
https://www.nxtbook.com/nxtbooks/pes/electrification_june2014
https://www.nxtbook.com/nxtbooks/pes/electrification_september2014
https://www.nxtbook.com/nxtbooks/pes/electrification_december2014
https://www.nxtbook.com/nxtbooks/pes/electrification_december2013
https://www.nxtbook.com/nxtbooks/pes/electrification_september2013
https://www.nxtbookmedia.com