Intrusion Detection Against MMS-Based Measurement Attacks at Digital Substations
Intrusion Detection Against MMS-Based Measurement Attacks at Digital Substations
ABSTRACT Information and Communications Technology (ICT) supports the development of novel control
and communication functions for monitoring, operation, and control of power systems. However, the high-
level deployment of ICT also increases the risk of cyber intrusions for Supervisory Control And Data
Acquisition (SCADA) systems. Attackers can gain access to the protected infrastructures of the grid and
launch attacks to manipulate measurements at the substations. The fabricated measurements can mislead the
operators in the control center to take undesirable actions. The Intrusion Detection System (IDS) proposed in
this paper is deployed in IEC 61850 based substations. The proposed IDS identifies falsified measurements
in Manufacturing Messaging Specification (MMS) messages. By cross-checking the consistency of electric
circuit relationships at the substation level in a distributed manner, the falsified measurements can be detected
and discarded before the malicious packets are sent out of the substations through DNP3 communication.
A cyber-physical system testbed is used to validate the performance of the proposed IDS. Using the IEEE
39-bus test system, simulation results demonstrate high accuracy of the proposed substation-based intrusion
detection system.
INDEX TERMS Cyber security of substation, measurement-based attack, MMS, IEC 61850, intrusion
detection, SCADA.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
1240 VOLUME 9, 2021
R. Zhu et al.: Intrusion Detection Against MMS-Based Measurement Attacks at Digital Substations
industrialized solution is deployed in Substation Automation 2) Developing a distributed IDS in the substation level,
Systems (SASs). On the other hand, DNP3 Secure Authen- which accurately determines the attack targets especially
tication (DNP3-SA) [15] provides a security mechanism for the cyberattack against multiple substations. Test results
communication between substations and the control center; show that proposed IDS is efficient and promising for
however, it is not able to detect attacks in which falsified mea- the real-time environment.
surements are encapsulated in the payload of DNP3 packets 3) Analyzing the potential attack path of measurement
before authentication and integrity checking. Hence, substa- attacks in the substation network. Based on the attack
tions are vulnerable to such attacks on measurements. path, the attack model is developed for the measurement
Motivated by the critical need to detect measurement attacks.
attacks at the substation level, this paper is concerned with The remaining of this paper is organized as follows:
the study of attack paths in SAS and defense actions. Vari- Section II describes vulnerabilities at the substation level.
ous studies in the literature have explored the cyber defense In Section III, the technical approach is provided. Section IV
of substation automation. The risk and vulnerability assess- establishes the feasibility of the proposed algorithm with
ment is proposed for SCADA and IEC 61850 based substa- respect to different attack scenarios. Section V discusses the
tions [16], [17]. To counter the threats to an IEC 61850-based software testbed for validation of the IDS. Section VI shows
substation, a signature-based IDS is developed based on the simulation results and performance of the IDS. Finally,
the data collected by simulating the attacks on IEDs [18]. the conclusions and future work are given in Section VII.
In [19]–[22], a comprehensive IDS integrates protocol speci-
fication, and logical behaviors for detecting abnormal behav- II. PROBLEM FORMULATION
iors within the cyber-physical systems. Based on IEC 61850 IEC 61850 based SAS enables different devices to coopera-
standards, the collaborative intrusion detection system pro- tively maintain system properties in a modernized substation.
posed in [23] monitors and detects cyberattacks by screening Specifically, based on functionalities, the physical devices
the characteristics of Generic Object Oriented Substation are organized in three levels: the process, bay, and station
Events (GOOSE) and Sample Value (SV) packets at each levels. To support communication properties in SAS, IEC
IED. Game-theoretic techniques are used in [24] to optimize 61850 based protocols, e.g., GOOSE, SV and MMS, are used.
the security mechanism for a large number of substations SV messages are used for sharing measurements of Current
against coordinated attacks. Since the ICT-based IDS has Transformers (CTs)/Voltage Transformers (VTs) with protec-
a limited impact on such intrusions that bypass the cyber tive IEDs. Since there is a built-in security mechanism in
defense, some studies propose defense strategies according SV streams, e.g., Message Authentication Code (MAC) in
to physical nature of the power system. To detect intrusions IEC 62351-6, for ensuring integrity, the proposed method to
against the protection system, context information based detect and mitigate measurement-based attacks against MMS
defense is proposed [25], [26]. By learning the pattern of messages does not affect the substation protection scheme.
attack data, an IDS is proposed [27] for IEEE 1815.1-based As a new function for cyber security, the proposed IDS is
network at substations. focused on MMS messages to prevent falsified measurements
Regarding the detection of measurement attacks, several from being sent out of the substations.
issues are observed: 1) Existing methods identify false mea- In digital substations, MMS communication uses a
surements based on state estimation and bad data detection client/server model for reporting, monitoring, and control
in the control center level. In other words, the technology between IEDs and the SCADA system. As shown in Fig. 1,
does not detect measurement-based attacks at the substations in order to transmit the measurement data to the SCADA
before malicious measurements arrive at the control cen- system, the gateway as MMS client sends ‘‘read-request’’
ters. 2) The specification-based IDS at the substation level to access the information contained in the IED objects.
is not able to identify false measurements if the fabricated Then, the corresponding IED, as MMS server, sends the
data is encapsulated with legitimate headers. 3) Cyberattacks response back with the measurement data encapsulated in
targeting measurements at multiple substations cannot be MMS messages. As a line of defense to detect the mea-
detected by local substation IDSs without a system strategy. surement attack at SAS, the proposed IDS is configured
4) Although IEC 62351-4 specifies the cyber security of to detect/mitigate the falsified measurements within MMS
MMS, it is not commonly applied. messages before they are sent to the control center through
The proposed IDS in this paper is able to identify falsi- DNP3 communication.
fied measurements in MMS messages. Based on the law of In the cyberattack against Ukrainian power grid [2],
physics of the electrical network, a distributed IDS against the adversary takes control of servers in the substations
measurement attacks in the substation is proposed. The con- through unauthorized remote access. Once the station net-
tributions of this paper are: work is compromised, the attackers will be capable of
1) Proposing a new method to identify contaminated mea- eavesdropping MMS communication and injecting mali-
surements at the substation level. By doing so, falsified cious packets. Without cyber security scanning at the
measurements will be intercepted before they are sent to substation level, fabricated measurements will be sequen-
the control center. tially transmitted through DNP3 polling. The proposed
between substations, the responsible bus is tasked to verify the UDP/IP protocol and then forward Routable-SV (R-SV)
KVL with measurements from other nodes in this loop. When over WAN. Once the local PDC receives data from other
the summation of branch voltages in the loop does not exceed substations, the real-time measurement will be transmitted to
the error tolerance, KVL holds. the proposed IDS, where the data stream is parsed with local
c) Ohm‘s Law: In Table 1, current phasor ijk denotes the measurements according to the proposed rules.
line current between two substations j, k, and zline denotes the
line impedance. vj , vk are the voltage phasors from substation 4) TIME SYNCHRONIZATION
j and k and kverj , kverk kcerjk are the error coefficients of vj , To synchronize local measurements with the measurements
vk and ijk , respectively. Given the limit of the error tolerance, from other substations, IED supporting IEC 61850-90-5 gen-
Ohm‘s Law between vj and vk is verified with local measure- erates time stamps of the measurements to provide GPS syn-
ment ijk and voltage measurement vk from substation k. chronized time for the IDS. Once a substation PDC receives
synchronized measurements from other substations, it will
2) DEPLOYMENT OF THE IDS IN SAS align the data according to the time stamps. Each substa-
Since MMS messages are the attack targets, the proposed tion, as a distributed node of the proposed IDS, analyzes the
IDS, as a novel security feature, is integrated with the gateway measurements based on time stamps of the packets. There-
as shown in Fig. 1. Based on the proposed IDS, synchronized fore, the communication delay between substations does not
measurements are needed for verification by the three rules. impact the accuracy of the IDS.
Therefore, IEDs with IEC/TR 61850-90-5 capability are
needed to provide synchronized data at the substation [31]. C. SPECIFICATION OF IDS
Figure 3 describes functions of the proposed IDS. First, the
3) DISTRIBUTED ARCHITECTURE module of packet filtering filters out irrelevant traffic. Only
To cross check measurements with other substations, MMS messages responding to the data access request will
the enabling technology of the proposed algorithm is the proceed to the packet parsing module. Synchronized data
wide-area communication of synchronized measurements. from other substations are transmitted from the substation
IEC/TR 61850-90-5 is developed for exchanging syn- PDC to the IDS as an input. At the module of packet parsing,
chrophasor data between different LANs through WANs measurement messages with time stamps are generated based
based on IEC 61850 standard [31]. To secure the communica- on local sample values. Using synchronized measurements
tion over public network, IEC 61850-90-5 provides message from local and other buses, circuit laws in Table 1 are used
authentication and integrity mechanisms, including Group to identify possible violations. After all rules are checked,
Domain of Interpretation (GDOI) key distribution model, the IDS triggers alarms if any violation is detected. For
Hash based Message Authentication Code (HMAC), and mitigation, the proposed IDS will discard malicious data once
Transport Layer Security (TLS). The proposed distributed a violation is verified. Meanwhile, the IDS will transmit
IDS shown in Fig. 2 uses IEC 61850-90-5 for secure trans- actual measurements with time stamps to the gateway. Hence,
mission of the synchronized data. the control center is not impacted by measurement attacks
that take place in the substations.
0
respectively. Loads and generators are treated as branches that the ith voltage measurement is falsified. Similarly, I b =
connected to the ground node. Nonzero entries ‘‘100 and ‘‘−100 T cur I b , T cur = daig (λ1 , λ2 , . . . , λm ). λi 6 = 1 means that the
in each row represent the polarity of the connection. ith branch current is falsified. The adversary can choose any
T cur , T vol to construct the malicious measurements. Thus,
nd 1 nd 2 . . . ndn
there are two attack scenarios:
br1
1 −1 . . . 0
Scenario1: Suppose voltage and current measurements are
br2 0 1 −1 ... (1)
A= . attacked at multiple substations, and T cur , T vol are matrices
.. ...
0 1 −1 and not scalar.
brm −1 . . . 0 1 According to (3), the falsified current measurements are
verified as follows:
The branch voltage vector is a linear combination of the
0
corresponding nodal voltages, i.e., AT I b = AT (T cur I b ) 6 =AT I b = 0 (4)
V b = AV n (2)
Both voltage and current measurements are verified by
where V b , V n denotes the vector of branch voltages (voltage Ohm‘s law:
drops on branches) and nodal voltages, respectively.
T cur diag (Zline ) I b = T cur AV n 6 =AT vol V n (5)
According to KCL, the sum of all currents at each node
equals 0, which is formulated by the matrix AT in (3). Inequalities (4) and (5) show that this proposed attack will
AT I b = 0 (3) be detected by KCL and Ohm‘s law.
Scenario 2: Suppose voltage and current measurements are
where I b is the vector of all branch currents. attacked at multiple substations and Tvol = µ1 , Tcur = µ2 ,
where µ1 , µ2 are scalar.
A. MEASUREMENT ATTACKS AT A SINGLE SUBSTATION a) If µ1 6 = µ2 ,
Let v0nj = vnj represent the observed voltage measurement
at bus j, where 6 = 1 means that the voltage measurement AT (T cur I b ) = µ1 AT I b = 0 (6)
is falsified. Similarly, i0jk = εjk ijk , εjk denotes the attack
Thus, KCL will fail to detect such attacks that all branch
model of current measurement. εjk 6 = 1 means that the current currents in the system are falsified by the factor µ1 . However,
measurement is falsified. Then εjk − 1 ijk represents the
inequality (5) is satisfied, thus Ohm‘s law will detect such
value added to the original measurement.
attacks.
Scenario 1: multiple branch currents at bus j are falsified:
b) If Tvol = Tcur = µ, measurements at all buses are
a) If (εexit − 1) iexit 6 = (εenter − 1) ienter :
P P
multiplied by the same factor µ as follows:
X 0 X X
iexit = iexit + (εexit − 1) iexit
X X T cur diag (Zline ) I b = T cur AV n = µAV n = AT vol V n (7)
6= ienter + (εenter − 1) ienter
X Equations (6), (7) show that the attack targeting all buses
= ienter ,
0
in the system by the same factor can avoid being detected by
the proposed IDS. However, it is unlikely that all of the large
then
PKCL will be violated. number of buses will be attacked at the same time.
b) If (εexit − 1) iexit = (εenter − 1) ienter :
P
X 0 X X X0
iexit = εexit iexit = εenter ienter = ienter , C. KVL DETECTION
Measurement attacks that cannot be detected by Ohm‘s law
In this case, KCL will fail to detect the malicious current and KCL are analyzed based on the KVL detection. Under
measurements. However, Ohm‘s law will be violated by i0jk : this specific scenario, the falsified voltage and current mea-
i0jk zline = (εjk ijk )zline 6 = ijk zline = vnj − vnk . surement v0j , i0kj satisfy KCL and Ohm‘s law at bus j:
Scenario 2: voltage measurement at bus j is falsified:
For any branch current ijk , ijk zline 6 = v0nj − vnk . Thus, Ohm‘ 0 0
vk − vj = ikj zkj (8)
s law of the IDS will be violated at bus j.
Scenario 3: voltage and current measurements are attacked Normally, KVL is satisfied around each loop, i.e., i12 z12 +
at bus j : . . .+in1 zn1 = 0. However, under the attack given by (8), KVL
For any line at bus j, if i0jk zline 6 = v0nj − vnk , the IDS will for the related loop is expressed as:
detect the attack by Ohm‘s law. 0
v1 − v2 + . . . +vk − vj + vj − vj+1 + . . . +vn − v1
B. MEASUREMENT ATTACKS AT MULTIPLE SUBSTATIONS 0
0 = i12 z12 + . . .+ikj zkj + . . . +in1 zn1 6 = 0 (9)
Let V n = T vol V n represent the vector of voltage measure-
ments that may contain falsified data. T vol defines the attack Inequality (9) indicates that KVL is able to uncover such
model, where T vol = diag (ε1 , ε2 , . . . , εn ) .εi 6 = 1 means attacks that cannot be detected by KCL and Ohm‘s Law.
V. TESTBED SETUP
A cyber-physical system testbed is developed to simulate the
measurement attacks and implement the proposed IDS at the
substation level. Simulations are performed on an embedded
computer. The IEEE 39-bus system is implemented in an
industry level power system simulator. As the physical system
layer in the co-simulation environment, the simulated voltage
and current measurements are exported to a simulated sub-
station automation system in real-time. A commercial grade
IEC 61850 source code is embedded to implement the MMS
communication. To detect measurement attacks, the proposed
IDS will parse the data flow of local measurements and
synchronized data from other substations. Fig. 4 illustrates
the data flow of the proposed testbed.
FIGURE 6. Difference between the original and estimated measurements B. PERFORMANCE OF THE IDS
after a stealth attack. 1) DETECTION TIME (DT)
Using Monte Carlo simulation, the measurement attacks tar-
the norm of measurement residuals, kzbad − Xest k, is less geting a random bus in IEEE 39 bus system are executed
than the threshold, referred to the Chi-squares table. Thus, 1000 times on the proposed testbed. DT as a performance
without the proposed substation IDS, this attack can suc- metric is measured for each attack.
cessfully inject malicious errors and bypass bad data detec-
tion. Much research has been concerned with the detection
of stealth attacks targeting state estimation. Usually it is
assumed that attackers have full/partial knowledge of the cur-
rent system configuration. However, the proposed substation
IDS is able to detect and mitigate the falsified measurements
before they are sent out of the substation, whether the attacks
are independent or coordinated.
traffic is too fast. Along with the increase of traffic speed, [12] Y. Wang, M. M. Amin, J. Fu, and H. B. Moussa, ‘‘A novel data analyt-
the delay time between any two packets becomes too small. ical approach for false data injection cyber-physical attack mitigation in
smart grids,’’ IEEE Access, vol. 5, pp. 26022–26033, 2017, doi: 10.1109/
The IDS is not fast enough to identify each packet within the ACCESS.2017.2769099.
mixed data stream at such a high speed, causing the falsified [13] Z. Wang, Y. Chen, F. Liu, Y. Xia, and X. Zhang, ‘‘Power system security
measurements in the missing packets to be misclassified. under false data injection attacks with exploitation and exploration based
on reinforcement learning,’’ IEEE Access, vol. 6, pp. 48785–48796, 2018,
doi: 10.1109/ACCESS.2018.2856520.
VII. CONCLUSION [14] Power Systems Management and Associated Information Exchange—Data
In this paper, the potential attack path of measurement attacks and Communications Security—Part 6: Security for IEC 61850, 1.0,
Standard IEC 62351-6, IEC, 2007.
at the substation level is established. The performance of [15] IEEE Standard for Electric Power Systems Communications-Distributed
the proposed IDS has been validated by simulation with Network Protocol (DNP3), IEEE Standard 1815-2012, Oct. 2012.
realistic measurement attacks. The proposed method achieves [16] C.-W. Ten, C.-C. Liu, and G. Manimaran, ‘‘Vulnerability assessment of
cybersecurity for SCADA systems,’’ IEEE Trans. Power Syst., vol. 23,
a high level of detection accuracy under high speed traffic of no. 4, pp. 1836–1846, Nov. 2008, doi: 10.1109/tpwrs.2008.2002298.
measurement messages. By the proposed IDS, measurement [17] N. Liu, J. Zhang, and X. Wu, ‘‘Asset analysis of risk assessment for IEC
attacks are detected within the substations, thereby avoiding 61850-based power control systems—Part I: Methodology,’’ IEEE Trans.
Power Del., vol. 26, no. 2, pp. 869–875, Apr. 2011, doi: 10.1109/TPWRD.
the impact of falsified measurements on system operation in 2010.2090950.
the control center. For the future work, collaborative IDSs [18] U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh, and J.-C. Tan,
with communication among the substations should be stud- ‘‘An intrusion detection system for IEC61850 automated substations,’’
IEEE Trans. Power Del., vol. 25, no. 4, pp. 2376–2383, Oct. 2010, doi: 10.
ied so that the distributed IDSs will be able to work as 1109/TPWRD.2010.2050076.
a team to detect various attack types targeting the digital [19] Y. Yang, H.-Q. Xu, L. Gao, Y.-B. Yuan, K. McLaughlin, and
substations. S. Sezer, ‘‘Multidimensional intrusion detection system for IEC 61850-
based SCADA networks,’’ IEEE Trans. Power Del., vol. 32, no. 2,
pp. 1068–1078, Apr. 2017, doi: 10.1109/TPWRD.2016.2603339.
ACKNOWLEDGMENT [20] A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and
The authors would like to thank Mr. Randy Steele, American A. Trombetta, ‘‘A multidimensional critical state analysis for detecting
intrusions in SCADA systems,’’ IEEE Trans. Ind. Informat., vol. 7, no. 2,
Electric Power, for his helpful discussions. pp. 179–186, May 2011, doi: 10.1109/TII.2010.2099234.
[21] C.-W. Ten, J. Hong, and C.-C. Liu, ‘‘Anomaly detection for cybersecurity
of the substations,’’ IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865–873,
REFERENCES
Dec. 2011, doi: 10.1109/TSG.2011.2159406.
[1] C.-C. Liu, A. Stefanov, J. Hong, and P. Panciatici, ‘‘Intruders in the grid,’’ [22] J. Hong, C.-C. Liu, and M. Govindarasu, ‘‘Integrated anomaly detection for
IEEE Power Energy Mag., vol. 10, no. 1, pp. 58–66, Jan. 2012, doi: cyber security of the substations,’’ IEEE Trans. Smart Grid, vol. 5, no. 4,
10.1109/MPE.2011.943114. pp. 1643–1653, Jul. 2014, doi: 10.1109/tsg.2013.2294473.
[2] D. I. J. Slowik. CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric [23] J. Hong and C.-C. Liu, ‘‘Intelligent electronic devices with collaborative
Power Event as a Protection-Focused Attack. Accessed: 2019. [Online]. intrusion detection systems,’’ IEEE Trans. Smart Grid, vol. 10, no. 1,
Available: https://dragos.com/wp-content/uploads/CRASHOVERRIDE. pp. 271–281, Jan. 2019, doi: 10.1109/tsg.2017.2737826.
pdf [24] M. Touhiduzzaman, A. Hahn, and A. K. Srivastava, ‘‘A diversity-based
[3] R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, ‘‘False substation cyber defense strategy utilizing coloring games,’’ IEEE Trans.
data injection on state estimation in power systems—Attacks, impacts, Smart Grid, vol. 10, no. 5, pp. 5405–5415, Sep. 2019, doi: 10.1109/
and defense: A survey,’’ IEEE Trans. Ind. Informat., vol. 13, no. 2, TSG.2018.2881672.
pp. 411–423, Apr. 2017, doi: 10.1109/TII.2016.2614396. [25] R. Macwan, C. Drew, P. Panumpabi, A. Valdes, N. Vaidya, P. Sauer,
[4] Y. Liu, P. Ning, and M. K. Reiter, ‘‘False data injection attacks against state and D. Ishchenko, ‘‘Collaborative defense against data injection attack in
estimation in electric power grids,’’ ACM Trans. Inf. Syst. Secur., vol. 14, IEC61850 based smart substations,’’ in Proc. IEEE Power Energy Soc.
no. 1, pp. 1–33, May 2011, doi: 10.1145/1952982.1952995. Gen. Meeting (PESGM), Jul. 2016, pp. 1–5, doi: 10.1109/PESGM.2016.
[5] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, ‘‘Malicious data attacks on the 7741376.
smart grid,’’ IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658, Dec. 2011, [26] S. Sheng, W. L. Chan, K. K. Li, D. Xianzhong, and Z. Xiangjun, ‘‘Context
doi: 10.1109/TSG.2011.2163807. information-based cyber security defense of protection system,’’ IEEE
[6] G. Hug and J. A. Giampapa, ‘‘Vulnerability assessment of AC state estima- Trans. Power Del., vol. 22, no. 3, pp. 1477–1481, Jul. 2007, doi: 10.1109/
tion with respect to false data injection cyber-attacks,’’ IEEE Trans. Smart TPWRD.2006.886775.
Grid, vol. 3, no. 3, pp. 1362–1370, Sep. 2012, doi: 10.1109/TSG.2012. [27] S. Kwon, H. Yoo, and T. Shon, ‘‘IEEE 1815.1-based power system security
2195338. with bidirectional RNN-based network anomalous attack detection for
[7] B. Chen, H. Li, and B. Zhou, ‘‘Real-time identification of false data cyber-physical system,’’ IEEE Access, vol. 8, pp. 77572–77586, 2020,
injection attacks: A novel dynamic-static parallel state estimation based doi: 10.1109/ACCESS.2020.2989770.
mechanism,’’ IEEE Access, vol. 7, pp. 95812–95824, 2019, doi: 10.1109/ [28] IEEE Standard for Exchanging Information Between Networks Implement-
ACCESS.2019.2929785. ing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol
[8] T. T. Kim and H. V. Poor, ‘‘Strategic protection against data injec- (DNP3)], IEEE Standard 1815.1-2015, Dec. 2015.
tion attacks on power grids,’’ IEEE Trans. Smart Grid, vol. 2, no. 2, [29] R. Minkner and E. O. Schweitzer, ‘‘Low power voltage and current
pp. 326–333, Jun. 2011, doi: 10.1109/TSG.2011.2119336. transducers for protecting and measuring medium and high voltage sys-
[9] A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, tems,’’ in Proc. Western Protective Relay Conf., Spokane, WA, USA,
‘‘Smart grid data integrity attacks,’’ IEEE Trans. Smart Grid, vol. 4, no. 3, 1999.
pp. 1244–1253, Sep. 2013, doi: 10.1109/TSG.2013.2245155. [30] L. Sevov, Z. Zhang, I. Voloh, and J. Cardenas, ‘‘Differential protection for
[10] J. Zhao, G. Zhang, and R. A. Jabr, ‘‘Robust detection of cyber attacks power transformers with non-standard phase shifts,’’ in Proc. 64th Annu.
on state estimators using phasor measurements,’’ IEEE Trans. Power Conf. Protective Relay Eng., Apr. 2011, pp. 301–309, doi: 10.1109/CPRE.
Syst., vol. 32, no. 3, pp. 2468–2470, May 2017, doi: 10.1109/TPWRS. 2011.6035631.
2016.2603447. [31] Communication Networks and Systems for Power Utility Automation—Part
[11] Y. He, G. J. Mendis, and J. Wei, ‘‘Real-time detection of false data 90-5: Use of IEC 61850 to Transmit Synchrophasor Information According
injection attacks in smart grid: A deep learning-based intelligent mecha- to IEEE C37.118, Standard IEC TR 61850-90-5:2012, 2012.
nism,’’ IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2505–2516, Sep. 2017, [32] F. H. Branin, ‘‘Computer methods of network analysis,’’ Proc. IEEE,
doi: 10.1109/TSG.2017.2703842. vol. 55, no. 11, pp. 1787–1801, Nov. 1967, doi: 10.1109/PROC.1967.6010.
RUOXI ZHU (Graduate Student Member, IEEE) JUNHO HONG (Member, IEEE) is currently an
received the M.S. degree in electrical engineering Assistant Professor of electrical and computer
from Virginia Tech, in 2020, where she is currently engineering with the University of Michigan–
pursuing the Ph.D. degree. Her research interests Dearborn. He has been working on cybersecurity
include cyber-physical security of power systems, of energy delivery systems with the Department of
and voltage stability monitoring and control. Energy sponsored projects in the areas of substa-
tion, microgrid, HVDC, FACTS, and high-power
EV charger.
CHEN-CHING LIU (Life Fellow, IEEE) is cur- JIANKANG WANG (Member, IEEE) is currently
rently an American Electric Power Professor and an Assistant Professor of electrical and com-
the Director of the Power and Energy Center, puter engineering with The Ohio State Univer-
Virginia Tech. He is also an Adjunct Full Pro- sity, where she is also an Adjunct Professor with
fessor with University College Dublin, Ireland. the Department of Integrated System Engineering.
He is a member of the U.S. National Academy of She was appointed as a Lead Technical Specialist
Engineering. with California ISO, in 2018. Her research inter-
ests include electricity markets, renewable energy,
PEV integration, and power system cyber-security.