Implementation of IEEE C37.118 Packet Manipulation Tool, pySynphasor for Power System Security Evaluation

Shuvangkar Chandra Das,Tuyen Vu,Herbert Ginn,Karl Schoder

2023 IEEE Electric Ship Technologies Symposium (ESTS)(2023)

引用 0|浏览1
暂无评分
摘要
This paper introduces an interactive method for designing real-time cyber-physical attacks on synchrophasor-based systems. To analyze the security vulnerabilities of the synchrophasor protocol (IEEE C37.118), we have developed an open-source Python framework called pySynphasor. This framework facilitates the dissection and construction of IEEE C37.118 packets, enabling the security analysis, implementation of PMU - based systems and vulnerability testing. Therefore, it benefits both the power industry and academia. Using the pySynphasor framework, different types of attacks, including False Data Injection Attacks (FDIA), eavesdropping, and fuzzing attacks, can be interactively implemented on PMU-based systems. A case study demonstrates the implementation of an FDIA attack as a capability of pySynphasor.
更多
查看译文
关键词
pySynphasor,IEEE C37.118 FDIA Attack,FDIA,MITM,Testbed,micro-PMU,PMU Attack,Synchropha-sor Packet Manipulation,Scapy in Power System,IEEE C37.118 Packet Injection,PMU Vulnerability Testing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要