Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perf...

Full description

Saved in:
Bibliographic Details
Published inIET cyber-physical systems Vol. 6; no. 3; pp. 164 - 177
Main Authors Wlazlo, Patrick, Sahu, Abhijeet, Mao, Zeyu, Huang, Hao, Goulart, Ana, Davis, Katherine, Zonouz, Saman
Format Journal Article
LanguageEnglish
Published Southampton John Wiley & Sons, Inc 01.09.2021
Institution of Engineering and Technology (IET)
Wiley
Subjects
Online AccessGet full text
ISSN2398-3396
2398-3396
DOI10.1049/cps2.12014

Cover

Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
AbstractList Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
Author Wlazlo, Patrick
Davis, Katherine
Sahu, Abhijeet
Goulart, Ana
Huang, Hao
Mao, Zeyu
Zonouz, Saman
Author_xml – sequence: 1
  givenname: Patrick
  surname: Wlazlo
  fullname: Wlazlo, Patrick
  organization: Texas A&M University
– sequence: 2
  givenname: Abhijeet
  orcidid: 0000-0002-7647-3758
  surname: Sahu
  fullname: Sahu, Abhijeet
  organization: Texas A&M University
– sequence: 3
  givenname: Zeyu
  surname: Mao
  fullname: Mao, Zeyu
  organization: Texas A&M University
– sequence: 4
  givenname: Hao
  surname: Huang
  fullname: Huang, Hao
  organization: Texas A&M University
– sequence: 5
  givenname: Ana
  orcidid: 0000-0001-7184-7485
  surname: Goulart
  fullname: Goulart, Ana
  email: goulart@tamu.edu
  organization: Texas A&M University
– sequence: 6
  givenname: Katherine
  surname: Davis
  fullname: Davis, Katherine
  organization: Texas A&M University
– sequence: 7
  givenname: Saman
  surname: Zonouz
  fullname: Zonouz, Saman
  organization: Rutgers University
BackLink https://www.osti.gov/biblio/1798924$$D View this record in Osti.gov
BookMark eNp9kMuKFDEUhgsZwXGcjU9Q6E7pMbe6LaUZdWBEwcs2nDo5ZaetTsokTVM7H2GecZ7E9JSIiMzmnBC-_0v4HxcnzjsqiqecXXCmulc4RXHBBePqQXEqZNeupOzqk7_Oj4rzGLeMMdE2qpLstPj6Htztzxt7HGlDee6sMSOVkBLg91iCM6WhgRxSaV0J5eQPFMo4x0S7EueeQg5NmzlahLFMFFNP5knxcIAx0vnvfVZ8eXP5ef1udf3h7dX69fUKVd2plWm5kRVDpfq-GxS0AwFvOz6wvGtVG0EcTdMgM6qvOScx1FijhEahRFDyrLhavMbDVk_B7iDM2oPVdxc-fNMQksWRdC_IMKyAqibLDINhqFslemmglk1H2fVyce3dBPMBxvGPkDN9bFgfG9Z3DWf62UL7mKyOaBPhBr1zhEnzpms7cYSeL9AU_I99rkZv_T643IiWrBOSV1yxTLGFwuBjDDTobINkvUsB7Pj_11_8E7n3q3yBD3ak-R5Srz9-EkvmFxHfuhI
CitedBy_id crossref_primary_10_1016_j_epsr_2023_109435
crossref_primary_10_1109_OAJPE_2023_3239186
crossref_primary_10_3390_electronics11111762
crossref_primary_10_3390_s22062100
crossref_primary_10_3390_smartcities7040085
crossref_primary_10_1109_OAJPE_2024_3489477
crossref_primary_10_3390_fi16030085
crossref_primary_10_1016_j_cose_2024_103761
crossref_primary_10_3390_s23115192
crossref_primary_10_1109_TIA_2023_3308557
crossref_primary_10_1016_j_enconman_2024_118949
crossref_primary_10_1016_j_procs_2023_09_031
crossref_primary_10_1186_s42400_023_00200_w
crossref_primary_10_1007_s10207_023_00732_9
crossref_primary_10_1109_ACCESS_2024_3477714
crossref_primary_10_3389_fenrg_2024_1502078
crossref_primary_10_1016_j_epsr_2022_108975
crossref_primary_10_3390_en16227644
crossref_primary_10_3390_electronics11162627
crossref_primary_10_1109_JESTIE_2024_3451720
crossref_primary_10_3390_app14114530
crossref_primary_10_1109_JESTPE_2023_3242299
crossref_primary_10_1049_cps2_12047
crossref_primary_10_3390_jcp3040031
crossref_primary_10_1016_j_ijepes_2022_108409
crossref_primary_10_1109_COMST_2023_3344808
crossref_primary_10_1109_OJIA_2024_3365576
crossref_primary_10_1145_3723164
crossref_primary_10_1109_TDSC_2023_3321176
crossref_primary_10_3390_en16124590
crossref_primary_10_1016_j_jnca_2022_103540
crossref_primary_10_1049_esi2_12068
crossref_primary_10_1109_JPROC_2024_3405709
crossref_primary_10_1109_TIA_2022_3186660
crossref_primary_10_12677_CSA_2023_1312231
crossref_primary_10_3390_app14177838
crossref_primary_10_3390_en16124573
crossref_primary_10_1016_j_jfranklin_2024_106661
crossref_primary_10_3390_app13169451
crossref_primary_10_4236_jcc_2022_107007
crossref_primary_10_1109_TCST_2024_3378993
crossref_primary_10_3390_en15186799
crossref_primary_10_1109_ACCESS_2022_3209698
crossref_primary_10_1016_j_asoc_2022_109960
Cites_doi 10.1109/NAPS.2014.6965381
10.1109/MILCOM.2008.4753614
10.1109/TPWRD.2016.2603339
10.1109/ICDIS.2018.00028
10.1109/TPEC.2019.8662189
10.1016/j.epsr.2020.106795
10.1109/MSP.2011.67
10.1109/SoutheastCon42311.2019.9020426
10.1109/JSYST.2018.2832065
10.1049/cp.2012.1831
10.1109/TSG.2011.2123925
10.1109/TII.2020.3024069
10.1109/TSG.2015.2432013
10.1109/TPWRS.2016.2616385
10.1109/PESGM.2015.7286615
10.1109/IPTCOMM.2019.8921260
10.24251/HICSS.2017.385
10.1016/j.comnet.2012.12.017
ContentType Journal Article
Copyright 2021 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
2021. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2021 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
– notice: 2021. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 24P
AAYXX
CITATION
8FE
8FG
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
OTOTI
ADTOC
UNPAY
DOA
DOI 10.1049/cps2.12014
DatabaseName Wiley - Open Access
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
OSTI.GOV
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList

CrossRef
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: 24P
  name: Wiley - Open Access
  url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  sourceTypes: Publisher
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2398-3396
EndPage 177
ExternalDocumentID oai_doaj_org_article_b2ed0c5ae57d4bd0aff6842b3da6379e
10.1049/cps2.12014
1798924
10_1049_cps2_12014
CPS212014
Genre article
GrantInformation_xml – fundername: U.S. Department of Energy
  funderid: DE‐OE0000895
GroupedDBID 0R~
1OC
24P
6IK
AAHHS
AAHJG
AAJGR
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACXQS
ADBBV
AEEZP
AEQDE
AFKRA
AIWBW
AJBDE
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ARAPS
AVUZU
BCNDV
BENPR
BGLVJ
CCPQU
EBS
GROUPED_DOAJ
HCIFZ
IAO
IDLOA
IFIPE
IPLJI
ITC
JAVBF
K7-
M7S
M~E
O9-
OCL
OK1
PIMPY
PTHSS
RIE
RUI
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IGS
PHGZM
PHGZT
PQGLB
WIN
8FE
8FG
ABUWG
AZQEC
DWQXO
GNUQQ
JQ2
L6V
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
OTOTI
ADTOC
UNPAY
ID FETCH-LOGICAL-c4694-d81d350c44bb9f4a8fea1891f0ea1646d2e1cd77c0d4b611e2f6c6c3a74c3ca43
IEDL.DBID DOA
ISSN 2398-3396
IngestDate Fri Oct 03 12:40:07 EDT 2025
Sun Oct 26 04:10:57 EDT 2025
Mon Feb 17 04:11:41 EST 2025
Wed Aug 13 05:56:14 EDT 2025
Thu Apr 24 23:04:05 EDT 2025
Wed Oct 29 21:20:38 EDT 2025
Wed Jan 22 16:28:04 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License Attribution-NonCommercial
cc-by-nc
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4694-d81d350c44bb9f4a8fea1891f0ea1646d2e1cd77c0d4b611e2f6c6c3a74c3ca43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
USDOE
DE‐OE0000895
ORCID 0000-0002-7647-3758
0000-0001-7184-7485
0000000276473758
0000000171847485
OpenAccessLink https://doaj.org/article/b2ed0c5ae57d4bd0aff6842b3da6379e
PQID 3092315140
PQPubID 6853487
PageCount 14
ParticipantIDs doaj_primary_oai_doaj_org_article_b2ed0c5ae57d4bd0aff6842b3da6379e
unpaywall_primary_10_1049_cps2_12014
osti_scitechconnect_1798924
proquest_journals_3092315140
crossref_citationtrail_10_1049_cps2_12014
crossref_primary_10_1049_cps2_12014
wiley_primary_10_1049_cps2_12014_CPS212014
PublicationCentury 2000
PublicationDate September 2021
PublicationDateYYYYMMDD 2021-09-01
PublicationDate_xml – month: 09
  year: 2021
  text: September 2021
PublicationDecade 2020
PublicationPlace Southampton
PublicationPlace_xml – name: Southampton
– name: United Kingdom
PublicationTitle IET cyber-physical systems
PublicationYear 2021
Publisher John Wiley & Sons, Inc
Institution of Engineering and Technology (IET)
Wiley
Publisher_xml – name: John Wiley & Sons, Inc
– name: Institution of Engineering and Technology (IET)
– name: Wiley
References 2015; 6
2011; 2
2012
2011
2013; 57
2020
2019; 13
2017; 32
2021; 17
2019
2008
2007
2018
2017
2005
2020; 189
2015
2004
2014
2016; 1–1
2019; 161
2011; 9
e_1_2_9_31_1
Clarke G. (e_1_2_9_24_1) 2004
e_1_2_9_11_1
e_1_2_9_34_1
e_1_2_9_10_1
e_1_2_9_12_1
Lu X. (e_1_2_9_19_1) 2011
Orebaugh A.D. (e_1_2_9_30_1) 2005
e_1_2_9_15_1
e_1_2_9_14_1
Rossum G. (e_1_2_9_33_1) 2020
e_1_2_9_17_1
e_1_2_9_16_1
e_1_2_9_18_1
e_1_2_9_20_1
e_1_2_9_22_1
Burns B. (e_1_2_9_13_1) 2007
e_1_2_9_21_1
e_1_2_9_23_1
Liang G. (e_1_2_9_5_1) 2016; 1
e_1_2_9_8_1
e_1_2_9_7_1
e_1_2_9_6_1
e_1_2_9_4_1
e_1_2_9_3_1
e_1_2_9_2_1
Rosborough C. (e_1_2_9_26_1) 2019
Rodofile N. (e_1_2_9_32_1) 2015
e_1_2_9_9_1
e_1_2_9_25_1
e_1_2_9_28_1
e_1_2_9_27_1
e_1_2_9_29_1
References_xml – volume: 189
  year: 2020
  article-title: A3d: Attention‐based auto‐encoder anomaly detector for false data injection attacks
  publication-title: Elect Power Syst Res
– start-page: 1
  year: 2019
  end-page: 8
– volume: 2
  start-page: 382
  issue: 2
  year: 2011
  end-page: 390
  article-title: Modeling load redistribution attacks in power systems
  publication-title: IEEE Transactions on Smart Grid
– volume: 32
  issue: 4
  year: 2017
  article-title: Grid structural characteristics as validation criteria for synthetic networks
  publication-title: IEEE Trans Power Syst
– year: 2005
– volume: 32
  start-page: 1068
  issue: 2
  year: 2017
  end-page: 1078
  article-title: Multidimensional intrusion detection system for iec 61850‐based scada networks
  publication-title: IEEE Trans Power Deliv
– start-page: 1
  year: 2019
  end-page: 6
– year: 2007
– start-page: 1
  year: 2008
  end-page: 7
– volume: 57
  start-page: 1344
  year: 2013
  end-page: 1371
  article-title: Cyber security in the smart grid: survey and challenges
  publication-title: Comput Network
– start-page: 1
  year: 2014
  end-page: 6
– start-page: 67
  year: 2015
  end-page: 70
– volume: 6
  start-page: 2444
  issue: 5
  year: 2015
  end-page: 2453
  article-title: Analyzing the cyber‐physical impact of cyber events on the power grid
  publication-title: IEEE Transactions on Smart Grid
– volume: 13
  start-page: 1851
  issue: 2
  year: 2019
  end-page: 1860
  article-title: An event‐triggered secondary control strategy with network delay in islanded microgrids
  publication-title: IEEE Systems Journal
– start-page: 1
  year: 2015
  end-page: 5
– volume: 161
  year: 2019
– year: 2020
– year: 2004
– start-page: 131
  year: 2018
  end-page: 134
– start-page: 1
  year: 2011
  end-page: 6
– volume: 9
  start-page: 49
  issue: 3
  year: 2011
  end-page: 51
  article-title: Stuxnet: dissecting a cyberwarfare weapon
  publication-title: IEEE Security & Privacy
– year: 2017
– start-page: 1
  year: 2012
  end-page: 8
– volume: 1–1
  start-page: 11
  year: 2016
  article-title: The 2015 Ukraine blackout: implications for false data injection attacks
  publication-title: IEEE Transactions on Power Systems
– volume: 17
  start-page: 4545
  issue: 7
  year: 2021
  end-page: 4554
  article-title: Delay‐tolerant predictive power compensation control for photovoltaic voltage regulation
  publication-title: IEEE Transactions on Industrial Informatics
– ident: e_1_2_9_14_1
  doi: 10.1109/NAPS.2014.6965381
– ident: e_1_2_9_28_1
  doi: 10.1109/MILCOM.2008.4753614
– ident: e_1_2_9_16_1
  doi: 10.1109/TPWRD.2016.2603339
– ident: e_1_2_9_31_1
– ident: e_1_2_9_6_1
– ident: e_1_2_9_25_1
– ident: e_1_2_9_18_1
  doi: 10.1109/ICDIS.2018.00028
– volume-title: Security Power Tools
  year: 2007
  ident: e_1_2_9_13_1
– volume-title: Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems
  year: 2004
  ident: e_1_2_9_24_1
– ident: e_1_2_9_17_1
  doi: 10.1109/TPEC.2019.8662189
– ident: e_1_2_9_7_1
  doi: 10.1016/j.epsr.2020.106795
– ident: e_1_2_9_3_1
  doi: 10.1109/MSP.2011.67
– ident: e_1_2_9_4_1
– ident: e_1_2_9_2_1
  doi: 10.1109/SoutheastCon42311.2019.9020426
– ident: e_1_2_9_20_1
  doi: 10.1109/JSYST.2018.2832065
– ident: e_1_2_9_27_1
– ident: e_1_2_9_15_1
  doi: 10.1049/cp.2012.1831
– volume-title: 13th Australasian Information Security Conference
  year: 2019
  ident: e_1_2_9_26_1
– volume-title: The Python Library Reference, Release 3.8.2
  year: 2020
  ident: e_1_2_9_33_1
– ident: e_1_2_9_8_1
  doi: 10.1109/TSG.2011.2123925
– ident: e_1_2_9_21_1
  doi: 10.1109/TII.2020.3024069
– ident: e_1_2_9_10_1
  doi: 10.1109/TSG.2015.2432013
– ident: e_1_2_9_22_1
  doi: 10.1109/TPWRS.2016.2616385
– ident: e_1_2_9_12_1
  doi: 10.1109/PESGM.2015.7286615
– start-page: 1
  volume-title: 2011 IEEE global telecommunications conference – GLOBECOM
  year: 2011
  ident: e_1_2_9_19_1
– ident: e_1_2_9_23_1
  doi: 10.1109/IPTCOMM.2019.8921260
– ident: e_1_2_9_11_1
  doi: 10.24251/HICSS.2017.385
– volume-title: Snort Cookbook
  year: 2005
  ident: e_1_2_9_30_1
– start-page: 67
  volume-title: Proceedings of the 13th Australasian Information Security Conference (AISC 2015)
  year: 2015
  ident: e_1_2_9_32_1
– ident: e_1_2_9_34_1
– volume: 1
  start-page: 11
  year: 2016
  ident: e_1_2_9_5_1
  article-title: The 2015 Ukraine blackout: implications for false data injection attacks
  publication-title: IEEE Transactions on Power Systems
– ident: e_1_2_9_9_1
  doi: 10.1016/j.comnet.2012.12.017
– ident: e_1_2_9_29_1
SSID ssj0002874530
Score 2.4973373
Snippet Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two...
Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between...
Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between...
SourceID doaj
unpaywall
osti
proquest
crossref
wiley
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 164
SubjectTerms Automatic control
Automation
Data integrity
Denial of service attacks
Design
Distributed network protocols
Electric power systems
Electricity distribution
Energy industry
Industrial development
Intrusion
Intrusion detection systems
Power dispatch
Protocol
Smart grid
State estimation
Test stands
Wide area networks
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NbtQwEB6V7QE4IH5FaEGW6AWkUCdx4uSAEK1aVUhdVUBRb5Y9tlGlJRu2qVBvPALPyJPg8SYLK6G92FE0URKPx_48Hn8DsCeE0VwYm0pf6VQ0AcM1FCYm0WFYj1j0jvyQp9Pq5Fx8uCgvtmA6noWhsMpxTIwDtZ0j-cj3C05QJEzv_F33PaWsUbS7OqbQ0ENqBfs2Uozdgu2cmLEmsH1wND37uPK6RHb3go88paLZx-4qf5OFaVCszUyRwD9U82Boa-Dz9nXb6ZsfejZbh7NxPjq-D_cGIMneLzX_ALZc-xDu_kMv-Ai-nOr2989fl1QEnBfKb9EdwXTf09F6plvLrPNk3OyyZZp1lDONLdmdGd4YtwgPdYMqWUClvXH2MZwfH30-PEmHPAophsWvSG3ApEXJMejFNF7o2jud1U3meagrUdncZWilRG6FqbLM5b7CCgstBRaoRfEEJu28dU-BaV_KorZYZ44L6aRxptbSNihtnlmsEng1tqHCgWSccl3MVNzsFo2i9laxvRN4uZLtltQa_5U6IFWsJIgOO96YL76qwbqUyZ3lWGpXyvALlmvvaX_RFFZXhWxcAjukSBVQBVHjIsUQYa-IrC2sPxPYHfWrBgu-Un_7WwJ7K51v_NDXsTtsEFGHZ5_yePVs8yt34E5OsTMxlm0XJv3i2j0P4Kc3L4Ye_Qf88Af_
  priority: 102
  providerName: ProQuest
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1faxQxEB_q9UF98L-4tkrQvijsuX-yyeaxHpYitBT0pD6FZJJA8dwu7R6lffIj-Bn9JCa53cMVOXxJlmWyZDMz5Jdk8huAPUq1yqg2KXdMpVR4DCdCmBhHi349YtDZsA95dMwO5_TjaXW6Ba-GuzCj83sq3mF7WUxzP0vRW7DNKo-3J7A9Pz7Z_xqzxok6LUvBBt7RUYPRTBMJ-X117h1nBCZvL5tWXV-pxWIMT-P8cnAfZkPPVmEl36bLTk_x5i_Sxs1dfwD3enhJ9lf28BC2bPMI7v5BOvgYvhyp5tePn2eh8OjPl9_jJgVRXRcu3BPVGGKsCy5PzhqiSBsyqZEV5zPBa20vfKO2VzDxWLXT1jyB-cGHz7PDtM-ukKJfEtPUeKRaVhl6bWnhqKqdVXktcpf5mlFmCpuj4RwzQzXLc1s4hgxLxSmWqGj5FCbNeWOfAVGu4mVtsM5tRrnl2upacSOQmyI3yBJ4M2hCYk89HjJgLGQ8AqdChrGScawSeL2WbVeEG_-Ueh8UupYIJNnxhVeA7H1O6sKaDCtlK-5_wWTKuXDqqEujWMmFTWAnmIP0WCMQ5mKILMJOBgo3vypNYHewEtn79aUsswCIPcjMEthbW87Gjr6NRrVBRM5OPhXx6fn_fXMH7hQhsiZGuu3CpLtY2hceGnX6Ze8bvwGZMg5K
  priority: 102
  providerName: Unpaywall
– databaseName: Wiley Online Library Open Access
  dbid: 24P
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fa9UwFA5zPqgP4k-smxJwLwrVtEmbFnzR4RjCZKCTvYXkJBmDa2-565C9-Sf4N_qXeE7aW70gA1-aUk6gzZfTfElOvsPYnlLOCuV8rmNtc9Uih2spTExDAJyPeIiB1iGPPtWHJ-rjaXW6xd6uz8KM-hDzght5Rvpfk4NbN2YhQVKLIEJ_Ub4ucPxSN9jNAokM9e9SHc8rLEnJPSUbIY27XKLFWp9UtW_-VN8YkZJwPxZLdLAN0nnrsuvt1Xe7WGzS2DQOHdxjdycCyd-NiN9nW6F7wO78JSv4kH09st2vHz_P6YL8Dq_f0jIEt8NAR-q57Tz3IZJT8_OOW95TrjQ-qjpzuHJhhZX6CUKObHRwwT9iJwcfvuwf5lP-hBxw0qtyj1xUVgIQD9dGZZsYbNG0RRRY1qr2ZSjAaw3CK1cXRShjDTVIqxVIsEo-ZtvdsgtPGLex0rLx0BRBKB20C66x2regfVl4qDP2ct2GBiZxccpxsTBpk1u1htrbpPbO2IvZth8lNf5p9Z6gmC1IBjs9WK7OzORVxpXBC6hsqDR-ghc2RtpXdNLbWuo2ZGyHgDTIJkgSFyh2CAZDIm0478zY7hpfM3nuhZGCKC_SSJGxvRnza1_0VeoO15iY_ePPZbp7-j_GO-x2SRE0KaJtl20Pq8vwDCnQ4J6nnv4bDP0ELg
  priority: 102
  providerName: Wiley-Blackwell
Title Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
URI https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcps2.12014
https://www.proquest.com/docview/3092315140
https://www.osti.gov/biblio/1798924
https://doi.org/10.1049/cps2.12014
https://doaj.org/article/b2ed0c5ae57d4bd0aff6842b3da6379e
UnpaywallVersion publishedVersion
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2398-3396
  dateEnd: 20241231
  omitProxy: true
  ssIdentifier: ssj0002874530
  issn: 2398-3396
  databaseCode: DOA
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVBHI
  databaseName: IET Digital Library Open Access
  customDbUrl:
  eissn: 2398-3396
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002874530
  issn: 2398-3396
  databaseCode: IDLOA
  dateStart: 20161201
  isFulltext: true
  titleUrlDefault: https://digital-library.theiet.org/content/collections
  providerName: Institution of Engineering and Technology
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2398-3396
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002874530
  issn: 2398-3396
  databaseCode: M~E
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2398-3396
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002874530
  issn: 2398-3396
  databaseCode: BENPR
  dateStart: 20161201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: KBPluse Wiley Online Library: Open Access
  customDbUrl:
  eissn: 2398-3396
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002874530
  issn: 2398-3396
  databaseCode: AVUZU
  dateStart: 20161231
  isFulltext: true
  titleUrlDefault: https://www.kbplus.ac.uk/kbplus7/publicExport/pkg/559
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley - Open Access
  customDbUrl:
  eissn: 2398-3396
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002874530
  issn: 2398-3396
  databaseCode: 24P
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NbtQwELagHIAD4leElpUlegFpqZM4cXJsqy4VUlcrYFE5WfbYllotadSmQr3xCDwjT8KMk13tSqhcuNhJ5ETOzDj-xp58w9iulNYIad1YhdKMZY0YrqYwMQUe0B9xEDytQ55My-O5_HhanK6l-qKYsJ4euBfcns28E1AYXyiHzxQmBNo6srkzZa5qT19fUdVrztR5XDJSssjFko9U1nvQXmXvU5zu5MYMFIn6sbrAAbUBMu9fN625-WEWi03YGuedyWP2aACMfL_v6BN2xzdP2cM1GsFn7OuJaX7__HVGBeI5LL_HZQduuo5-oeemcdz5QIOYnzXc8JZyo_GexZnDjfWXeFM7qIwj-uysd8_ZfHL05fB4PORLGAM6uXLsEHvmhQCUv62DNFXwJq3qNAisS1m6zKfglAKBkizT1GehhBJyoyTkYGT-gm01F41_ybgJhcorB1XqhVReWW8ro1wNymWpgzJhb5cy1DCQiVNOi4WOm9qy1iRvHeWdsDertm1PofHXVgekilULor2OF9AY9GAM-l_GkLBtUqRG9EAUuECxQtBpImVDPzNhO0v96mGkXulcEMRF2CgStrvS-a0dfRfN4ZYm-nD2OYtHr_7HW22zBxlF0sTIth221V1e-9cIhTo7YnczOcOymnwYsXsHR9PZp1EcCXg2n872v_0BSL8QsQ
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELZKeygcEL8itIAlygGk0Px4482hQrS02tLuqoIW9ebaYwdVWrJhN1W1Nx6BJ-JheBJmvMnCSmhvvdhR5CSOZ2x_Y4-_YWxLCKMjYWwoi0yHIkcMl5ObmAQHaI9YKBytQ_YHWe9MfDzvnK-wX-1ZGHKrbMdEP1DbEdAa-XYaERTB6T16V30PKWoU7a62ITR0E1rB7niKseZgx5GbXqMJN9k5_IDyfpUkB_une72wiTIQApqGIrSI2NJOBFhrkxdCdwun424eFxHmmchs4mKwUkJkhcni2CVFBhmkWgpIQYsU33uLrYlU5Gj8re3uD04-zVd5PJt8GrW8qCLfhmqSvI1x2hULM6EPGIDZCDv2AthdvyorPb3Ww-EifPbz38E9drcBrvz9TNPusxVXPmB3_qEzfMi-9HX5-8fPS0oQV2L6zS9_cF3XdJSf69Jy6woaTPhlyTWvKEYbn7FJc5gaN8aHqkZ1OKLg2jj7iJ3dSIs-ZqvlqHRPGNdFR6ZdC93YRUI6aZzpamlzkDaJLWQBe922oYKG1JxiawyV31wXuaL2Vr69A_ZyXraaUXn8t9QuiWJegui3_Y3R-KtqerMyibMRdLTrSPwFG-mioP1Mk1qdpTJ3AdsgQSpEMUTFC-SzBLUicji0dwO22cpXNSPGRP3V74BtzWW-tKJvvDosKaL2Tj4n_urp8k--YOu90_6xOj4cHG2w2wn57Xg_uk22Wo-v3DMEXrV53mg3Zxc33aH-ALATRaU
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NbtQwELZgK0E5IH5FaAFL9AJSwImdODmWwqr8tKoEW1VcLHtso0rbbLRNhXrjEXhGngSPkw2shCpxiaNoEiUeT_zNePwNITtCGM2Esan0pU5FHTBcjWliEhwEf8SCdxiHPDgs92fiw0lxMuTm4F6Ynh9iDLihZcT_NRq4a63vHU6BJJnQnuevsjCBietkI0zkTEzIxu7x7OtsDLJEMvdYbwRp7lLO63JFUSrq138esDYpRe7-0CyCja3hzpsXTasvv-v5fB3JxqloeofcHjAk3e2Vfpdcc809cusvZsH75PhAN79-_DzFQ4B44XgWIxFUdx3uqqe6sdQ6j3ZNTxuqaYvl0mhP7Ezh0rhluKkdtEgDIO2Msw_IbPruy95-OpRQSCH4vSK1AY7ygkFQiam90JV3OqvqzLPQlqK0ucvASgnMClNmmct9CSVwLQVw0II_JJNm0bhHhGpfSF5ZqDLHhHTSOFNpaWuQNs8slAl5sepDBQO_OJa5mKu4zi1qhf2tYn8n5Pko2_asGv-UeoOqGCWQCTteWCy_qcGwlMmdZVBoV8jwCZZp73Fp0XCrSy5rl5AtVKQKgAJZcQHTh6BTyNMWXM-EbK_0qwbjPVecIeoNSJIlZGfU-ZUv-jIOhytE1N7R5zyePf4f4WfkxtHbqfr0_vDjFtnMMZ8m5rdtk0m3vHBPAiDqzNNh2P8GrGkI7g
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1faxQxEB_q9UF98L-4tkrQvijsuX-yyeaxHpYitBT0pD6FZJJA8dwu7R6lffIj-Bn9JCa53cMVOXxJlmWyZDMz5Jdk8huAPUq1yqg2KXdMpVR4DCdCmBhHi349YtDZsA95dMwO5_TjaXW6Ba-GuzCj83sq3mF7WUxzP0vRW7DNKo-3J7A9Pz7Z_xqzxok6LUvBBt7RUYPRTBMJ-X117h1nBCZvL5tWXV-pxWIMT-P8cnAfZkPPVmEl36bLTk_x5i_Sxs1dfwD3enhJ9lf28BC2bPMI7v5BOvgYvhyp5tePn2eh8OjPl9_jJgVRXRcu3BPVGGKsCy5PzhqiSBsyqZEV5zPBa20vfKO2VzDxWLXT1jyB-cGHz7PDtM-ukKJfEtPUeKRaVhl6bWnhqKqdVXktcpf5mlFmCpuj4RwzQzXLc1s4hgxLxSmWqGj5FCbNeWOfAVGu4mVtsM5tRrnl2upacSOQmyI3yBJ4M2hCYk89HjJgLGQ8AqdChrGScawSeL2WbVeEG_-Ueh8UupYIJNnxhVeA7H1O6sKaDCtlK-5_wWTKuXDqqEujWMmFTWAnmIP0WCMQ5mKILMJOBgo3vypNYHewEtn79aUsswCIPcjMEthbW87Gjr6NRrVBRM5OPhXx6fn_fXMH7hQhsiZGuu3CpLtY2hceGnX6Ze8bvwGZMg5K
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Man%E2%80%90in%E2%80%90the%E2%80%90middle+attacks+and+defence+in+a+power+system+cyber%E2%80%90physical+testbed&rft.jtitle=IET+cyber-physical+systems&rft.au=Patrick+Wlazlo&rft.au=Abhijeet+Sahu&rft.au=Zeyu+Mao&rft.au=Hao+Huang&rft.date=2021-09-01&rft.pub=Wiley&rft.eissn=2398-3396&rft.volume=6&rft.issue=3&rft.spage=164&rft.epage=177&rft_id=info:doi/10.1049%2Fcps2.12014&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_b2ed0c5ae57d4bd0aff6842b3da6379e
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2398-3396&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2398-3396&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2398-3396&client=summon