Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perf...
Saved in:
| Published in | IET cyber-physical systems Vol. 6; no. 3; pp. 164 - 177 |
|---|---|
| Main Authors | , , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Southampton
John Wiley & Sons, Inc
01.09.2021
Institution of Engineering and Technology (IET) Wiley |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2398-3396 2398-3396 |
| DOI | 10.1049/cps2.12014 |
Cover
| Abstract | Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks. |
|---|---|
| AbstractList | Abstract
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks. Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks. Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi‐stage MiTM intrusions in an emulation‐based cyber‐physical power system testbed against a large‐scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks. |
| Author | Wlazlo, Patrick Davis, Katherine Sahu, Abhijeet Goulart, Ana Huang, Hao Mao, Zeyu Zonouz, Saman |
| Author_xml | – sequence: 1 givenname: Patrick surname: Wlazlo fullname: Wlazlo, Patrick organization: Texas A&M University – sequence: 2 givenname: Abhijeet orcidid: 0000-0002-7647-3758 surname: Sahu fullname: Sahu, Abhijeet organization: Texas A&M University – sequence: 3 givenname: Zeyu surname: Mao fullname: Mao, Zeyu organization: Texas A&M University – sequence: 4 givenname: Hao surname: Huang fullname: Huang, Hao organization: Texas A&M University – sequence: 5 givenname: Ana orcidid: 0000-0001-7184-7485 surname: Goulart fullname: Goulart, Ana email: goulart@tamu.edu organization: Texas A&M University – sequence: 6 givenname: Katherine surname: Davis fullname: Davis, Katherine organization: Texas A&M University – sequence: 7 givenname: Saman surname: Zonouz fullname: Zonouz, Saman organization: Rutgers University |
| BackLink | https://www.osti.gov/biblio/1798924$$D View this record in Osti.gov |
| BookMark | eNp9kMuKFDEUhgsZwXGcjU9Q6E7pMbe6LaUZdWBEwcs2nDo5ZaetTsokTVM7H2GecZ7E9JSIiMzmnBC-_0v4HxcnzjsqiqecXXCmulc4RXHBBePqQXEqZNeupOzqk7_Oj4rzGLeMMdE2qpLstPj6Htztzxt7HGlDee6sMSOVkBLg91iCM6WhgRxSaV0J5eQPFMo4x0S7EueeQg5NmzlahLFMFFNP5knxcIAx0vnvfVZ8eXP5ef1udf3h7dX69fUKVd2plWm5kRVDpfq-GxS0AwFvOz6wvGtVG0EcTdMgM6qvOScx1FijhEahRFDyrLhavMbDVk_B7iDM2oPVdxc-fNMQksWRdC_IMKyAqibLDINhqFslemmglk1H2fVyce3dBPMBxvGPkDN9bFgfG9Z3DWf62UL7mKyOaBPhBr1zhEnzpms7cYSeL9AU_I99rkZv_T643IiWrBOSV1yxTLGFwuBjDDTobINkvUsB7Pj_11_8E7n3q3yBD3ak-R5Srz9-EkvmFxHfuhI |
| CitedBy_id | crossref_primary_10_1016_j_epsr_2023_109435 crossref_primary_10_1109_OAJPE_2023_3239186 crossref_primary_10_3390_electronics11111762 crossref_primary_10_3390_s22062100 crossref_primary_10_3390_smartcities7040085 crossref_primary_10_1109_OAJPE_2024_3489477 crossref_primary_10_3390_fi16030085 crossref_primary_10_1016_j_cose_2024_103761 crossref_primary_10_3390_s23115192 crossref_primary_10_1109_TIA_2023_3308557 crossref_primary_10_1016_j_enconman_2024_118949 crossref_primary_10_1016_j_procs_2023_09_031 crossref_primary_10_1186_s42400_023_00200_w crossref_primary_10_1007_s10207_023_00732_9 crossref_primary_10_1109_ACCESS_2024_3477714 crossref_primary_10_3389_fenrg_2024_1502078 crossref_primary_10_1016_j_epsr_2022_108975 crossref_primary_10_3390_en16227644 crossref_primary_10_3390_electronics11162627 crossref_primary_10_1109_JESTIE_2024_3451720 crossref_primary_10_3390_app14114530 crossref_primary_10_1109_JESTPE_2023_3242299 crossref_primary_10_1049_cps2_12047 crossref_primary_10_3390_jcp3040031 crossref_primary_10_1016_j_ijepes_2022_108409 crossref_primary_10_1109_COMST_2023_3344808 crossref_primary_10_1109_OJIA_2024_3365576 crossref_primary_10_1145_3723164 crossref_primary_10_1109_TDSC_2023_3321176 crossref_primary_10_3390_en16124590 crossref_primary_10_1016_j_jnca_2022_103540 crossref_primary_10_1049_esi2_12068 crossref_primary_10_1109_JPROC_2024_3405709 crossref_primary_10_1109_TIA_2022_3186660 crossref_primary_10_12677_CSA_2023_1312231 crossref_primary_10_3390_app14177838 crossref_primary_10_3390_en16124573 crossref_primary_10_1016_j_jfranklin_2024_106661 crossref_primary_10_3390_app13169451 crossref_primary_10_4236_jcc_2022_107007 crossref_primary_10_1109_TCST_2024_3378993 crossref_primary_10_3390_en15186799 crossref_primary_10_1109_ACCESS_2022_3209698 crossref_primary_10_1016_j_asoc_2022_109960 |
| Cites_doi | 10.1109/NAPS.2014.6965381 10.1109/MILCOM.2008.4753614 10.1109/TPWRD.2016.2603339 10.1109/ICDIS.2018.00028 10.1109/TPEC.2019.8662189 10.1016/j.epsr.2020.106795 10.1109/MSP.2011.67 10.1109/SoutheastCon42311.2019.9020426 10.1109/JSYST.2018.2832065 10.1049/cp.2012.1831 10.1109/TSG.2011.2123925 10.1109/TII.2020.3024069 10.1109/TSG.2015.2432013 10.1109/TPWRS.2016.2616385 10.1109/PESGM.2015.7286615 10.1109/IPTCOMM.2019.8921260 10.24251/HICSS.2017.385 10.1016/j.comnet.2012.12.017 |
| ContentType | Journal Article |
| Copyright | 2021 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. 2021. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2021 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. – notice: 2021. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | 24P AAYXX CITATION 8FE 8FG ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS OTOTI ADTOC UNPAY DOA |
| DOI | 10.1049/cps2.12014 |
| DatabaseName | Wiley - Open Access CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection OSTI.GOV Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 24P name: Wiley - Open Access url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2398-3396 |
| EndPage | 177 |
| ExternalDocumentID | oai_doaj_org_article_b2ed0c5ae57d4bd0aff6842b3da6379e 10.1049/cps2.12014 1798924 10_1049_cps2_12014 CPS212014 |
| Genre | article |
| GrantInformation_xml | – fundername: U.S. Department of Energy funderid: DE‐OE0000895 |
| GroupedDBID | 0R~ 1OC 24P 6IK AAHHS AAHJG AAJGR ABJCF ABQXS ACCFJ ACCMX ACESK ACXQS ADBBV AEEZP AEQDE AFKRA AIWBW AJBDE ALMA_UNASSIGNED_HOLDINGS ALUQN ARAPS AVUZU BCNDV BENPR BGLVJ CCPQU EBS GROUPED_DOAJ HCIFZ IAO IDLOA IFIPE IPLJI ITC JAVBF K7- M7S M~E O9- OCL OK1 PIMPY PTHSS RIE RUI AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IGS PHGZM PHGZT PQGLB WIN 8FE 8FG ABUWG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI PRINS OTOTI ADTOC UNPAY |
| ID | FETCH-LOGICAL-c4694-d81d350c44bb9f4a8fea1891f0ea1646d2e1cd77c0d4b611e2f6c6c3a74c3ca43 |
| IEDL.DBID | DOA |
| ISSN | 2398-3396 |
| IngestDate | Fri Oct 03 12:40:07 EDT 2025 Sun Oct 26 04:10:57 EDT 2025 Mon Feb 17 04:11:41 EST 2025 Wed Aug 13 05:56:14 EDT 2025 Thu Apr 24 23:04:05 EDT 2025 Wed Oct 29 21:20:38 EDT 2025 Wed Jan 22 16:28:04 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | Attribution-NonCommercial cc-by-nc |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4694-d81d350c44bb9f4a8fea1891f0ea1646d2e1cd77c0d4b611e2f6c6c3a74c3ca43 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 USDOE DE‐OE0000895 |
| ORCID | 0000-0002-7647-3758 0000-0001-7184-7485 0000000276473758 0000000171847485 |
| OpenAccessLink | https://doaj.org/article/b2ed0c5ae57d4bd0aff6842b3da6379e |
| PQID | 3092315140 |
| PQPubID | 6853487 |
| PageCount | 14 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_b2ed0c5ae57d4bd0aff6842b3da6379e unpaywall_primary_10_1049_cps2_12014 osti_scitechconnect_1798924 proquest_journals_3092315140 crossref_citationtrail_10_1049_cps2_12014 crossref_primary_10_1049_cps2_12014 wiley_primary_10_1049_cps2_12014_CPS212014 |
| PublicationCentury | 2000 |
| PublicationDate | September 2021 |
| PublicationDateYYYYMMDD | 2021-09-01 |
| PublicationDate_xml | – month: 09 year: 2021 text: September 2021 |
| PublicationDecade | 2020 |
| PublicationPlace | Southampton |
| PublicationPlace_xml | – name: Southampton – name: United Kingdom |
| PublicationTitle | IET cyber-physical systems |
| PublicationYear | 2021 |
| Publisher | John Wiley & Sons, Inc Institution of Engineering and Technology (IET) Wiley |
| Publisher_xml | – name: John Wiley & Sons, Inc – name: Institution of Engineering and Technology (IET) – name: Wiley |
| References | 2015; 6 2011; 2 2012 2011 2013; 57 2020 2019; 13 2017; 32 2021; 17 2019 2008 2007 2018 2017 2005 2020; 189 2015 2004 2014 2016; 1–1 2019; 161 2011; 9 e_1_2_9_31_1 Clarke G. (e_1_2_9_24_1) 2004 e_1_2_9_11_1 e_1_2_9_34_1 e_1_2_9_10_1 e_1_2_9_12_1 Lu X. (e_1_2_9_19_1) 2011 Orebaugh A.D. (e_1_2_9_30_1) 2005 e_1_2_9_15_1 e_1_2_9_14_1 Rossum G. (e_1_2_9_33_1) 2020 e_1_2_9_17_1 e_1_2_9_16_1 e_1_2_9_18_1 e_1_2_9_20_1 e_1_2_9_22_1 Burns B. (e_1_2_9_13_1) 2007 e_1_2_9_21_1 e_1_2_9_23_1 Liang G. (e_1_2_9_5_1) 2016; 1 e_1_2_9_8_1 e_1_2_9_7_1 e_1_2_9_6_1 e_1_2_9_4_1 e_1_2_9_3_1 e_1_2_9_2_1 Rosborough C. (e_1_2_9_26_1) 2019 Rodofile N. (e_1_2_9_32_1) 2015 e_1_2_9_9_1 e_1_2_9_25_1 e_1_2_9_28_1 e_1_2_9_27_1 e_1_2_9_29_1 |
| References_xml | – volume: 189 year: 2020 article-title: A3d: Attention‐based auto‐encoder anomaly detector for false data injection attacks publication-title: Elect Power Syst Res – start-page: 1 year: 2019 end-page: 8 – volume: 2 start-page: 382 issue: 2 year: 2011 end-page: 390 article-title: Modeling load redistribution attacks in power systems publication-title: IEEE Transactions on Smart Grid – volume: 32 issue: 4 year: 2017 article-title: Grid structural characteristics as validation criteria for synthetic networks publication-title: IEEE Trans Power Syst – year: 2005 – volume: 32 start-page: 1068 issue: 2 year: 2017 end-page: 1078 article-title: Multidimensional intrusion detection system for iec 61850‐based scada networks publication-title: IEEE Trans Power Deliv – start-page: 1 year: 2019 end-page: 6 – year: 2007 – start-page: 1 year: 2008 end-page: 7 – volume: 57 start-page: 1344 year: 2013 end-page: 1371 article-title: Cyber security in the smart grid: survey and challenges publication-title: Comput Network – start-page: 1 year: 2014 end-page: 6 – start-page: 67 year: 2015 end-page: 70 – volume: 6 start-page: 2444 issue: 5 year: 2015 end-page: 2453 article-title: Analyzing the cyber‐physical impact of cyber events on the power grid publication-title: IEEE Transactions on Smart Grid – volume: 13 start-page: 1851 issue: 2 year: 2019 end-page: 1860 article-title: An event‐triggered secondary control strategy with network delay in islanded microgrids publication-title: IEEE Systems Journal – start-page: 1 year: 2015 end-page: 5 – volume: 161 year: 2019 – year: 2020 – year: 2004 – start-page: 131 year: 2018 end-page: 134 – start-page: 1 year: 2011 end-page: 6 – volume: 9 start-page: 49 issue: 3 year: 2011 end-page: 51 article-title: Stuxnet: dissecting a cyberwarfare weapon publication-title: IEEE Security & Privacy – year: 2017 – start-page: 1 year: 2012 end-page: 8 – volume: 1–1 start-page: 11 year: 2016 article-title: The 2015 Ukraine blackout: implications for false data injection attacks publication-title: IEEE Transactions on Power Systems – volume: 17 start-page: 4545 issue: 7 year: 2021 end-page: 4554 article-title: Delay‐tolerant predictive power compensation control for photovoltaic voltage regulation publication-title: IEEE Transactions on Industrial Informatics – ident: e_1_2_9_14_1 doi: 10.1109/NAPS.2014.6965381 – ident: e_1_2_9_28_1 doi: 10.1109/MILCOM.2008.4753614 – ident: e_1_2_9_16_1 doi: 10.1109/TPWRD.2016.2603339 – ident: e_1_2_9_31_1 – ident: e_1_2_9_6_1 – ident: e_1_2_9_25_1 – ident: e_1_2_9_18_1 doi: 10.1109/ICDIS.2018.00028 – volume-title: Security Power Tools year: 2007 ident: e_1_2_9_13_1 – volume-title: Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems year: 2004 ident: e_1_2_9_24_1 – ident: e_1_2_9_17_1 doi: 10.1109/TPEC.2019.8662189 – ident: e_1_2_9_7_1 doi: 10.1016/j.epsr.2020.106795 – ident: e_1_2_9_3_1 doi: 10.1109/MSP.2011.67 – ident: e_1_2_9_4_1 – ident: e_1_2_9_2_1 doi: 10.1109/SoutheastCon42311.2019.9020426 – ident: e_1_2_9_20_1 doi: 10.1109/JSYST.2018.2832065 – ident: e_1_2_9_27_1 – ident: e_1_2_9_15_1 doi: 10.1049/cp.2012.1831 – volume-title: 13th Australasian Information Security Conference year: 2019 ident: e_1_2_9_26_1 – volume-title: The Python Library Reference, Release 3.8.2 year: 2020 ident: e_1_2_9_33_1 – ident: e_1_2_9_8_1 doi: 10.1109/TSG.2011.2123925 – ident: e_1_2_9_21_1 doi: 10.1109/TII.2020.3024069 – ident: e_1_2_9_10_1 doi: 10.1109/TSG.2015.2432013 – ident: e_1_2_9_22_1 doi: 10.1109/TPWRS.2016.2616385 – ident: e_1_2_9_12_1 doi: 10.1109/PESGM.2015.7286615 – start-page: 1 volume-title: 2011 IEEE global telecommunications conference – GLOBECOM year: 2011 ident: e_1_2_9_19_1 – ident: e_1_2_9_23_1 doi: 10.1109/IPTCOMM.2019.8921260 – ident: e_1_2_9_11_1 doi: 10.24251/HICSS.2017.385 – volume-title: Snort Cookbook year: 2005 ident: e_1_2_9_30_1 – start-page: 67 volume-title: Proceedings of the 13th Australasian Information Security Conference (AISC 2015) year: 2015 ident: e_1_2_9_32_1 – ident: e_1_2_9_34_1 – volume: 1 start-page: 11 year: 2016 ident: e_1_2_9_5_1 article-title: The 2015 Ukraine blackout: implications for false data injection attacks publication-title: IEEE Transactions on Power Systems – ident: e_1_2_9_9_1 doi: 10.1016/j.comnet.2012.12.017 – ident: e_1_2_9_29_1 |
| SSID | ssj0002874530 |
| Score | 2.4973373 |
| Snippet | Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two... Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between... Abstract Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between... |
| SourceID | doaj unpaywall osti proquest crossref wiley |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 164 |
| SubjectTerms | Automatic control Automation Data integrity Denial of service attacks Design Distributed network protocols Electric power systems Electricity distribution Energy industry Industrial development Intrusion Intrusion detection systems Power dispatch Protocol Smart grid State estimation Test stands Wide area networks |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NbtQwEB6V7QE4IH5FaEGW6AWkUCdx4uSAEK1aVUhdVUBRb5Y9tlGlJRu2qVBvPALPyJPg8SYLK6G92FE0URKPx_48Hn8DsCeE0VwYm0pf6VQ0AcM1FCYm0WFYj1j0jvyQp9Pq5Fx8uCgvtmA6noWhsMpxTIwDtZ0j-cj3C05QJEzv_F33PaWsUbS7OqbQ0ENqBfs2Uozdgu2cmLEmsH1wND37uPK6RHb3go88paLZx-4qf5OFaVCszUyRwD9U82Boa-Dz9nXb6ZsfejZbh7NxPjq-D_cGIMneLzX_ALZc-xDu_kMv-Ai-nOr2989fl1QEnBfKb9EdwXTf09F6plvLrPNk3OyyZZp1lDONLdmdGd4YtwgPdYMqWUClvXH2MZwfH30-PEmHPAophsWvSG3ApEXJMejFNF7o2jud1U3meagrUdncZWilRG6FqbLM5b7CCgstBRaoRfEEJu28dU-BaV_KorZYZ44L6aRxptbSNihtnlmsEng1tqHCgWSccl3MVNzsFo2i9laxvRN4uZLtltQa_5U6IFWsJIgOO96YL76qwbqUyZ3lWGpXyvALlmvvaX_RFFZXhWxcAjukSBVQBVHjIsUQYa-IrC2sPxPYHfWrBgu-Un_7WwJ7K51v_NDXsTtsEFGHZ5_yePVs8yt34E5OsTMxlm0XJv3i2j0P4Kc3L4Ye_Qf88Af_ priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1faxQxEB_q9UF98L-4tkrQvijsuX-yyeaxHpYitBT0pD6FZJJA8dwu7R6lffIj-Bn9JCa53cMVOXxJlmWyZDMz5Jdk8huAPUq1yqg2KXdMpVR4DCdCmBhHi349YtDZsA95dMwO5_TjaXW6Ba-GuzCj83sq3mF7WUxzP0vRW7DNKo-3J7A9Pz7Z_xqzxok6LUvBBt7RUYPRTBMJ-X117h1nBCZvL5tWXV-pxWIMT-P8cnAfZkPPVmEl36bLTk_x5i_Sxs1dfwD3enhJ9lf28BC2bPMI7v5BOvgYvhyp5tePn2eh8OjPl9_jJgVRXRcu3BPVGGKsCy5PzhqiSBsyqZEV5zPBa20vfKO2VzDxWLXT1jyB-cGHz7PDtM-ukKJfEtPUeKRaVhl6bWnhqKqdVXktcpf5mlFmCpuj4RwzQzXLc1s4hgxLxSmWqGj5FCbNeWOfAVGu4mVtsM5tRrnl2upacSOQmyI3yBJ4M2hCYk89HjJgLGQ8AqdChrGScawSeL2WbVeEG_-Ueh8UupYIJNnxhVeA7H1O6sKaDCtlK-5_wWTKuXDqqEujWMmFTWAnmIP0WCMQ5mKILMJOBgo3vypNYHewEtn79aUsswCIPcjMEthbW87Gjr6NRrVBRM5OPhXx6fn_fXMH7hQhsiZGuu3CpLtY2hceGnX6Ze8bvwGZMg5K priority: 102 providerName: Unpaywall – databaseName: Wiley Online Library Open Access dbid: 24P link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fa9UwFA5zPqgP4k-smxJwLwrVtEmbFnzR4RjCZKCTvYXkJBmDa2-565C9-Sf4N_qXeE7aW70gA1-aUk6gzZfTfElOvsPYnlLOCuV8rmNtc9Uih2spTExDAJyPeIiB1iGPPtWHJ-rjaXW6xd6uz8KM-hDzght5Rvpfk4NbN2YhQVKLIEJ_Ub4ucPxSN9jNAokM9e9SHc8rLEnJPSUbIY27XKLFWp9UtW_-VN8YkZJwPxZLdLAN0nnrsuvt1Xe7WGzS2DQOHdxjdycCyd-NiN9nW6F7wO78JSv4kH09st2vHz_P6YL8Dq_f0jIEt8NAR-q57Tz3IZJT8_OOW95TrjQ-qjpzuHJhhZX6CUKObHRwwT9iJwcfvuwf5lP-hBxw0qtyj1xUVgIQD9dGZZsYbNG0RRRY1qr2ZSjAaw3CK1cXRShjDTVIqxVIsEo-ZtvdsgtPGLex0rLx0BRBKB20C66x2regfVl4qDP2ct2GBiZxccpxsTBpk1u1htrbpPbO2IvZth8lNf5p9Z6gmC1IBjs9WK7OzORVxpXBC6hsqDR-ghc2RtpXdNLbWuo2ZGyHgDTIJkgSFyh2CAZDIm0478zY7hpfM3nuhZGCKC_SSJGxvRnza1_0VeoO15iY_ePPZbp7-j_GO-x2SRE0KaJtl20Pq8vwDCnQ4J6nnv4bDP0ELg priority: 102 providerName: Wiley-Blackwell |
| Title | Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcps2.12014 https://www.proquest.com/docview/3092315140 https://www.osti.gov/biblio/1798924 https://doi.org/10.1049/cps2.12014 https://doaj.org/article/b2ed0c5ae57d4bd0aff6842b3da6379e |
| UnpaywallVersion | publishedVersion |
| Volume | 6 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2398-3396 dateEnd: 20241231 omitProxy: true ssIdentifier: ssj0002874530 issn: 2398-3396 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVBHI databaseName: IET Digital Library Open Access customDbUrl: eissn: 2398-3396 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002874530 issn: 2398-3396 databaseCode: IDLOA dateStart: 20161201 isFulltext: true titleUrlDefault: https://digital-library.theiet.org/content/collections providerName: Institution of Engineering and Technology – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2398-3396 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002874530 issn: 2398-3396 databaseCode: M~E dateStart: 20160101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2398-3396 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002874530 issn: 2398-3396 databaseCode: BENPR dateStart: 20161201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVWIB databaseName: KBPluse Wiley Online Library: Open Access customDbUrl: eissn: 2398-3396 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002874530 issn: 2398-3396 databaseCode: AVUZU dateStart: 20161231 isFulltext: true titleUrlDefault: https://www.kbplus.ac.uk/kbplus7/publicExport/pkg/559 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley - Open Access customDbUrl: eissn: 2398-3396 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002874530 issn: 2398-3396 databaseCode: 24P dateStart: 20160101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NbtQwELagHIAD4leElpUlegFpqZM4cXJsqy4VUlcrYFE5WfbYllotadSmQr3xCDwjT8KMk13tSqhcuNhJ5ETOzDj-xp58w9iulNYIad1YhdKMZY0YrqYwMQUe0B9xEDytQ55My-O5_HhanK6l-qKYsJ4euBfcns28E1AYXyiHzxQmBNo6srkzZa5qT19fUdVrztR5XDJSssjFko9U1nvQXmXvU5zu5MYMFIn6sbrAAbUBMu9fN625-WEWi03YGuedyWP2aACMfL_v6BN2xzdP2cM1GsFn7OuJaX7__HVGBeI5LL_HZQduuo5-oeemcdz5QIOYnzXc8JZyo_GexZnDjfWXeFM7qIwj-uysd8_ZfHL05fB4PORLGAM6uXLsEHvmhQCUv62DNFXwJq3qNAisS1m6zKfglAKBkizT1GehhBJyoyTkYGT-gm01F41_ybgJhcorB1XqhVReWW8ro1wNymWpgzJhb5cy1DCQiVNOi4WOm9qy1iRvHeWdsDertm1PofHXVgekilULor2OF9AY9GAM-l_GkLBtUqRG9EAUuECxQtBpImVDPzNhO0v96mGkXulcEMRF2CgStrvS-a0dfRfN4ZYm-nD2OYtHr_7HW22zBxlF0sTIth221V1e-9cIhTo7YnczOcOymnwYsXsHR9PZp1EcCXg2n872v_0BSL8QsQ |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELZKeygcEL8itIAlygGk0Px4482hQrS02tLuqoIW9ebaYwdVWrJhN1W1Nx6BJ-JheBJmvMnCSmhvvdhR5CSOZ2x_Y4-_YWxLCKMjYWwoi0yHIkcMl5ObmAQHaI9YKBytQ_YHWe9MfDzvnK-wX-1ZGHKrbMdEP1DbEdAa-XYaERTB6T16V30PKWoU7a62ITR0E1rB7niKseZgx5GbXqMJN9k5_IDyfpUkB_une72wiTIQApqGIrSI2NJOBFhrkxdCdwun424eFxHmmchs4mKwUkJkhcni2CVFBhmkWgpIQYsU33uLrYlU5Gj8re3uD04-zVd5PJt8GrW8qCLfhmqSvI1x2hULM6EPGIDZCDv2AthdvyorPb3Ww-EifPbz38E9drcBrvz9TNPusxVXPmB3_qEzfMi-9HX5-8fPS0oQV2L6zS9_cF3XdJSf69Jy6woaTPhlyTWvKEYbn7FJc5gaN8aHqkZ1OKLg2jj7iJ3dSIs-ZqvlqHRPGNdFR6ZdC93YRUI6aZzpamlzkDaJLWQBe922oYKG1JxiawyV31wXuaL2Vr69A_ZyXraaUXn8t9QuiWJegui3_Y3R-KtqerMyibMRdLTrSPwFG-mioP1Mk1qdpTJ3AdsgQSpEMUTFC-SzBLUicji0dwO22cpXNSPGRP3V74BtzWW-tKJvvDosKaL2Tj4n_urp8k--YOu90_6xOj4cHG2w2wn57Xg_uk22Wo-v3DMEXrV53mg3Zxc33aH-ALATRaU |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NbtQwELZgK0E5IH5FaAFL9AJSwImdODmWwqr8tKoEW1VcLHtso0rbbLRNhXrjEXhGngSPkw2shCpxiaNoEiUeT_zNePwNITtCGM2Esan0pU5FHTBcjWliEhwEf8SCdxiHPDgs92fiw0lxMuTm4F6Ynh9iDLihZcT_NRq4a63vHU6BJJnQnuevsjCBietkI0zkTEzIxu7x7OtsDLJEMvdYbwRp7lLO63JFUSrq138esDYpRe7-0CyCja3hzpsXTasvv-v5fB3JxqloeofcHjAk3e2Vfpdcc809cusvZsH75PhAN79-_DzFQ4B44XgWIxFUdx3uqqe6sdQ6j3ZNTxuqaYvl0mhP7Ezh0rhluKkdtEgDIO2Msw_IbPruy95-OpRQSCH4vSK1AY7ygkFQiam90JV3OqvqzLPQlqK0ucvASgnMClNmmct9CSVwLQVw0II_JJNm0bhHhGpfSF5ZqDLHhHTSOFNpaWuQNs8slAl5sepDBQO_OJa5mKu4zi1qhf2tYn8n5Pko2_asGv-UeoOqGCWQCTteWCy_qcGwlMmdZVBoV8jwCZZp73Fp0XCrSy5rl5AtVKQKgAJZcQHTh6BTyNMWXM-EbK_0qwbjPVecIeoNSJIlZGfU-ZUv-jIOhytE1N7R5zyePf4f4WfkxtHbqfr0_vDjFtnMMZ8m5rdtk0m3vHBPAiDqzNNh2P8GrGkI7g |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1faxQxEB_q9UF98L-4tkrQvijsuX-yyeaxHpYitBT0pD6FZJJA8dwu7R6lffIj-Bn9JCa53cMVOXxJlmWyZDMz5Jdk8huAPUq1yqg2KXdMpVR4DCdCmBhHi349YtDZsA95dMwO5_TjaXW6Ba-GuzCj83sq3mF7WUxzP0vRW7DNKo-3J7A9Pz7Z_xqzxok6LUvBBt7RUYPRTBMJ-X117h1nBCZvL5tWXV-pxWIMT-P8cnAfZkPPVmEl36bLTk_x5i_Sxs1dfwD3enhJ9lf28BC2bPMI7v5BOvgYvhyp5tePn2eh8OjPl9_jJgVRXRcu3BPVGGKsCy5PzhqiSBsyqZEV5zPBa20vfKO2VzDxWLXT1jyB-cGHz7PDtM-ukKJfEtPUeKRaVhl6bWnhqKqdVXktcpf5mlFmCpuj4RwzQzXLc1s4hgxLxSmWqGj5FCbNeWOfAVGu4mVtsM5tRrnl2upacSOQmyI3yBJ4M2hCYk89HjJgLGQ8AqdChrGScawSeL2WbVeEG_-Ueh8UupYIJNnxhVeA7H1O6sKaDCtlK-5_wWTKuXDqqEujWMmFTWAnmIP0WCMQ5mKILMJOBgo3vypNYHewEtn79aUsswCIPcjMEthbW87Gjr6NRrVBRM5OPhXx6fn_fXMH7hQhsiZGuu3CpLtY2hceGnX6Ze8bvwGZMg5K |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Man%E2%80%90in%E2%80%90the%E2%80%90middle+attacks+and+defence+in+a+power+system+cyber%E2%80%90physical+testbed&rft.jtitle=IET+cyber-physical+systems&rft.au=Patrick+Wlazlo&rft.au=Abhijeet+Sahu&rft.au=Zeyu+Mao&rft.au=Hao+Huang&rft.date=2021-09-01&rft.pub=Wiley&rft.eissn=2398-3396&rft.volume=6&rft.issue=3&rft.spage=164&rft.epage=177&rft_id=info:doi/10.1049%2Fcps2.12014&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_b2ed0c5ae57d4bd0aff6842b3da6379e |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2398-3396&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2398-3396&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2398-3396&client=summon |