Skip to main content
Top

2024 | OriginalPaper | Chapter

Demonstration of MITM Attack in Synchrophasor Network Using MAC Spoofing

Authors : Amit Tiwari, Shivam Verma, Varun Shukla

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Communication is critical for power system operation and control. Data transfer via digital means is vulnerable to security and privacy concerns. Man-in-the-middle (MITM) attacks pose a risk to the data integrity of synchrophasor values transferred as digital data within the smart grid. The purpose of this research is to demonstrate how utilizing Media Access Control (MAC) spoofing instead of Address Resolution Protocol (ARP) spoofing can improve the stealth and robustness of MITM attacks in synchrophasor networks and to provide a thorough understanding of the weaknesses and possible risks present in synchrophasor networks when they are the target of MITM attacks, highlighting network elements and targets. After a session hijack, when bogus data was eventually injected, it was evaluated and processed by the phasor data concentrator (PDC), ensuring consistent networking and the attacker's non-detectability. For generic experiment results, different sub-networks based on the master–slave topology of synchrophasor networking and commercially available phasor measurement unit (PMU) and PDC were used in a laboratory-scale setup.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Hadjidemetriou L et al (2020) Demonstration of man in the middle attack on a feeder power factor correction unit. In: 2020 IEEE PES innovative smart grid technologies Europe (ISGT-Europe). IEEE Hadjidemetriou L et al (2020) Demonstration of man in the middle attack on a feeder power factor correction unit. In: 2020 IEEE PES innovative smart grid technologies Europe (ISGT-Europe). IEEE
7.
go back to reference Giraldo J, Cardenas A, Quijano N (2016) Integrity attacks on real-time pricing in smart grids: impact and countermeasures. IEEE Trans Smart Grid 8(5):2249–2257CrossRef Giraldo J, Cardenas A, Quijano N (2016) Integrity attacks on real-time pricing in smart grids: impact and countermeasures. IEEE Trans Smart Grid 8(5):2249–2257CrossRef
10.
go back to reference Case DU (2016) Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), p 388 Case DU (2016) Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), p 388
11.
13.
go back to reference Banu S (2019) A survey of computational intelligence methods used in handling man in the middle attacks in machine to machine communications Banu S (2019) A survey of computational intelligence methods used in handling man in the middle attacks in machine to machine communications
15.
go back to reference Sanders C (2017) Practical packet analysis: using Wireshark to solve realworld network problems. No Starch Press Sanders C (2017) Practical packet analysis: using Wireshark to solve realworld network problems. No Starch Press
16.
go back to reference Bansal S, Bansal N (2015) Scapy—a python tool for security testing. J Comput Sci Syst Biol 8:140–159 Bansal S, Bansal N (2015) Scapy—a python tool for security testing. J Comput Sci Syst Biol 8:140–159
Metadata
Title
Demonstration of MITM Attack in Synchrophasor Network Using MAC Spoofing
Authors
Amit Tiwari
Shivam Verma
Varun Shukla
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_29