A new delay attack detection algorithm for PTP network in power substation

•Analysis of delay attacks on Precision Time Protocol, PTP, in power substations.•A new method for detecting delay attacks on Sync messages as well as attacks on transparent clocks.•No need for an external reference clock to detect delay attacks.•Possibility to detect simultaneous attacks on the sub...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of electrical power & energy systems Jg. 133; S. 107226
Hauptverfasser: Moradi, Mohsen, Jahangir, Amir Hossein
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier Ltd 01.12.2021
Schlagworte:
ISSN:0142-0615
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:•Analysis of delay attacks on Precision Time Protocol, PTP, in power substations.•A new method for detecting delay attacks on Sync messages as well as attacks on transparent clocks.•No need for an external reference clock to detect delay attacks.•Possibility to detect simultaneous attacks on the substation network.•Mathematical analysis and simulation of proposed attack detection algorithm.•Low average attack detection time and very low overhead network traffic. Time synchronization is one of the main issues for guaranteeing the correctness of actions depending on the time of measured data or detected events by electronic devices across industrial networks. According to the accuracy needed in different applications and networks, several synchronization protocols or algorithms have been proposed so far. The Precision Time Protocol, PTP, is one of the most accurate synchronization protocols introduced for automation applications. It has also been used in power grids and digital substations. However, due to the variety of cyber-attacks in electrical power systems in recent years, its security should be considered and evaluated as other substation components. This paper introduces a new PTP attack detection algorithm. The proposed algorithm can detect delay attacks on Sync messages as well as attacks on transparent clocks and simultaneous attacks on the network. The efficiency and advantages of the proposed algorithm over other methods are verified through mathematical analysis as well as several simulations.
ISSN:0142-0615
DOI:10.1016/j.ijepes.2021.107226