Threat Modeling of Smart Grid Control Architectures
<p>Overview of the phases of the threat modeling method (see below for details on each phase).</p> "> Figure 2
<p>Model elements for the threat modeling method.</p> "> Figure 3
<p>Centralized architecture.</p> "> Figure 4
<p>Distributed control.</p> "> Figure 5
<p>Model of the centralized control architecture.</p> "> Figure 6
<p>Model of the distributed control architecture.</p> ">
Abstract
:1. Introduction
- Perform a threat modeling of two alternative architectures (centralized and distributed) for control of the smart grid, with the goal of determining which of the two architectures is more secure with regard to cyber threats.
- Evaluate the performance of the applied threat modeling method described in our earlier work [15] and suggest improvements.
2. Background
2.1. Smart Grid and ICS Threat Modeling
2.2. 5G
3. Method Used for the Threat Modeling
3.1. Limitations of STRIDE for Threat Modeling of ICS
3.2. The Selected Threat Modeling Method
3.2.1. Creating a Threat Model
3.2.2. Identifying Threats
3.2.3. Availability
- A1:
- How can an attacker deny the arrival of data sent between the processes that are part of the ICS function?
- A2:
- How can an attacker deny the service of the processes that are part of the ICS function?
- A3:
- How can an attacker deny the service of the devices involved in realizing the ICS function?
3.2.4. Integrity
- I1:
- How can an attacker send false data to any of the processes that are part of the ICS function, or tamper with legitimate data being sent from any of the processes that are part of the ICS function?
- I2:
- How can an attacker program/change logic (e.g., trip values, setpoints) in any of the processes that are part of the ICS function?
3.2.5. Confidentiality
- C1:
- How can an attacker obtain sensitive information from the ICS function?
3.2.6. Evaluating and Mitigating Threats
4. Use Case Description
5. Threat Modeling Process
5.1. Scope
5.2. Creating a Model
5.2.1. Centralized Architecture
5.2.2. Distributed Architecture
- In the centralized architecture, this function collects measurement data and sends them to the centralized node, who solves the optimization and returns the setpoint.
- In the distributed architecture, this function solves the optimization problem by iteratively exchanging data with the nearest neighbors 1000–10,000 times.
- In addition to underlying security controls, the traffic is encrypted and authenticated at the application level.
- Data are sent through a dedicated 5G slice managed by the mobile network operator.
- In the centralized architecture, data sent between the DSO control center and the 5G core are sent through a VPN implemented on top of a network provided by a third party. This network is not accessible from the internet.
- In the centralized architecture, a human operator has insight into the received measurements and resulting setpoint, but the operator does not have to be involved in the transmission of setpoints to the respective CC nodes. However, if need be, we assume that the operator can manually interfere and determine setpoints. In the distributed architecture, a human operator does not have insight into the received measurements and resulting setpoint. However, we assume that an operator, through a functionality which we do not model here, still has insight into the general state of the grid.
- Authentication to the 5G network and authorization to access the slice are handled by the mobile network operator.
- Application-level authentication is handled by the DSO using the infrastructure placed in the DSO control center.
- Hosts a number of other devices and services that are not explicitly modelled in our use case.
- Operated by an MNO and handles both smart grid traffic and traffic from general customers.
- Implements and configures the slice which the traffic from the ICS function is sent.
- The slice is implemented using standard CN functions. It is shared between the slice and the commercial 5G network, but behaves as a logically separate network. Functionality in the core network authorizes which subscribers/devices can access the slice.
- Connected to the CN through fiber cables.
- Each base station only serves one DER node.
- Operated by the same Mobile Network Operator as the core network.
- Specifically built device running a real-time operating system, designed for relaying data between the DER and the centralized control node.
- In the distributed architecture the DC node hosts a fully distributed service for keeping track of the DER nodes in the grid, letting each node know which other nodes to exchange data with.
- Designed for communication across multiple interfaces for increased interoperability.
- Updates, patching, and general configuration are handled by a third-party service provider.
- Owned and operated by a third-party company.
- Can vary with regard to type (e.g., battery, wind, or photovoltaic) and with regard to production capacity.
5.3. Identifying Threats
5.4. Evaluating and Mitigating Threats
6. Discussion
6.1. Cybersecurity of the Centralized and the Distributed Control Architectures
6.2. Threat Modeling Method
- Level of abstraction: A question that often came up during the threat modeling process was how things were implemented. At an early stage of the design process, as is the case with our use case, many design choices are still undecided. Both in the identification and evaluation of threat phases, the discussion tends to become detailed and technical. Care must therefore be taken to ensure that threats are formulated in such a way that they are detailed enough to provide value, but general enough to avoid making premature assumptions about the design.
- Use of guide questions: Overall, the guide questions seemed to work well, although at times we had to remind ourselves of what was included in or intended for each of the questions. This was possibly most relevant when dealing with the guide questions related to availability, A1, A2, and A3, relating to the availability of the transmitted data, the availability of ICS function software processes, and the availability of the underlying infrastructure supporting the software processes, respectively.
- Duplicate threats: The third observation relates to duplicate threats, i.e., similar threats being identified for several of the guide questions. To illustrate this, consider the following guide questions, I1, A1, and C1:
- I1: How can an attacker send false data to any of the processes that are part of the ICS function, or tamper with legitimate data being sent from any of the processes that are part of the ICS function?
- A1: How can an attacker deny the arrival of data sent between the processes that are part of the ICS function?
- C1: How can an attacker obtain sensitive information from the ICS function?
For all these questions, some variation of the threat “an attacker may attempt to compromise the supply chain to embed a malware in the ICS function” is a valid answer. One can image a malware with the ability to tamper with data in the software process, deny the functioning of the software process, or exfiltrate data from the process. Because of this, in some cases, we observed similar threats reoccurring, although with different consequences. - Process driven by threats or consequences: In its current form, the threat modeling method starts by identifying threats, attempting to answer such questions as “How can an attacker obtain sensitive information”. Then, the method proceeds to evaluate whether the threat is acceptable or not. A danger of this is that we might identify threats which turn out to be less relevant, either because they are acceptable or because they affect systems which are less critical. We therefore wonder if it is better to start out by first asking “What are the consequences if sensitive information is leaked?”. If the consequences turn out to be unacceptable, we can then move on to identify how an attacker can perform this, i.e., the threat. An added benefit is that it might be more motivating for asset owners to identify threats when this step follows directly from the conclusion that a consequence is unacceptable.
- Effort and reproducibility: One of the principles behind the chosen threat modeling method is that it should be lightweight and easy to use. While we would argue that the barriers to understanding and applying the method are low, performing the threat modeling is still a time-consuming process. The outcome of the threat modeling is also dependent on the team performing the threat modeling. This may hold even more true for the method chosen in this paper, as the process is driven by rather generic threat guide questions. While this makes the method lightweight and flexible, it likely also makes the outcome more dependent on the team performing the threat modeling.
- Description of threats: While the threat modeling method does not stipulate how identified threats should be structured and documented, we believe it is useful to augment threat descriptions to explicitly include attacker location (fully remote, within wireless range, physical access) and prerequisites (which threats must already have materialized for the current threat to be possible), along with a description of the threat itself.
- Threat categories: One can argue that threat modeling of ICSs should also include threats directly related to controllability and observability. However, as these properties are reliant on integrity and availability, we do not include them explicitly. This is to reduce the complexity and the effort required for performing the threat modeling.
7. Conclusions and Further Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
CC | Centralized Control |
CN | (5G) Core Network |
DC | Distributed Control |
DER | Distributed Energy Resource |
DSO | Distribution System Operator |
FME | Forskningssenter for Miljøvennlig Energi |
ICS | Industrial Control System |
MDPI | Multidisciplinary Digital Publishing Institute |
MV | Medium Voltage |
PV | PhotoVoltaic |
STRIDE | Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, |
Elevation of privilege | |
VRES | Variable Renewable Energy Sources |
Appendix A. Identified Threats
Number | Threat Description |
---|---|
I1.1 | Basic Threat: B1. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage access to the 5G slice and attempt to compromise the infrastructure responsible for distributing ICS process keys, generate a new key, and use the key to inject false data into the calculation of new DER setpoints. |
I1.2 | Basic Threat: B1. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may attempt to target a DC/CC node to extract application key material, (for instance exploiting Heartbleed -like vulnerabilities [18]) and use this to inject false data into the calculation of new DER setpoints. |
I1.3 | Basic Threat: None. Attacker location: Physical. Relevant Architecture: Centralized. Threat Description: An inside operator may attempt to tamper with legitimate data or inject false data into the calculation of new DER setpoints. |
I1.4 | Basic Threat: B4. Attacker location: Physical or in wireless range. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised CC/DC node and attempt to install malware which can tamper with legitimate data or inject false data into the calculation of new DER setpoints. |
I1.5 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may attempt to leverage a compromised PS or SP to install malware on the DC/CC node, which can tamper with legitimate data or inject false data into the calculation of new DER setpoints. |
I1.6 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Centralized. Threat Description: An attacker may attempt to leverage a compromised PD or SP to install malware in the control center through the supply chain, which can tamper with legitimate data or inject false data into the calculation of new DER setpoints. |
I1.7 | Basic Threat: B4. Attacker location: Physical. Relevant Architecture: Both. Threat Description: An attacker may attempt to steal a CC/DC node and physically manipulate the sensor readings directly (for instance by applying heat to it), potentially while also moving it to another location. |
I1.8 | Basic Threat: B1. Attacker location: Remote. Relevant Architecture: Centralized. Threat Description: An attacker may attempt to target the CC server to extract application key material, (for instance exploiting Heartbleed-like vulnerabilities [57]) and use this to inject false data into the calculation of new DER setpoints. |
I1.9 | Basic Threat: B4. Attacker location: Physical, wireless range. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised CC/DC node, attempt to extract 5G and application key material, and use this to inject false data into the calculation of new DER setpoints. |
Number | Threat Description |
---|---|
I2.1 | Basic Threat: B1. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage access to the 5G slice and attempt to compromise application-level authentication to program or change control logic in the processes which are part of the ICS function. |
I2.2 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised PS to embed a malware which can program or change control logic in the processes which are part of the ICS function. |
I2.3 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised SP to reprogram or reconfigure the processes in the CC/DC nodes which are part of the ICS function. |
I2.4 | Basic Threat: None. Attacker location: Physical. Relevant Architecture: Centralized. Threat Description: An inside operator may attempt to change the logic/setpoints in the processes in the different CC nodes from the control center. |
I2.5 | Basic Threat: B4. Attacker location: Physical, wireless range. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised DC/ CC node and use this to attempt to change program logic. |
I2.6 | Basic Threat: B2. Attacker location: Remote. Relevant Architecture: Centralized. Threat Description: An attacker may attempt to compromise and gain privileges on the CC server in the control center which in turn can be used for changing ICS function logic. |
I2.7 | Basic Threat: B1 or B2. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage access to the 5G slice, or the DSO control center attempt to exploit the remote update/configuration functionality of the CC/DC nodes, administered through a server in the DSO control center. |
I2.8 | Basic Threat: B4. Attacker location: Physical, wireless range. Relevant Architecture: Distributed. Threat Description: An attacker may leverage a compromised DC node and attempt to spread malware in the form of a worm, which may be used to tamper with legitimate data or inject false data into the calculation of new setpoints. |
Number | Threat Description |
---|---|
A1.1 | Basic Threat: None. Attacker location: Wireless range. Relevant Architecture: Both. Threat Description: An attacker may attempt to jam the 5G signal between the CC/DC and the RAN. |
A1.2 | Basic Threat: B1 or B2. Attacker location: Remote. Relevant Architecture: Distributed. Threat Description: An attacker may attempt to deny the functioning of the service keeping track of DC nodes in the network, for instance by obtaining privileges on the server implementing the service, or by flooding the server with traffic. |
A1.3 | Basic Threat: B5. Attacker location: Remote. Relevant Architecture: Centralized. Threat Description: An attacker may leverage access to the private network between the 5G CN and the DSO control center and launch a traffic-based DoS attack on the 5G CN and DSO control center interfaces. |
A1.4 | Basic Threat: B1 or B2. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage access to the 5G slice or the DSO control center to target the authentication infrastructure deployed there, to attempt to revoke the long-term cryptographic key/certificate used by ICS function processes running in the CC/DC nodes, to make the receiver discard communication encrypted with the key. This can for instance be done by exploiting an insecure implementation or compromising an admin account. |
A1.5 | Basic Threat: None. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may attempt to revoke the eSIMs used by CC/DC nodes, to deny the node access to the 5G network. This can for instance be attempted by pretending to be the DSO towards the MNO. |
A1.6 | Basic Threat: None. Attacker location: Physical. Relevant Architecture: Both. Threat Description: An attacker may attempt to cut cables connecting the 5G base stations, or otherwise destroy base stations. |
A1.7 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised MNO supplier and attempt to deny the service of the 5G CN functions needed for the correct functioning of the 5G slice. |
A1.8 | Basic Threat: None. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An employee at the MNO may attempt to take down or alter 5G services needed for the correct functioning of the 5G slice. |
A1.9 | Basic Threat: None. Attacker location: Physical. Relevant Architecture: Centralized. Threat Description: An employee at the DSO may attempt to take down or alter services in the control center (e.g, crashing the algorithm solver, blocking all traffic to the firewall) needed for the correct functioning of the ICS function. |
Number | Threat Description |
---|---|
A2.1 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised PS or SP delivering any of the software used by the processes in the ICS function, and embed malware which can compromise the availability. |
A2.2 | Basic Threat: B4. Attacker location: Remote. Relevant Architecture: Centralized. Threat Description: An attacker may leverage a compromised CC node and use it to attempt to launch a denial-of-service attack on the CC server. |
A2.3 | Basic Threat: B4. Attacker location: Remote. Relevant Architecture: Distributed. Threat Description: An attacker may leverage a compromised DC node and use it to attempt to launch a denial-of-service attack on neighboring DC nodes. |
A2.4 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised PS to embed malware in the software running in the processes that are part of the ICS function. This malware can proceed to cause denial of service. |
A2.5 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Distributed. Threat Description: An attacker may leverage a compromised SP to exploit the remote update functionality and install malware on the processes running in the CC/DC nodes or CC server. This malware can proceed to cause denial of service. |
A2.6 | Basic Threat: B4. Attacker location: Remote. Relevant Architecture: Distributed. Threat Description: An attacker may leverage a compromised DC node to attempt to spread malware to other DC nodes in the form of a worm. This malware can proceed to cause denial of service. |
Number | Threat Description |
---|---|
A3.1 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised PS or SP developing software that the ICS function relies on, e.g., developers or maintainers of the relevant operating system, monitoring software or asset inventory software. By embedding denial of service malware in this software, an attacker can compromise the availability of the ICS function. |
C1.1 | Basic Threat: None. Attacker location: Physical. Relevant Architecture: Centralized. Threat Description: An employee at the DSO might attempt to sell market sensitive data. |
C1.2 | Basic Threat: None. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An insider at the SP might attempt to steal market sensitive data, for instance by transferring data to an online server or by transferring it to a hard drive. |
C1.3 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker might leverage a compromised PS or SP to embed malware in their products, to later extract market sensitive data. |
C1.4 | Basic Threat: B3. Attacker location: Remote. Relevant Architecture: Both. Threat Description: An attacker might leverage a compromised SP to use their access to steal market sensitive data. |
C1.5 | Basic Threat: B4. Attacker location: Remote. Relevant Architecture: Distributed. Threat Description: An attacker may leverage a compromised DC node and use the access to attempt to spread malware in the form of a worm, which can be used to extract data. |
Appendix B. Mapping of Threats to Security Measures
Number | Security Controls | Threats |
---|---|---|
SC 1 | Harden the implementation and configuration of software and check it periodically. | B4, I1.1, I1.2, I1.8, I1.9, A1.4 |
SC 2 | Only accept the latest cryptographic algorithms and cipher suites. | I2.1, A1.4 |
SC 3 | Put in place procedures and systems for regularly patching vulnerabilities. | B2, B4, I1.1, I1.2, I1.4, I1.8, I1.9, I2.1, A1.2, A1.4, |
SC 4 | Perform hardware and device hardening (e.g., encrypted flash, removing unused services) | B2, B4, B4, I1.1, I1.2, I1.4, I1.9, I2.5, I2.6, I2.7, I2.8, A1.2, A1.4, A2.6, I1.9, I2.5, I2.6, I2.8, A2.2, A2.3, C1.5 |
SC 5 | Perform/require employee background check (both DSO and suppliers) | B3, I1.3, I2.4, A1.8, A1.9, C1.1, C1.2 |
SC 6 | Require that more than one person is involved in performing an action | I1.3, I2.4, A1.8, A1.9, C1.1 |
SC 7 | Verify signatures of software updates | I1.5, I1.6, I2.2, A2.1, A2.4, A2.5, C1.3 |
SC 8 | Require cyber security certification of suppliers, self-assessments, information security management systems. | B1, B3, B4, B5, I1.5, I1.6, I2.2, I2.3, A2.1, A2.4, A2.5, A3.1, C1.3, C1.4 |
SC 9 | Require suppliers and in-house developers to follow secure development processes. | B1, B4, B4, I1.1, I1.2, I1.5, I1.6, I1.8, I1.9, I2.1, I2.2, I2.5, I2.6, I2.7, A2.1, A2.4, A3.1, C1.3, C1.4 |
SC 10 | Implement processes and solution allowing DSO employees to monitor action performed by SPs. | B4, I1.5, I1.6, I2.3, A2.5, C1.2, C1.4 |
SC 11 | Deny attempts to establish connection from outside of the control center to devices inside the control center, implement a demilitarized zone, and segment the network. | B2, I1.8, I2.6, I2.7, A1.2, A1.4, A2.5 |
SC 12 | Monitor the traffic in the network (5G slice and 5G CN – DSO network) | B1, I1.1, I1.2, A1.1, A1.2, A2.2, A2.3, A2.6, C1.5 |
SC 13 | Configure the 5G slice/base station to be jamming resistant. | A1.1 |
SC 14 | Design the distributed algorithm to handle the loss of the service providing DC nodes with its neighbors in a graceful way (e.g., fallback to the last know list of nearest neighbors). | A1.2 |
SC 15 | Engineer the control center interface to the 5G so that it can handle any reasonable amount of flood-based DoS attacks. | A1.3 |
SC 16 | Implement secure processes for adding and revoking eSIM. | A1.5 |
SC 17 | Require that the mobile network operator forwards the DSO supplier requirements to their suppliers. | A1.8 |
SC 18 | Remove all non-essential software components | A3.1 |
SC 19 | Harden all devices and applications inside the control center, to prevent an attacker from gaining a foothold. | B2, I2.6, I2.7 |
SC 20 | Require the MNO and the provider of the connection between the 5G CN to DSO control center to periodically test and patch their infrastructure. | B1, B5 |
SC 21 | Run anti-virus or whitelisting. | I1.4, I1.5, I1.6, I2.1, I2.2, I2.5, I2.6, I2.7, I2.8, A2.1, A2.4, A2.5, C1.3, C1.5 |
References
- Antoniadou-Plytaria, K.E.; Kouveliotis-Lysikatos, I.N.; Georgilakis, P.S.; Hatziargyriou, N.D. Distributed and Decentralized Voltage Control of Smart Distribution Networks: Models, Methods, and Future Research. IEEE Trans. Smart Grid 2017, 8, 2999–3008. [Google Scholar] [CrossRef]
- Šulc, P.; Backhaus, S.; Chertkov, M. Optimal Distributed Control of Reactive Power Via the Alternating Direction Method of Multipliers. IEEE Trans. Energy Convers. 2014, 29, 968–977. [Google Scholar] [CrossRef]
- Klemets, J.R.A.; Degefa, M.Z. A distributed algorithm for controlling continuous and discrete variables in a radial distribution grid. IEEE Access 2023, 11, 2488–2499. [Google Scholar] [CrossRef]
- Goel, S.; Hong, Y.; Papakonstantinou, V.; Kloza, D.; Goel, S.; Hong, Y. Security challenges in smart grid implementation. In Smart Grid Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 1–39. [Google Scholar]
- Dabrowski, A.; Ullrich, J.; Weippl, E.R. Grid shock: Coordinated load-changing attacks on power grids: The non-smart power grid is vulnerable to cyber attacks as well. In Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 4–8 December 2017; pp. 303–314. [Google Scholar]
- Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
- ICS-CERT. Cyber-Attack Against Ukrainian Critical Infrastructure; Tech. Rep. ICS Alert (IR-ALERT-H-16-056-01); Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2016. [Google Scholar]
- Slowik, J. Crashoverride: Reassessing the 2016 Ukraine Electric Power Event As a Protection-Focused Attack. 2019. Available online: https://hub.dragos.com/hubfs/Reports/Dragos_Global_Electric_Threat_Perspective_Word_Document_0424_r3.pdf?hsLang=enaccessed05/03/2025 (accessed on 4 March 2025).
- ESET Research. Industroyer2: Industroyer Reloaded. 2022. Available online: https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/ (accessed on 4 March 2025).
- Salazar, L.; Castro, S.R.; Lozano, J.; Koneru, K.; Zambon, E.; Huang, B.; Baldick, R.; Krotofil, M.; Rojas, A.; Cardenas, A.A. A Tale of Two Industroyers: It was the Season of Darkness. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024; pp. 312–330. [Google Scholar] [CrossRef]
- OT Cyber Threat Intelligence: Electric Threat Perspective; Dragos Report; Dragos: Hanover, MD, USA, 2024.
- Abbatemarco, N.; Salviotti, G.; D’Ignazio, C.; De Rossi, L.M. Understanding Leadership Competencies in Cyber Crisis Management: Insights from the Maersk Global Supply Chain Meltdown. In Proceedings of the 57th Hawaii International Conference on System Sciences, Maui, HI, USA, 3–6 January 2024. [Google Scholar]
- Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Priv. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Slowik, J. Zeroing in on Xenotime: Analysis of the entities responsible for the TRITON event. In Proceedings of the 2022 Virus Bulletin Conference, Orlando, FL, USA, 28–30 September 2022. [Google Scholar]
- Flå, L.H.; Jaatun, M.G. A method for threat modelling of industrial control systems. In Proceedings of the Cyber Science 2023, London, UK, 13–14 June 2023; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar]
- Ohanu, C.P.; Rufai, S.A.; Oluchi, U.C. A comprehensive review of recent developments in smart grid through renewable energy resources integration. Heliyon 2024, 10, e25705. [Google Scholar] [CrossRef] [PubMed]
- Tuballa, M.L.; Abundo, M.L. A review of the development of Smart Grid technologies. Renew. Sustain. Energy Rev. 2016, 59, 710–725. [Google Scholar] [CrossRef]
- Peretto, L. The role of measurements in the smart grid era. IEEE Instrum. Meas. Mag. 2010, 13, 22–25. [Google Scholar] [CrossRef]
- Matthiss, B.; Erb, J.; Binder, J. Using Smart Meters for Distribution Grid State Estimation. In Proceedings of the 2019 International Conference on Smart Energy Systems and Technologies (SEST), Porto, Portugal, 9–11 September 2019; pp. 1–5. [Google Scholar]
- Ding, W.; Xu, M.; Huang, Y.; Zhao, P.; Song, F. Cyber attacks on PMU placement in a smart grid: Characterization and optimization. Reliab. Eng. Syst. Saf. 2021, 212, 107586. [Google Scholar] [CrossRef]
- Douglass, D.A.; Gentle, J.; Nguyen, H.M.; Chisholm, W.; Xu, C.; Goodwin, T.; Chen, H.; Nuthalapati, S.; Hurst, N.; Grant, I.; et al. A Review of Dynamic Thermal Line Rating Methods With Forecasting. IEEE Trans. Power Deliv. 2019, 34, 2100–2109. [Google Scholar] [CrossRef]
- Zarghami, M.; Niknam, T.; Aghaei, J.; Nezhad, A.H. Concurrent PV production and consumption load forecasting using CT-Transformer deep learning to estimate energy system flexibility. IET Renew. Power Gener. 2024, 18, 2139–2161. [Google Scholar] [CrossRef]
- Liu, J.; Ponci, F.; Monti, A.; Muscas, C.; Pegoraro, P.A.; Sulis, S. Optimal Meter Placement for Robust Measurement Systems in Active Distribution Grids. IEEE Trans. Instrum. Meas. 2014, 63, 1096–1105. [Google Scholar] [CrossRef]
- Ruuth, K.; Mutanen, A. Demonstrating State Estimation for Future Smart Grid. In Proceedings of the 2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE), Grenoble, France, 23–26 October 2023; pp. 1–6. [Google Scholar]
- Bjarghov, S.; Stefanussen Foslie, S.; Askeland, M.; Rana, R.; Taxt, H. Enhancing grid hosting capacity with coordinated non-firm connections in industrial energy communities. Smart Energy 2024, 15, 100154. [Google Scholar] [CrossRef]
- Yee Chong, A.T.; Mahmoud, M.A.; Lim, F.C.; Kasim, H. A review of Smart Grid Technology, Components, and Implementation. In Proceedings of the 2020 8th International Conference on Information Technology and Multimedia (ICIMU), Selangor, Malaysia, 24–26 August 2020; pp. 166–169. [Google Scholar]
- Irfan, M.; Sadighian, A.; Tanveer, A.; Al-Naimi, S.; Oligeri, G. A survey on detection and localisation of false data injection attacks in smart grids. Iet-Cyber-Phys. Syst. Theory Appl. 2024, 9, 313–333. [Google Scholar] [CrossRef]
- Swiderski, F.; Snyder, W. Threat Modeling; Microsoft Press: Redmond, WA, USA, 2004. [Google Scholar]
- Shostack, A. Threat Modeling: Designing for Security; Wiley: Hoboken, NJ, USA, 2014. [Google Scholar]
- Khalil, S.M.; Bahsi, H.; Korõtko, T. Threat modeling of industrial control systems: A systematic literature review. Comput. Secur. 2024, 136, 103543. [Google Scholar] [CrossRef]
- Ling, E.R.; Ekstedt, M. Generating threat models and attack graphs based on the IEC 61850 system configuration description language. In Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Conference, 26 April 2021; pp. 98–103. [Google Scholar]
- Ling, E.R.; Ekstedt, M. A threat modeling language for generating attack graphs of substation automation systems. Int. J. Crit. Infrastruct. Prot. 2023, 41, 100601. [Google Scholar] [CrossRef]
- Hawrylak, P.J.; Haney, M.; Papa, M.; Hale, J. Using hybrid attack graphs to model cyber-physical attacks in the smart grid. In Proceedings of the 2012 5th International Symposium on Resilient Control Systems, Salt Lake City, UT, USA, 14–16 August 2012; pp. 161–164. [Google Scholar]
- Suleiman, H.; Alqassem, I.; Diabat, A.; Arnautovic, E.; Svetinovic, D. Integrated smart grid systems security threat model. Inf. Syst. 2015, 53, 147–160. [Google Scholar] [CrossRef]
- Omerovic, A.; Vefsnmo, H.; Gjerde, O.; Ravndal, S.T.; Kvinnesland, A. An industrial trial of an approach to identification and modelling of cybersecurity risks in the context of digital secondary substations. In Proceedings of the Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, 29–31 October 2019; Springer: Berlin/Heidelberg, Germany, 2020; pp. 17–33. [Google Scholar]
- Holik, F.; Flå, L.H.; Jaatun, M.G.; Yayilgan, S.Y.; Foros, J. Threat Modeling of a Smart Grid Secondary Substation. Electronics 2022, 11, 850. [Google Scholar] [CrossRef]
- Rahim, F.A.; Ahmad, N.A.; Magalingam, P.; Jamil, N.; Cob, Z.C.; Salahudin, L. Cybersecurity vulnerabilities in smart grids with solar photovoltaic: A threat modelling and risk assessment approach. Int. J. Sustain. Constr. Eng. Technol. 2023, 14, 210–220. [Google Scholar]
- Flå, L.H.; Borgaonkar, R.; Tøndel, I.A.; Jaatun, M.G. Tool-assisted threat modeling for smart grid cyber security. In Proceedings of the 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Virtual Conference, 14–18 June 2021; pp. 1–8. [Google Scholar]
- Vallant, H.; Stojanović, B.; Božić, J.; Hofer-Schmitz, K. Threat modelling and beyond-novel approaches to cyber secure the smart energy system. Appl. Sci. 2021, 11, 5149. [Google Scholar] [CrossRef]
- Marksteiner, S.; Vallant, H.; Nahrgang, K. Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling. J. Inf. Secur. Appl. 2019, 49, 102389. [Google Scholar] [CrossRef]
- Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. STRIDE-based threat modeling for cyber-physical systems. In Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Torino, Italy, 26–29 September 2017; pp. 1–6. [Google Scholar]
- Sion, L.; Yskout, K.; Van Landuyt, D.; Joosen, W. Solution-aware data flow diagrams for security threat modeling. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing, Pau, France, 9–13 April 2018; pp. 1425–1432. [Google Scholar]
- Sion, L.; Yskout, K.; Van Landuyt, D.; van den Berghe, A.; Joosen, W. Security threat modeling: Are data flow diagrams enough? In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, Seoul, Republic of Korea, 27 June–19 July 2020. [Google Scholar]
- Lourenço, M.B.; Marinos, L.; Patseas, L. ENISA Threat Landscape for 5G Networks: Updated Threat Assessment for the Fifth Generation of Mobile Telecommunications Networks (5G); European Union Agency for Cybersecurity (ENISA): Attiki, Greece, 2020.
- Sheng, Y.; Guanjie, Q.; Guozu, J.; Hao, D.; Liang, F.; Lingqi, L. Research on 5G-based Disaster-Resistant Security for Smart Power Grids. In Proceedings of the 2024 IEEE 7th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), Shenyang, China, 8–10 November 2024; pp. 125–130. [Google Scholar]
- Køien, G.M. On threats to the 5G service based architecture. Wirel. Pers. Commun. 2021, 119, 97–116. [Google Scholar] [CrossRef]
- Borgaonkar, R.; Anne Tøndel, I.; Zenebe Degefa, M.; Gilje Jaatun, M. Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 2021, 33, e6466. [Google Scholar] [CrossRef]
- Granata, D.; Rak, M. Systematic analysis of automated threat modelling techniques: Comparison of open-source tools. Softw. Qual. J. 2024, 32, 125–161. [Google Scholar] [CrossRef]
- Shostack, A. Experiences Threat Modeling at Microsoft. In Proceedings of the Workshop on Modeling Security (MODSEC08). CEUR Workshop Proceedings, Toulouse, France, 28–29 February 2008. [Google Scholar]
- IEC 62443-4-2:2019; Security for Industrial Automation and Control Systems—Part 4-2: Technical Security Requirements for IACS Components. International Electrotechnical Commission: Geneva, Switzerland, 2019.
- Staggs, J.; Ferlemann, D.; Shenoi, S. Wind farm security: Attack surface, targets, scenarios and mitigation. Int. J. Crit. Infrastruct. Prot. 2017, 17, 3–14. [Google Scholar] [CrossRef]
- Molzahn, D.K.; Dörfler, F.; Sandberg, H.; Low, S.H.; Chakrabarti, S.; Baldick, R.; Lavaei, J. A survey of distributed optimization and control algorithms for electric power systems. IEEE Trans. Smart Grid 2017, 8, 2941–2962. [Google Scholar] [CrossRef]
- Rodriguez-Gil, J.A.; Mojica-Nava, E.; Vargas-Medina, D.; Arevalo-Castiblanco, M.F.; Cortes, C.A.; Rivera, S.; Cortes-Romero, J. Energy management system in networked microgrids: An overview. Energy Syst. 2024, 15, 1–32. [Google Scholar] [CrossRef]
- Messmer, D.; Malmedal, K. Optimizing Distributed Energy Resource Control System Architecture. In Proceedings of the 2021 IEEE Rural Electric Power Conference (REPC), Virtual Conference, 26–29 April 2021; pp. 67–72. [Google Scholar] [CrossRef]
- Nguyen, J.; Dupuis, M. Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations. In Proceedings of the 20th Annual SIG Conference on Information Technology Education, Tacoma, WA, USA, 3–5 October 2019; pp. 93–98. [Google Scholar] [CrossRef]
- Hua, H.; Wei, Z.; Qin, Y.; Wang, T.; Li, L.; Cao, J. Review of distributed control and optimization in energy internet: From traditional methods to artificial intelligence-based methods. IET Cyber-Phys. Syst. Theory Appl. 2021, 6, 63–79. [Google Scholar] [CrossRef]
- Carvalho, M.; DeMott, J.; Ford, R.; Wheeler, D.A. Heartbleed 101. IEEE Secur. Priv. 2014, 12, 63–67. [Google Scholar] [CrossRef]
Centralized Control (CC) | Distributed Control (DC) |
---|---|
Single central controller that collects and processes all information. | Multiple distributed controllers that collect information locally and communicate with their neighbours. |
|
|
Number | Threat Description |
---|---|
B1 | An attacker may attempt to access the 5G slice, thus obtaining access to the devices communicating using this slice. This includes the CC node, the DC node, and the CC server. |
B2 | An attacker may attempt to obtain a foothold on the DSO control center network, allowing the attacker to interact with devices and services deployed in the control center. |
B3 | An attacker may attempt to compromise an actor in the supply chain (e.g., Product Supplier (PS), Service Provider (SP), the MNO, the company providing the network access between the DSO control center and the 5G CN). |
B4 | An attacker may attempt to obtain privileges on, or extract data from, a CC or DC node, for instance through hardware hacking or exploiting a wireless interface. Nodes compromised through supply chain attacks are covered by B3. Attacks which require access to the slice are covered by B1. |
B5 | An attacker may attempt to obtain a presence on the private network connecting the 5G CN and the DSO control center, thus enabling the attacker to reach the 5G CN and DSO control center interfaces. |
Number | Threat Description |
---|---|
I1.1 | Basic Threat: B1. Attacker Location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage access to the 5G slice and attempt to compromise the infrastructure responsible for distributing ICS process keys, generate a new key, and use the key to inject false data into the calculation of new DER setpoints. |
I2.1 | Basic Threat: B1. Attacker Location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage access to the 5G slice and attempt to compromise application-level authentication to program or change control logic in the processes which are part of the ICS function. |
A1.1 | Basic Threat: None. Attacker Location: Wireless range. Relevant Architecture: Both. Threat Description: An attacker may attempt to jam the 5G signal between the CC/DC and the RAN. |
A2.1 | Basic Threat: B3. Attacker Location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised PS or SP delivering any of the software used by the processes in the ICS function, and embed malware that can compromise the availability. |
A3.1 | Basic Threat: B3. Attacker Location: Remote. Relevant Architecture: Both. Threat Description: An attacker may leverage a compromised PS or SP developing software that the ICS function relies on, e.g., developers or maintainers of the relevant operating system, monitoring software or asset inventory software. By embedding denial of service malware in this software, an attacker can compromise the availability of the ICS function. |
C1.1 | Basic Threat: None. Attacker Location: Physical. Relevant Architecture: Centralized. Threat Description: An employee at the DSO might attempt to sell market-sensitive data. |
Number | Justification |
---|---|
I1.7 | This threat of stealing CC/DC nodes and physically manipulating sensors falls more in the category of physical sabotage than cyber threats, and we therefore consider it out of scope. Adding to this is the fact that this threat is noisy and likely to be detected. |
A1.6 | For much of the same reason as for the threat above, we consider this out of scope. |
Number | Security Controls | Threats |
---|---|---|
SC 1 | Harden the implementation and configuration of software and check it periodically. | B4, I1.1, I1.2, I1.8, I1.9, A1.4 |
SC 3 | Put in place procedures and systems for regularly patching vulnerabilities. | B2, B4, I1.1, I1.2, I1.4, I1.8, I1.9, I2.1, A1.2, A1.4 |
SC 4 | Perform hardware and device hardening (e.g., encrypted flash, removing unused services). | B2, B4, B4, I1.1, I1.2, I1.4, I1.9, I2.5, I2.6, I2.7, I2.8, A1.2, A1.4, A2.6, I1.9, I2.5, I2.6, I2.8, A2.2, A2.3, C1.5 |
SC 13 | Configure the 5G slice/base station to be jamming-resistant. | A1.1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Flå, L.H.; Klemets, J.R.A.; Jaatun, M.G. Threat Modeling of Smart Grid Control Architectures. Electronics 2025, 14, 1068. https://doi.org/10.3390/electronics14061068
Flå LH, Klemets JRA, Jaatun MG. Threat Modeling of Smart Grid Control Architectures. Electronics. 2025; 14(6):1068. https://doi.org/10.3390/electronics14061068
Chicago/Turabian StyleFlå, Lars Halvdan, Jonatan Ralf Axel Klemets, and Martin Gilje Jaatun. 2025. "Threat Modeling of Smart Grid Control Architectures" Electronics 14, no. 6: 1068. https://doi.org/10.3390/electronics14061068
APA StyleFlå, L. H., Klemets, J. R. A., & Jaatun, M. G. (2025). Threat Modeling of Smart Grid Control Architectures. Electronics, 14(6), 1068. https://doi.org/10.3390/electronics14061068