0
20
40
60
80
100
100 200 300 400 500 600 700 800 900 1000
CPU usage (%)
Data Messages per second
(a) CPU usage
0
20
40
60
80
100
120
140
160
10 20 30 40 50 60 70 80 90 100
Min required capacity (kbps)
Data Messages per second
1 phasor, all integers
1 phasor, all floats
10 phasors, all integers
10 phasors, all floats
(b) Bandwidth (using UDP)
0
100
200
300
400
500
600
10 20 30 40 50 60 70 80 90 100
Min required capacity (kbps)
Data Messages per second
1 phasor, all integers
1 phasor, all floats
10 phasors, all integers
10 phasors, all floats
(c) Bandwidth (using TCP)
Figure 8: Resource requirements with increase in data transmission rate.
latencies and their impact on the data transmission
rate. The reported results provide enough information
about the required resources and network characteris-
tics before designing any synchrophasor application
based on IEEE C37.118-2 standard.
ACKNOWLEDGEMENTS
This work was funded by the EPSRC CAPRICA
project (EP/M002837/1).
REFERENCES
Allgood, G., Bass, L., Brown, B., Brown, K., Griffin, S.,
Ivers, J., Kuruganti, T., Lake, J., Lipson, H., Nutaro,
J., Searle, J., and Smith, B. (2011). Security profile
for wide-area monitoring, protection, and control. In
The UCAIug SG Security Working Group.
Baumeister, T. (2010). Literature review on smart grid cyber
security. In University of Hawaii, Technical Report.
Beasley, C., Zhong, X., Deng, J., Brooks, R., and Ve-
nayagamoorthy, G. K. (2014). A survey of electric
power synchrophasor network cyber security. In 5th
IEEE PES Innovative Smart Grid Technologies Eu-
rope (ISGT Europe). IEEE.
Boyer, W. F. and McBride, S. A. (2009). Study of secu-
rity attributes of smart grid systemscurrent cyber secu-
rity issues. In INL, USDOE, Battelle Energy Alliance
LLC., Rep INL/EXT-09-15500.
Coppolino, L., DAntonio, S., and Romano, L. (2014). Ex-
posing vulnerabilities in electric power grids: An ex-
perimental approach. In International Journal of Crit-
ical Infrastructure Protection vol:7(1), pp:51-60. EL-
SEVIER.
D’Antonio, S., Coppolino, L., Elia, I., and Formicola, V.
(2011). Security issues of a phasor data concentrator
for smart grid infrastructure. In 13th European Work-
shop on Dependable Computing. ACM.
Grigsby, L. L. (2012). Wide-area monitoring and situational
awareness. In Power System Stability and Control -
Third Edition, Volume 5. CRC Press.
Martin, K. E., Hamai, D., Adamiak, M. G., Anderson, S.,
Begovic, M., Benmouyal, G., Brunello, G., Burger,
J., Cai, J. Y., Dickerson, B., Gharpure, V., Kennedy,
B., Karlsson, D., Phadke, A. G., Salj, J., Skendzic,
V., Sperr, J., Song, Y., Huntley, C., Kasztenny,
B., and Price, E. (2008). Exploring the ieee stan-
dard c37.1182005 synchrophasors for power systems.
In IEEE TRANSACTIONS ON POWER DELIVERY,
VOL. 23, NO. 4. IEEE.
Morris, T., Pan, S., Lewis, J., Moorhead, J., Younan, N.,
King, R., Freund, M., and Madani, V. (2011). Cy-
ber security risk testing of substation phasor measure-
ment units and phasor data concentrators. In Seventh
Annual Workshop on Cyber Security and Information
Intelligence Research (CSIIRW ’11). ACM.
Schweitzer, E., Gong, Y., and Donolo, M. (2008). Ad-
vanced real-time synchrophasor applications. In 35th
Annual Western Protective Relay Conference.
Shepard, D., Humphreys, T., and Fansler, A. (2012). Evalu-
ation of the vulnerability of phasor measurement units
to gps spoofing attacks. In International Journal of
Critical Infrastructure Protection.
Sikdar, B. and Chow, J. (2011). Defending synchrophasor
data networks against traffic analysis attacks. In IEEE
Transactions on Smart Grid, Vol:2, Issue: 4. IEEE.
Stewart, J., Maufer, T., Smith, R., Anderson, C., and Er-
sonmez, E. (2011). Synchrophasor security practices.
In 14th Annual Georgia Tech Fault and Disturbance
Analysis Conference.
Weis, B., Rowles, S., and Hardjono, T. (Oct. 2011). The
group domain of interpretation. In Internet Engineer-
ing Task Force (IETF) Request For Comments (RFC):
6407.
Yan, Y., Qian, Y., Sharif, H., and Tipper, D. (2012). A
survey on cyber security for smart grid communi-
cations. In Communications Surveys and Tutorials,
vol.14, no.4, pp.998-1010. IEEE.
Yu, D.-Y., Ranganathan, A., Locher, T., Capkun, S., and
Basin, D. (2014). Short paper: detection of gps spoof-
ing attacks in power grids. In Int. conference on Secu-
rity and privacy in wireless & mobile networks. ACM.
Zargar, S., Joshi, J., and Tipper, D. (2013). A survey of de-
fense mechanisms against distributed denial of service
(ddos) flooding attacks. In Communications Surveys
and Tutorials, vol. 15, no. 4, pp. 2046-2069. IEEE.
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
178