Resilience of IEC 61850 Sampled Values-Based Protection Systems Under Coordinated False Data Injections
Denys Mishchenko, Irina Oleinikova, Laszlo Erdodi
TLDR
This paper reveals critical vulnerabilities in IEC 61850 digital substations under coordinated False Data Injection Attacks targeting Sampled Values.
Key contributions
- Experimentally analyzed coordinated FDIAs targeting IEC 61850 Sampled Values protocol.
- Demonstrated stealthy multi-vector FDIAs can trigger false protection or conceal real faults.
- Utilized a Power Hardware-in-the-Loop (PHIL) testbed for realistic, industrial-grade evaluation.
- Outlined a resilience method using trusted independent channels and SV data cross-verification.
Why it matters
This research highlights critical vulnerabilities in modern digital substations, showing how coordinated cyberattacks can severely impact grid reliability. It provides experimental evidence of stealthy attacks and proposes practical defense strategies, crucial for securing future power grids.
Original Abstract
This paper assesses the resilience of IEC 61850 digital substations under False Data Injection Attacks (FDIAs) targeting the Sampled Values (SV) protocol. The multicast nature of SV, while enabling time-critical automation, exposes substations to cyber intrusions capable of disrupting protection functions and causing large-scale outages. To evaluate these risks, coordinated attack vectors involving both physical and cyber access at the bay level are experimentally analyzed using an advanced setup based on industrial-grade intelligent electronic devices (IEDs). The proposed attacks simultaneously manipulate multiple electrical parameters in a coordinated and physically consistent manner. Experimental results confirm the feasibility of stealthy multi-vector FDIAs that can trigger false protection actions, conceal real faults, or block protection mechanisms while maintaining realistic signal behavior. The Power Hardware-in-the-Loop (PHIL) testbed enables closed-loop evaluation under strict timing, communication, and protection logic constraints, reflecting real device behavior beyond simulation and controller-level HIL environments. The findings reveal critical vulnerabilities in SV-based protection schemes that directly affect grid reliability, particularly under realistic attacker positioning. To address these challenges, a defense strategy covering deterrence, prevention, detection, mitigation, and resilience is analyzed, with emphasis on bay-level infrastructure. Furthermore, a resilience-oriented method based on trusted independent channels and cross-verification of SV data within the protection logic is outlined as a complementary countermeasure for scenarios where existing standardized security mechanisms are insufficient.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.