1. Introduction
Smart grids are characterized by high digitisation that facilitates modernisation in electrical network infrastructure, active grid management, control and real-time communication with consumers, prosumers, and DSOs [
1]. Smart grid digitisation has created new areas of work, in which the electrical and communications infrastructures are neither independent nor operate in isolation [
2,
3]. Consequently, both infrastructures must be integrated into a single cyber-physical system (CPS) that must be analysed holistically to identify potential vulnerabilities that may affect the security and continuity of the power supply.
The vulnerability of an electrical network can be defined as its ability to maintain stable operation under the loss or disconnection of an element in the power network [
4,
5]. Vulnerability analysis allows power network operators to improve the robustness of critical elements in the network and develop countermeasures against untimely failures [
6]. Therefore, recognising the most vulnerable elements in a power grid will result in better operation [
1,
7] and provide an indispensable tool for DSO decision-makers [
8].
Traditional vulnerability analysis has focused on determining weaknesses in the electrical infrastructure (OT) when an element is lost. This is known as structural vulnerability [
8]. Several authors have used power flow techniques to determine the most vulnerable nodes in a network [
9]. However, methods that employ DC power flow are not suitable for analysing cascading events, and AC power flow methods have high computational costs [
8]. Other studies have employed topological methods that can define links between the structure and electrical characteristics of OT networks. The main advantages of topological methods are scalability, low computational costs, the ease of defining vulnerability indices, and the possibility of incorporating electrical information, such as line impedance, into models as weighted graphs [
8]. Topological methods are functional, logical, and numerical. However, they have several limitations. Functional methods [
9] are unsuitable for large power networks, logical methods [
10] cannot be applied to cyber-physical systems, and numerical methods [
11] have been applied to only small-scale networks.
In recent years, complex network theory has been used to analyse vulnerabilities in OT power networks [
8,
12,
13,
14,
15,
16]. Complex network indices, such as betweenness and net-ability, have been used to assess OT network vulnerabilities [
15,
17]. The work presented by [
18] proposes an electrical network model, based on complex network theory, to identify lines that would affect the OT network’s robustness in the event of a loss or disconnection. The authors of [
16] used an adjacent graph model, and in [
19], complex network indices, such as node degree and geodesic distance, were used to establish the critical nodes in an OT network that could cause a blackout in the event of cascading failures in specific elements. It should be noted that previous research papers have focused on physical electricity networks and have not addressed vulnerabilities that could occur in IT communications networks producing OT network vulnerabilities.
Current smart grids are cyber-physical systems composed of two heterogeneous networks: the power (OT) and communications (IT) networks which are both interconnected. Consequently, a vulnerability in either network (OT-IT) affects the entire CPS [
3,
20]. The work discussed in [
21] represents an initial approach to analysing vulnerabilities in smart grids by considering them as a single CPS. The authors of [
21] propose the use of an adjacency matrix, based on complex numbers, in which the OT network is represented by real components and the IT network by imaginary elements. However, the analysis developed in [
21] determines the vulnerability of individual elements in isolated networks, but it does not perform a vulnerability analysis that detects the most critical node in the CPS as a whole.
To identify smart grid vulnerabilities, it is not sufficient to separately analyse the physical components and the computational components, as is assumed in [
3]. It is also necessary to model the interaction between them. In [
12,
13,
14,
15,
16,
17,
18,
19], traditional vulnerability assessment is only based on the power grid; however, the detection of vulnerabilities in power networks is not sufficient to analyse vulnerabilities in smart grids which are also composed of communication networks. Moreover, to highlight hidden interdependencies between power and ICT networks it is also necessary to include the interconnection links between power nodes and communication nodes.
The major novelty and contribution of our paper is the proposal of a new methodology based on a multilayer network for the analysis of vulnerabilities of the smart grid. In this paper, we model a smart grid as a whole cyber-physical system composed of two heterogeneous interconnected networks: power network, ICT network, and also the coupling network between both networks. This approach has not been considered in other publications as can be seen in
Table 1.
It can be concluded through this comparison that interdependencies between power and ICT networks in smart grids are not considered in the literature [
12,
13,
14,
15,
16,
17,
18,
19]. These interdependencies represent one of the challenges in smart grids modelling [
3]. This research field is in its early stage [
21] and our proposed coupled smart grid modelled represents a contribution to the field.
In this article we propose the following three-fold contribution:
- −
We present an interconnected heterogeneous smart grid model for vulnerability assessment that highlights hidden interdependencies between power and ICT networks. The interconnected model encompasses power networks, ICT networks, and the interconnection between power-ICT networks. It should be emphasized that the interconnected and heterogeneous nature of smart grids is not considered in traditional smart grids vulnerability assessment where only power network vulnerability is analysed, and neither ICT network nor power-ICT interconnection is considered [
12,
13,
14,
15,
16,
17,
18,
19].
- −
We use multilayer complex network theory to deal with the complexity and heterogeneity of cyber-physical systems considered as interconnected and heterogeneous systems. Traditional smart grids models are modelled as monolayer networks in which only power network is considered [
12,
13,
14,
15,
16,
17,
18,
19,
21], therefore they are not able to detect ICT vulnerabilities nor the interaction between power and ICT networks.
- −
To determine the vulnerabilities of the cyber-physical systems, we use multilayer complex network centrality indexes which allow us to detect hidden interdependencies between power and ICT systems. These interdependencies are not considered in monolayer centrality indexes [
12,
13,
14,
15,
16,
17,
18,
19,
21] because they do not consider the interconnection between power and ICT networks.
The content of the paper is organized as follows:
Section 2 introduces the multilayer network theory and their centrality indexes used for vulnerability assessment in multilayer networks. In
Section 3, a Cyber-physical smart grid model is presented which is composed of two interconnected heterogeneous networks (power network, ICT network) and by the coupling layer between both networks. In
Section 4, the proposed methodology is applied to a standardized power network where the communication network and communication components are included. Finally, the conclusions of the paper are detailed in
Section 5.
2. Multilayer Theory
Complex network theory is one of the most widely used tools for analysing large numbers of interconnected elements, an area that has presented significant modelling challenges in recent years [
22]. This theory has been used to represent networks in the fields of biology and sociology. It is also valid for representing power networks [
17]. Complex network theory has been used to determine the most critical nodes in an electrical grid. In [
23], the topology of an Iranian power network was modelled using complex network theory which included electrical network characteristics, such as line admittance. The authors of [
24] used complex networks to analyse the impacts of attacks on a model of the French power network. Similarly, complex network theory has allowed the authors of [
25] to identify the sequence of events that would produce a blackout in a 25-bus electrical network. What these works have in common is that they analyse network vulnerabilities by considering only the OT infrastructure topology and exclude the physical monitoring and control equipment installed in generators, substations, lines, or consumers. Similarly, previous studies have failed to consider the communication equipment responsible for transmitting the bidirectional flow of information between the electricity grid and the DSO control centre.
In this article, we propose a grid model based on multilayer complex network theory, in which two heterogeneous networks: the OT and IT networks are integrated into a single CPS.
2.1. Basic Definitions
A multilayer network is composed of layers represented by the pair, where represents the family of graphs corresponding to each layer of the network, which are expressed according to . Each network layer is represented by a graph consisting of a set of nodes or vertices () and a set of edges between nodes () so that the graph corresponding to layer is represented by .
The matrix () of the pair, represents the connectivity between the nodes in the multilayer system (). The elements that comprise the matrix () are termed “cross layers”. The links between nodes in the same layer () are called “intralayers”, while the joins between different layers are called “interlayers”, . Hence, the multilayer system () is composed of nodes, where and .
According to layer α in the multilayer network, the graph
can be represented by an adjacency matrix
, where each element of the adjacency matrix (
) is expressed as follows (1):
Therefore, two nodes are considered to be adjacent in layer
when an edge joins them (
). In multilayer systems, the concept of adjacency also extends to connections between nodes in different layers. Hence, the edge connecting the node-layer pairs
and
would be adjacent to node
in layer
and node
in layer
[
26].
In multilayer systems, the adjacency matrix corresponding to the links between the
α and
β layers, denoted as
, is represented by
, where the elements of the adjacency matrix are obtained using the following Equation (2):
Representing complex systems in layers allows us to model the nodes, the relationships between nodes in the same layer and connections between elements in different layers [
22].
In multilayer systems, nodes in different layers are related to each other (i.e., nodes in one layer may depend on control nodes in other layers). Dependencies among nodes in different layers result in a structure known as a mesostructure in the field of complexity sciences. The mesostructure relates a node with one or more nodes. It should be noted that such relationships between nodes are only possible in multilayer representations that allow the existence of the mesostructure.
In addition, multilayer systems can include nodes that are located in different layers. The connection or edges between nodes in different layers is called “coupling” (). An edge belongs to the coupling matrix if it links two nodes () that are present in two layers (α and β) (i.e., if). The nodes belonging to the coupling matrix are known as supra-nodes, and the graph formed by the supra-nodes and the coupling matrix is denoted by.
The supra-graph is the linked representation of the intra-layer and coupling graphs in a multiplex system. In multilayer systems with nodes in different layers, the connectivity matrix () is represented by .
2.2. Supra-Adjacency Matrix
A supra-adjacency matrix) is defined as the adjacency matrix used to synthetically represent a multilayer graph (). Using the supra-adjacency matrix to represent multilayer systems allows us to use the tools and methods developed for monoplex systems.
The supra-adjacency matrix is obtained from the adjacency matrices corresponding to each layer and the connectivity matrix (
) between the different layers of the graph according to the following expression (3):
where
is the intra-layer adjacency matrix and
is the inter-layer adjacency matrix corresponding to the connectivity matrix
.
Figure 1 presents an example of a system with two layers; the physical layer contains two OT nodes (1, 2) and the cyber layer comprises three IT nodes (3, 4, and 5). The intra-layer adjacency matrices, corresponding to each layer as well as the intra-layer matrix, are defined by the matrices
(4),
(5), and
(6). Similarly, the connectivity matrix between the layers is expressed by
(7), and it is obtained from the inter-layer adjacency matrices
(8), where
. Finally, the supra-adjacency matrix corresponding to the multilayer system in
Figure 1 is represented by
(9).
2.3. Supra-Laplacian Matrix
The Laplacian matrix corresponding to an adjacency matrix is defined as follows (10):
where
is the array containing the degree index for each layer in the system.
In the case of multilayer systems, the Laplacian matrix is expressed as follows (11):
where
, is a diagonal matrix that collects the degree index associated with the supra-adjacency matrix
.
From the Laplacian matrix in the multilayer system (
), it is possible to obtain the Laplacian matrices for each graph (
) in the system, as well as the mesostructure represented by the connectivity matrix (
) using the following Equations (12) and (13):
where
.
From (13), we can define the supra-Laplacian matrix corresponding to a multilayer system (
) using the following Equation (14):
2.4. Multilayer Indexes for Vulnerability Assessment
Determining the most important nodes within a complex system, such as a multilayer network, is one of the main challenges in complexity sciences. Within the literature, several indices, known as centrality indexes, have been used to rank node vulnerability in the complete system. The main indexes used in multilayer systems are discussed in the following sections.
2.4.1. Topology-Based Indexes
Indexes related to the adjacency matrix (3) can be used to assess a network’s vulnerability. This group includes the following indices: node degree, closeness, and betweenness.
- −
The node degree index refers to the degree of centrality in a node, which measures the node’s level of connectivity with the remaining nodes in the system (in either single- or multilayer systems). Therefore, a node that is connected to many nodes will have a greater influence on the remaining nodes compared to those that have a smaller number of connections.
The degree of centrality of a node,
), in the family of graphs belonging to the complex multilayer system
, is calculated from the vector
(15):
where
is the degree of centrality of node
in layer
, calculated according to
. It should be noted that (15) is not sufficient to evaluate the vulnerability of a node within a multilayer system (i.e., in
. Therefore, the overlapping degree (hereafter node degree) is used. This is obtained by adding the information collected using the vector (15) for a node
in the following expression (16).
- −
The closeness index quantifies a node’s vulnerability according to the shortest distance (
) between the node and all remaining nodes. In general, the closeness of a node (
) is calculated using the following Formula (17):
- −
The betweenness index quantifies a node’s relevance by measuring the number of shortest paths from one node to the remaining nodes via the minimum number of links. If the betweenness value is high, this implies that the node is critical since the loss of that node reduces the network’s robustness. The betweenness index of a node (
) can be calculated using the following Equation (18):
where
represents the shortest path between the nodes
and
, and
is the number of paths containing or passing through the node
.
2.4.2. Indexes Related to Laplacian Matrix
The centrality of a node
),
, can be expressed by (19) from the spectral characteristics of the Laplacian matrix:
where
is a constant of proportionality and
represents the centrality of the node
as a function of its connection with adjacent nodes (i.e., the adjacency matrix). Expressing (19) in matrix format, the graph
is obtained using the following Equation (20):
The eigenvector index is obtained from the norm of the eigenvector associated with the largest eigenvalue of [
27].
According to the Perron–Frobenius theory, the eigenvalues () and eigenvectors () of the Laplacian matrix allow us to obtain the algebraic connectivity and the Fiedler vector represented by the second smallest eigenvalue and its associated eigenvector respectively. These indexes determine the subgraphs into which a network can be divided. Algebraic connectivity identifies the most vulnerable connections, as well as those connections that can lead to a network blackout if a sequence of cascade events is initiated.
3. Cyber-Physical Smart Grid Model
A smart grid is a complex CPS composed of an electrical network and a communications network. Both infrastructures are connected via the devices that link the physical equipment in the OT layer with the ICT devices in the IT layer [
28]. Consequently, it is necessary to model each infrastructure (electricity and communication) and the connection between them.
3.1. Model of the OT Layer Corresponding to the Power Network
Electrical networks are usually represented by the adjacency matrix. Using complex network theory, the electrical network is represented by a graph:
where,
is the set of electrical
nodes, and
includes the
connections between them. The electrical network adjacency matrix is expressed as follows (21):
where
if there is an electrical connection between nodes,
and
if the nodes are not connected.
Traditional vulnerability analyses [
21,
23,
24] consider only the electrical nodes in the
network and the connections between them.
It is important to note that smart grids are formed of both electrical and communications infrastructures. Measurement and control equipment are installed in the electrical network, and these are linked to ICT devices (e.g., routers). In a smart grid, the consequences of cyberattacks range from altered measurements and control signals to the disconnection of power network elements, such as generators, lines, and loads. Therefore, a model of an electrical network layer must include not only electrical network elements (generators, loads, lines, and substations) but also measurement and control equipment (merging units, controllers and IEDs), which belong to the OT layer and the OT-IT bridge.
Hence, an electrical model of a smart grid must include the set of electrical nodes in the power network () and the set of measurement, protection and control devices corresponding to the OT-IT bridge (). The extended electrical network () graph consists of.
Figure 2a shows an example of a three-bus smart grid, in which three generators (bus1, bus2 and bus3) and one load (bus3) are connected. The traditional electrical graph representing the network shown in
Figure 2a is composed of three electrical nodes (set
with
. However, this smart grid also consists of three controllers, responsible for managing the generators, and a merging unit (MU) in the load that performs measurement tasks. The controllers and MU create set
with
. Since the controllers and MUs are devices installed in the electrical infrastructure, they must be incorporated into the extended power grid graph. In this case, the three-bus OT network in
Figure 2a is represented by an extended graph (
) comprising seven nodes (
) that correspond with the three electrical nodes, the three generator controllers and one load’s MU, as shown in
Figure 2b.
The adjacency matrix of the graph corresponding to
Figure 2a (set
) is given by
(22) and has 3 × 3 (
×
dimensions. Incorporating OT-IT bridge elements into an extended model adds four nodes to the system (numbered from 4 to 7 in
Figure 2b), which belong to set
. Matrix
(23) represents the connection between the electrical nodes in the traditional network and the OT-IT bridge elements. The dimension of the array is therefore
3 × 4.
The adjacency matrix corresponding to the extended model
(25) (
Figure 2b) is obtained from the new set of nodes
. Matrix
has dimension 7 × 7 and is composed of the following subarrays:
(22) is the adjacency matrix corresponding to the traditional electrical network (nodes 1 to 3).
(23) is the adjacency matrix representing the connection between the OT elements and OT-IT bridge (nodes 4 to 7), and their transpose ().
(24) is the connection matrix among bridge elements in the OT network.
3.2. Model of the IT Layer Corresponding to the Communications Network
In a smart grid, the communication network is represented by a graph (), which is composed of nodes and edges. The set of nodes (comprising nodes) is formed from the set of routers that belong to the communications infrastructure, and the connections between routers form the set of edges .
Figure 3 shows the communications graph corresponding to the ICT infrastructure of the smart grid displayed in
Figure 2. In this case, set
is composed of three nodes (
) corresponding to the three routers (labelled from 8 to 10). The three routers collect information provided by the IEDs, MUs, and controllers installed in the electrical infrastructure.
The communications graph adjacency matrix
(26), has 3 × 3 dimensions and expresses the relationship between the elements of set
, which comprises nodes 8 to 10.
3.3. Interconnection Model between Physical Layer (OT) and Cyber Layer (IT)
As a CPS, a smart grid can be represented by a multilayer graph composed of two layers: the physical layer (OT) and the cyber layer (IT). The layers are connected by measurement and control devices installed in the OT layer, which transmit and receive information to and from the IT layer. These devices constitute the OT-IT bridge model in the coupling matrix, according to multilayer complex network theory.
In the CPS, the coupling matrix (
) comprises the set of elements (
) in the OT layer, and their connections to the elements in the IT layer (
(27). As in the adjacency matrix, the coupling matrix element
if a connection exists between nodes i and j and
if there is no connection.
3.4. Cyber-Physical Smart Grid Model
A smart grid can be modelled holistically using the graph, which contains the set of nodes) belonging to the extended electrical graph () and the set of communications graph nodes (, that is s. Set comprises the connections between all the nodes in the CPS.
The supra-adjacency matrix (
) represents the complete CPS, which comprises the extended physical layer (
), the cyber layer (
) and the interconnection between layers defined by the coupling matrix
), as observed in the following Equation (28):
Figure 4 gives the cyber-physical structure corresponding to the three-bus network illustrated in
Figure 2a. In this case, set
is composed of ten nodes, seven corresponding to the OT layer (
and three corresponding to the IT layer
. The supra-adjacency matrix has 10 × 10 dimensions, where the
,
and
(27) matrices correspond with the adjacency matrices of the extended physical layer, the cyber layer, and the connection between them, respectively.
Complex theory based on multilayer networks is especially suitable for analysing vulnerabilities in cyber-physical systems (composed by two heterogeneous interconnected networks) due to the fact that the methodology is very fast, and it is scalable to model heterogeneous smart grids (ITC network, power network and interdependencies between both networks). However, if the power network and ICT network have a great number of nodes and the connectivity between both networks is high, the supra-adjacency matrix employed to represent the interconnected cyber-physical system could achieve large dimensions leading to computational burden problems for analysing the smart grid vulnerability. In those situations, other techniques such as hierarchical modelling [
8,
11,
29] can be used to reduce the complexity of the network by means of clustering algorithms which allows the mathematical dimensionality reduction.
4. Vulnerability Assessment: A Case Study
Using multilayer network theory, the cyber-physical model has been applied to the IEEE 14-bus test case network [
30], which includes the communications infrastructure (
Figure 5). The multilayer cyber-physical model consists of the electrical network layer (the grey layer in
Figure 5), the communications network layer (the green layer in
Figure 5) and the OT-IT interconnections between the two layers (dashed lines in
Figure 5).
The IEEE 14-bus test case consists of 14 nodes, 18 lines, four generators, three transformers with regulation capacity, and 11 loads. In the cyber-physical model, each generator, transformer, or controllable load has two types of devices: a monitoring device (merging units [MUs], represented as squares in
Figure 5) and a control device (controllers [C], represented as triangles in
Figure 5). Non-controllable loads only have a monitoring device (MU). This case study considers the loads at nodes 11 and 14 to be fully controllable (i.e., they can receive demand response signals from the network operator).
According to the proposed multilayer network methodology (
Section 3.1), the OT set
is composed of 14 buses in the IEEE 14-bus test case, while the OT-IT bridge has 29 elements corresponding to monitoring and control devices located in the OT network (MUs, IEDs and controllers), which are linked to the IT layer
. Finally, the extended electricity network is represented by set
, which is composed of 43 elements.
The communications network in the IEEE 14-bus test case is modelled using five routers, which centralize the information collected from the monitoring and control equipment located in the OT layer. In this case, the five routers form a ring, as shown in
Figure 5, with a total of five nodes that form the whole
.
In this paper, we consider the IEEE 14-bus test case as a CPS consisting of several interconnected layers. The electricity network is the physical layer (OT) and the communication network is the cyber layer (IT). Both layers are connected by elements in the OT-IT bridge.
Table 2 demonstrates the relationships throughout the smart grid (electrical infrastructure, communication infrastructure and the OT-IT bridge).
In the modified IEEE 14-bus test case, supra-adjacency and Laplacian matrices have been obtained using the methodology explained in
Section 2.2 and
Section 2.3. The connections between elements are given in
Figure 5 and
Table 2.
It has to be noted that the proposed approach is effective for all attack model studies, as long as the ICT communication attacked components are included in the cyber layer and/or in the interconnection layer (cyber-power). Vulnerability assessment based on complex network can deal with random failure, natural hazard, or intentional attacks. Therefore, it is not necessary to take into consideration the attack model for evaluating the vulnerability of the interconnected cyber-physical system.
4.1. Cyber Physiscal System Vulnerability Analysis
The vulnerability of the cyber-physical IEEE 14-bus test case is determined using the centrality indexes defined in
Section 2.4. In this section, considered events could be cyberattacks or failures in the measurement, control and communications devices in the CPS system. The CPS is composed of 48 elements: 14 physical electrical nodes, 29 OT-IT bridge nodes (MUs, controllers and IEDs), and the five routers in the cyber layer.
Figure 6,
Figure 7,
Figure 8 and
Figure 9 show the vulnerability levels of each of the 48 elements in the CPS, which are determined using the following multilayer centrality indices: node degree, closeness, between-ness, and eigenvector. Elements of the OT layer are coloured in green, elements of the OT-IT bridge are highlighted in orange, and elements of the IT network are shaded in grey.
Analysis of the multilayer centrality indexes reveals that the most vulnerable nodes in the CPS correspond to cyber nodes (i.e., routers). Moreover, several hubs are detected in the OT layer, and it can also be noted that OT-IT bridge elements are not as critical as the OT and IT elements.
Table 3 ranks the 10 most vulnerable nodes in the CPS according to each of the centrality indexes. Nodes corresponding to the OT layer are highlighted in grey, and those representing the IT layer are coloured in green. First, it is observed that the most vulnerable elements in the CPS correspond to routers located at nodes 46 and 47 (cyber layer) and nodes 4 and 6 (physical layer).
Table 3 demonstrates that routers at nodes 46 and 47 centralize information from the IEDS, MUs and controllers located at nodes 4, 7, 8, and 9, as well as information from nodes 5, 6, 10, and 11. Hence, an attack on routers placed on nodes 46 and 47 results in a loss of information from 17 OT-IT bridge elements, such as IEDs, MUs and controllers, installed at eight electrical nodes. This analysis highlights the importance of considering smart grid networks as CPSs and not independent systems as previously discussed [
3,
21].
These results demonstrate that vulnerability assessments must consider the smart grid as a unique cyber-physical system rather than two independent networks. The smart-grid CPS modelled in this paper includes elements of the electrical and communications networks and considers the relationships between them.
Traditional vulnerability methods have identified vulnerabilities in electrical networks [
12,
13,
14,
15,
16,
17,
18,
19,
23,
24] rather than consider the network as a CPS, as demonstrated in this paper. When applying traditional methods [
12,
13,
14,
15,
16,
17,
18,
19,
23,
24] to the IEEE 14-bus test case, node 4 (electrical network) was found to be the most vulnerable. However, we have demonstrated that disruption to router 46 affects the information collected from electrical nodes 4, 7, 8, and 9. Therefore, a cyberattack on router 46 also represents a vulnerability in the OT network, which has not been detected by the methods described in [
12,
13,
14,
15,
16,
17,
18,
19,
23,
24].
4.2. Comparative Vulnerability Analysis
This section determines the most vulnerable nodes in the IEEE 14-bus test case using three different methods: (i) traditional OT model [
12,
13,
14,
15,
16,
17,
18,
19,
23,
24], (ii) IT network model, and (iii) the cyber physical system model that we propose in this paper.
Table 4 gives the most vulnerable nodes evaluated using two centrality indices: node degree index and betweenness index. The following conclusions are presented:
Traditional OT network model [
12,
13,
14,
15,
16,
17,
18,
19,
23,
24]: in this case, the vulnerability analysis only covers the electrical network (nodes 1–14), the most vulnerable node is node 4, which corresponds with a substation.
Traditional IT network model [
21]: when performing the vulnerability assessment [
21] on the communication network (nodes 44–48), all the nodes present the same vulnerability level, indicating that there are no critical routers that could affect the vulnerability of the IT network.
Holistic model of the cyber-physical network: if the smart grid is considered as a CPS (nodes 1–48), it is observed that the most vulnerable nodes correspond to routers located at nodes 46 and 47. An attack that places nodes 46 and 47 out of service results in the loss of information and communication with OT nodes 4, 7, 8, and 9 and 5, 6, 10, and 11, respectively.
Table 4 demonstrates that according to the node degree index in the CPS model, nodes 46 and 47 are two and five times more vulnerable compared to node 4 (in the traditional OT model) and the IT nodes, respectively. Moreover, the CPS model’s betweenness index determines that the router at node 47 has 303 critical links compared to 25 critical connections for node 4 and 1 connection for the IT nodes. Considering the betweenness index, it can be deduced that the loss of node 47 affects more than twelve times the critical connections of node 4. These results indicate that the cyber-physical network model as a whole, proposed in this paper, is the only model that allows us to identify the most vulnerable nodes in the smart grid as a single entity. Moreover, it enables us to determine the scope of a cyberattack upon routers 46 and 47 (IT) and the resulting implications for the OT layer.
Finally, the four indexes presented in
Figure 6,
Figure 7,
Figure 8 and
Figure 9 identify critical hubs in the OT network (nodes 4 and 6) and the IT network (nodes 46 and 47).
5. Conclusions
Vulnerability analysis in power networks has traditionally considered only the electrical infrastructure (OT). However, this representation is no longer valid in the field of smart grids, since the OT and IT heterogeneous networks are interconnected via measurement, control, protection, and communication devices.
In this article, we have proposed a new methodology to identify the most vulnerable elements of smart grids as cyber-physical systems. The smart grid has been modelled holistically using multilayer complex network theory and scale-free graphs, in which the power network (OT) is interconnected with the communication network (IT). The connection between both networks, via measurement, communication, and control devices, has also been considered. The proposed methodology is able to identify the most vulnerable elements in a smart grid CPS, which have been overlooked by traditional vulnerability methods.
Since the proposed CPS model is based on multilayer network theory and scale-free graphs, it is possible to conduct a vulnerability analysis that considers the set of elements that may experience a cyberattack, which could subsequently affect the functioning of smart grids (i.e., the communication and/or electrical infrastructure).
From the results obtained in the vulnerability analysis of traditional OT and IT networks, as well as the smart grid as a CPS, the following observations are presented:
- −
Traditional vulnerability assessments which focus on electrical networks do not detect those IT elements in a smart grid that anticipate a greater loss of robustness as a result of disconnection following a cyberattack.
- −
Multilayer centrality indices allow the detection of vulnerabilities in the smart grid as a single CPS. According to the degree index, the vulnerability of the critical node in the CPS is twice as high as the vulnerability detected using traditional methods. Regarding the betweenness index, the vulnerability of the router located at node 46 is twelve times higher than the vulnerability of the primary substation located at node 4.
- −
Moreover, it has been demonstrated that the multilayer centrality indices are the only indices that measure vulnerability in different heterogeneous and interconnected layers. It has been proved that routers placed at nodes 46 and 47 reveal a vulnerability in the CPS that is five times greater than the vulnerability detected in only the IT networks.
- −
Finally, it should be noted that holistic analysis of the smart grid reveals the existence of critical hubs in both the OT network (nodes 4) and the IT network (nodes 46 and 47).
Given these results, it can be concluded that vulnerability analysis should consider the smart grid as a cyber-physical system rather than two independent (electrical and communication) infrastructures.