US 12,425,450 B2
Method for securing digital substations and system thereof
Devika Jay, Kerala (IN); Himanshu Goyel, Navi Mumbai (IN); Amulya Sreejith, Kerala (IN); and Rajesh Rathi, Karnataka (IN)
Assigned to GRIDSENTRY PRIVATE LIMITED, Karnataka (IN)
Filed by GRIDSENTRY PRIVATE LIMITED, Karnataka (IN)
Filed on Feb. 22, 2024, as Appl. No. 18/584,436.
Claims priority of application No. 202341012168 (IN), filed on Feb. 22, 2023.
Prior Publication US 2024/0323228 A1, Sep. 26, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1491 (2013.01) [H04L 63/1416 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method for securing digital substation, the method comprising:
configuring a switching node to connect a decoy network and a substation communication network, wherein the decoy network is a mirror of the substation communication network and is deployed to entertain one or more malicious attack requests received through an alien device;
creating a plurality of bogus medium access control (MAC) IDs, resembling similar to a plurality of critical media access control (MAC) IDs exchanged between a plurality of intelligent electronic devices (IEDs) present in the substation communication network;
providing the plurality of bogus MAC IDs to the decoy network for communicating with the alien device, wherein the plurality of bogus MAC IDs is altered periodically to provide illusion of dynamic nature of the substation communication network to the alien device;
detecting, by the switching node, the one or more malicious attack requests received from the alien device; and
in response to detection of the one or more malicious attack requests:
switching the substation network to the decoy network for displaying a set of bogus MAC IDs to the alien device depending on type of the one or more malicious attack requests; and
determining one or more attack features based on activity performed by the alien device in response to the set of bogus MAC IDs.