ABSTRACT
Petroleum Cyber-Physical System (CPS) marks the beginning of a new chapter of the oil and gas industry. Combining vast computational power with intelligent Computer Aided Design (CAD) algorithms, petroleum CPS is capable of precisely modeling the flow of fluids over the entire petroleum reservoir and leveraging the massive field data remotely collected at the production wells. It provides field operators with valuable insights into the geological structure and remaining reserves of the reservoir for optimizing their operational strategies. Despite such benefits, petroleum CPS is vulnerable to various cyberattacks that jeopardize the integrity of the field data collected at production wells. Given manipulated field data, CAD software would generate an inaccurate reservoir model which misleads the field operators. This work is the first to analyze potential cybersecurity attacks in a petroleum CPS. In this paper, an intelligent cyberattack strategy optimization framework is proposed to optimize the malicious manipulation of field data such that the history matching solver generates the most inaccurate reservoir model. Our method is based on the advanced Model Reference Adaptive Search (MRAS) technique, and it can be used to evaluate the worst case impact due to the field data manipulation attacks. Experimental results on a standard petroleum CPS testcase demonstrate that the proposed method can reduce the production quality, measured by the weighted mismatch sum of the bottom hole pressure (BHP), the gas oil ratio (GOR), and the Water Cut (WCT), by up to 99.1% when comparing to a random attack.
- [1]., “Design automation for interwell connectivity estimation in petroleum cyber-physical systems”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2016, doi: 10.1109/TCAD.2016.2584065.Google Scholar
- [2]., “Improved reservoir characterization through evolutionary computation”, in SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2000.Google Scholar
- [3]., “Ant colony optimization for history matching and uncertainty quantification of reservoir models”, Journal of Petroleum Scienceand Engineering, vol. 77, no. 1, pp. 78–92, 2011.Google Scholar
Cross Ref
- [4]., “Leveraging strategic detection techniques for smart home pricing cyberattacks”, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 220–235, March 2016.Google Scholar
Digital Library
- [5]., “A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home”, IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 4, pp. 502–513, Dec 2015.Google Scholar
Digital Library
- [6]., “Mathematical structure of the black-oil model for petroleum reservoir simulation”, SIAM Journal on Applied Mathematics, vol. 49, no. 3, pp. 749–783, 1989. [Online]. Available: http://dx.doi.org/10.1137/0149044Google Scholar
Digital Library
- [7]., “Towards multiobjective history matching: faster convergence and uncertainty quantification”, in SPE Reservoir Simulation Symposium. Society of Petroleum Engineers, 2011.Google Scholar
- [8]., “History matching of the punq-s3 reservoir model using the ensemble kalman filter”, in SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2004.Google Scholar
- [9]., “A model reference adaptive search method for global optimization”, Operations Research, vol. 55, no. 3, pp. 549–568, 2007.Google Scholar
Digital Library
- [10]., “An mras-based sensorless highperformance induction motor drive with a predictive adaptive model”, IEEE Transactions on Industrial Electronics, vol. 52, no. 2, pp. 532–551, 2005.Google Scholar
Cross Ref
- [11]., “Towards multiobjective history matching: Faster convergence and uncertainty quantification”, in SPE Reservoir Simulation Symposium, 2011, pp. 1–15.Google Scholar
- [12].ECLIPSE, https://www.software.slb.com/products/eclipse/simulators.Google Scholar
Index Terms
(auto-classified)Analysis of production data manipulation attacks in Petroleum Cyber-Physical Systems
Recommendations
Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges
Highlights- In general, the cyber-attacks in the literature can be classified into three main types: denial of service (DoS) attacks, deception attacks, and replay ...
AbstractCyber Physical Systems (CPS) are almost everywhere; they can be accessed and controlled remotely. These features make them more vulnerable to cyber attacks. Since these systems provide critical services, having them under attack would ...
Security analysis for cyber-physical systems against stealthy cyber attacks
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific ...
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach
The security of critical infrastructures such as oil and gas cyber-physical systems is a significant concern in today's world where malicious activities are frequent like never before. On one side we have cyber criminals who compromise cyber ...





Comments