10.1145/2966986.2980091guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Analysis of production data manipulation attacks in Petroleum Cyber-Physical Systems

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

Petroleum Cyber-Physical System (CPS) marks the beginning of a new chapter of the oil and gas industry. Combining vast computational power with intelligent Computer Aided Design (CAD) algorithms, petroleum CPS is capable of precisely modeling the flow of fluids over the entire petroleum reservoir and leveraging the massive field data remotely collected at the production wells. It provides field operators with valuable insights into the geological structure and remaining reserves of the reservoir for optimizing their operational strategies. Despite such benefits, petroleum CPS is vulnerable to various cyberattacks that jeopardize the integrity of the field data collected at production wells. Given manipulated field data, CAD software would generate an inaccurate reservoir model which misleads the field operators. This work is the first to analyze potential cybersecurity attacks in a petroleum CPS. In this paper, an intelligent cyberattack strategy optimization framework is proposed to optimize the malicious manipulation of field data such that the history matching solver generates the most inaccurate reservoir model. Our method is based on the advanced Model Reference Adaptive Search (MRAS) technique, and it can be used to evaluate the worst case impact due to the field data manipulation attacks. Experimental results on a standard petroleum CPS testcase demonstrate that the proposed method can reduce the production quality, measured by the weighted mismatch sum of the bottom hole pressure (BHP), the gas oil ratio (GOR), and the Water Cut (WCT), by up to 99.1% when comparing to a random attack.

References

  1. [1].Chen X., Zhang D., Wang L., Jia N., Kang Z., Zhang Y., and Hu S., “Design automation for interwell connectivity estimation in petroleum cyber-physical systems”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2016, doi: 10.1109/TCAD.2016.2584065.Google ScholarGoogle Scholar
  2. [2].Romero C., Carter J., Zimmerman R., Gringarten A. et al., “Improved reservoir characterization through evolutionary computation”, in SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2000.Google ScholarGoogle Scholar
  3. [3].Hajizadeh Y., Christie M., and Demyanov V., “Ant colony optimization for history matching and uncertainty quantification of reservoir models”, Journal of Petroleum Scienceand Engineering, vol. 77, no. 1, pp. 7892, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4].Liu Y., Hu S., and Ho T. Y., “Leveraging strategic detection techniques for smart home pricing cyberattacks”, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 220235, March 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5].Zhou Y., Chen X., Zomaya A. Y., Wang L., and Hu S., “A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home”, IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 4, pp. 502513, Dec 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6].Trangenstein J. A. and Bell J. B., “Mathematical structure of the black-oil model for petroleum reservoir simulation”, SIAM Journal on Applied Mathematics, vol. 49, no. 3, pp. 749783, 1989. [Online]. Available: http://dx.doi.org/10.1137/0149044Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7].Hajizadeh Y., Christie M. A., Demyanov V., “Towards multiobjective history matching: faster convergence and uncertainty quantification”, in SPE Reservoir Simulation Symposium. Society of Petroleum Engineers, 2011.Google ScholarGoogle Scholar
  8. [8].Gu Y., Oliver D. S. et al., “History matching of the punq-s3 reservoir model using the ensemble kalman filter”, in SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2004.Google ScholarGoogle Scholar
  9. [9].Hu J., Fu M. C., and Marcus S. I., “A model reference adaptive search method for global optimization”, Operations Research, vol. 55, no. 3, pp. 549568, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10].Cirrincione M. and Pucci M., “An mras-based sensorless highperformance induction motor drive with a predictive adaptive model”, IEEE Transactions on Industrial Electronics, vol. 52, no. 2, pp. 532551, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11].Hajizadeh Y., Christie M., Demayanov V., and Watt H., “Towards multiobjective history matching: Faster convergence and uncertainty quantification”, in SPE Reservoir Simulation Symposium, 2011, pp. 115.Google ScholarGoogle Scholar
  12. [12].ECLIPSE, https://www.software.slb.com/products/eclipse/simulators.Google ScholarGoogle Scholar

Index Terms

(auto-classified)
  1. Analysis of production data manipulation attacks in Petroleum Cyber-Physical Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image Guide Proceedings
          2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
          Nov 2016
          946 pages

          Copyright © 2016

          Publisher

          IEEE Press

          Publication History

          • Published: 7 November 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Qualifiers

          • research-article
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!