Distributed Software-Defined Network Architecture for Smart Grid Resilience to Denial-of-Service Attacks
Abstract
An important challenge for smart grid security is designing a secure and robust smart grid communications architecture to protect against cyber-threats, such as Denial-of-Service (DoS) attacks, that can adversely impact the operation of the power grid. Researchers have proposed using Software Defined Network frameworks to enhance cybersecurity of the smart grid, but there is a lack of benchmarking and comparative analyses among the many techniques. In this work, a distributed three-controller software-defined networking (D3-SDN) architecture, benchmarking and comparative analysis with other techniques is presented. The selected distributed flat SDN architecture divides the network horizontally into multiple areas or clusters, where each cluster is handled by a single Open Network Operating System (ONOS) controller. A case study using the IEEE 118-bus system is provided to compare the performance of the presented ONOS-managed D3-SDN, against the POX controller. In addition, the proposed architecture outperforms a single SDN controller framework by a tenfold increase in throughput; a reduction in latency of ; and an increase in throughput of approximately during the DoS attack scenarios.
Index Terms:
software-defined networking, cyber security, network security, cyber-physical systems, power systemsI Introduction
Cyber-related smart grid (SG) system security has been a growing concern over the last decade. The current focus of research for power grid cybersecurity is operation technology (OT) and information technology (IT) systems reliability, whereas the development of an interdependent SDN management framework for SGs communications is still emerging. Traditional power systems are often protected by isolated and uncoordinated equipment that provides ad hoc solutions to each protection challenge. Other solutions are based in ongoing research for power system state estimation [1]. Although these techniques can be effective, these technologies are not integrated to communicate online with one another, and thus they are vulnerable to distributed cyber-attacks, denial-of-service (DoS), distributed denial-of-service (DDoS), man-in-the-middle (MITM), and false data injection (FDI) [2]. These types of attacks can influence data from several layers of the grid’s physical structure and ultimately disrupt system service. A unified methodology to recognize multiple attacks conducted from various layers inside the SG is still to be realized.
In our previous studies [2, 3, 4], we have explored the use of cross-layered data from both the communication and power grid layer for a Cross-Layer Ensemble CorrDet with Adaptive Statistics (CECD-AS) model to identify and characterize various cyber attacks. We have also introduced software defined networks (SDNs) as a possible underlying architecture to facilitate SG cybersecurity [3, 5].
This work is a continuation of our previous study [3], and provides a statistical analysis of a distributed flat topology for the SDN. We further present a comparison with the common alternative controller, the POX controller [6, 7, 8]. Several studies such as [9, 10, 11] have suggested a distributed SDN architecture for smart grids, but none provide a comparison of performance between distributed SDN framework and the single controller approach used in the POX controller-based literature. This work seeks to provide such a comparative analysis, and makes the following specific contributions towards the state-of-the-art:
-
1.
A benchmark study that compares and analyzes distributed versus centralized SDN management layer solutions for Smart Grids.
-
2.
A benchmark study for Smart Grid SDN frameworks to evaluate throughput resiliency of distributed vs centralized SDN frameworks against DoS attacks.
The remainder of the paper is organized as follows. Section II presents background information on the SDN framework and the network statistics used, while Section III contains data flow information of the framework, and provides the implementation aspects. A case study is presented in Section IV, followed by concluding remarks in Section V.
II Background
II-A Software-Defined Networking (SDN)
The concept of SDN has become more prevalent for use in network management in recent years, developed by Stanford University to describe Openflow principles and practices [12]. SDN appeals to networking professionals due to its visibility and network device programmability. SDN improves resource efficiency, network service flexibility, and maintenance costs [13]. One of most popular open-source SDN controller for next-generation SDN and network function virtualization (NFV) is the ONOS controller. The ONOS controller configures and controls networks in real-time without routing and switching control protocols. An SDN network design can move the network’s routing intelligence to the ONOS controller, improving network administration, response, and visibility to cyber threats.
Figure 1 depicts a high-level overview of a modern functioning SDN infrastructure. SDN is divided into three planes:
-
1.
Application Plane: It includes network administration, policy implementation, and SDN applications for security services.
-
2.
Control Plane: The network operating system and SDN applications are run by this logically centralized control framework. SDN flows are instructions followed by a packet sequence between the source and destination. Controllers install flows in forwarding device flow tables.
-
3.
Data/Infrastructure Plane: This layer represents the physical network equipment in the network, a collection of forwarding components that shift traffic flows in response to control plane commands. The infrastructure layer is represented by routers, switches, and access points in the network.
The SDN architecture planes communicate via application programming interfaces (APIs) to achieve interaction with network control interfaces. The application plane is the topmost layer, affording the network operator use of functional applications to enact policies for energy efficiency, access control, mobility management, and security management. Northbound APIs like FML, Procera, Frenetic, and RESTful connect the application and control layers. These APIs let the network operator communicate with the control layer, so the controller can make infrastructure layer changes. Southbound APIs, e.g., OpenFlow, ForCES, PCEP, NetConf, and IRS link the controller to the data plane, and Westbound and Eastbound APIs, like AlTO or Hyperflow, connect multiple controllers.

As shown in Figure 1, controller choice is crucial for SDN network operation and performance. There are several controllers utilized in SDN literature research, including Python-based OpenFlow controller (POX), Floodlight, OpenDaylight (ODL), RYU, and ONOS, each with its own specialized features and functions. POX, which was based on NOX, the first OpenFlow controller, is a well-known controller that is ideal for rapid prototyping. However, the POX controller cannot handle multiple, distributed controllers. The east/westbound API connection, necessary to connect multiple controllers, is not possible. On the other hand, due to its simple implementation, it is often the controller of choice for quickly testing SDN frameworks on emulation software like Mininet. The POX controller has been used in several Smart Grid studies.
In this paper, we use an ONOS-based distributed three controller cluster to manage the smart grid SDN network. ONOS was selected because of its demonstrated performance over its competitors in other applications and its continued development and documentation for real-world applications [14]. We use the POX controller as a point of comparison for the distributed framework presented.
To analyze the performance of SDN, Mininet [15], an open-source networking software, is used to prototype and emulate SDN networks with hosts, connections, and switches on a single device. It uses process-based virtualization and network namespaces in recent Linux kernels to create virtual networks. The Mininet hosts emulate bash processes in a network namespace, so web servers and client software can run normally over Open vSwitch and OpenFlow reference switches. Links connect the emulated switches and hosts via Linux kernel virtual ethernet pairs.
II-B Network Performance Statistics
The framework for cross-layered analysis is based on the IEEE 118-bus system, which mimics the Modbus RTU using TCP/IP protocols. The communication layer, which resembles the Poisson traffic model [16], transmits packets every four seconds in groups of four. Each bus represents the M/M/c queue [17], i.e. c = 1, with Poisson packet arrival and exponential queue service time.
The rate of packet arrival is denoted by , while the service rate of packets is represented by . Inter-arrival time (IAT) is the difference in time () between the arrivals of two or more packets. With parameter , the distribution is exponential. For t 0, the probability density function is defined as follows:
(1) |
The average IAT is defined as
(2) |
The service time follows an exponential distribution with service rate . The probability density function is defined as follows:
(3) |
where is the average service time of the system. Utilizing Little’s theorem, the total waiting time is represented as transmission delays (TD) as follows:
(4) |
Propagation delay (PD) is the time required for a packet to traverse a wire, or link and is defined as follows:
(5) |
where equals distance in kilometers and is the wave propagation speed in kilometers per second. The total latency (), the sum of all delays a packet faces during transmission, is denoted in this study as follows:
(6) |
where is the transmission delay, is the service time delay and is the propagation delay. The throughput () is defined as the maximum number of bits per second that can be experienced through the communication link or wire. is defined as follows:
(7) |
whereas is the receive window, or receiver’s buffer for incoming data that has not be processed yet, and (round trip time) is the time it takes a packet to travel from a source to a destination and for the acknowledgement to return back.
III Distributed SDN Implementation
Figure 2 illustrates the distributed SDN architecture to manage the framework and which incorporates the aforementioned characteristics. The selected distributed flat SDN architecture divides the network horizontally into multiple areas or clusters, and each cluster is handled by a single controller. The SDN controllers in this architecture are interconnected and each controller has a global view of the network. ONOS can deploy distributed SDN controllers that utilize the flat architecture to achieve a logically distributed software-defined network [18].
To emulate and implement the D-SDN, first the Atomix and ONOS clusters are built using Docker containers in a local virtual machine (VM) with 6GB of RAM and 5 logical cores of AMD Ryzen 7 1800x installed on a local personal device using ONOS version 2.3, Openflow version 1.3, and Atomix version 3.1.5. Then, 118 hosts and 45 Open vSwitches using OpenFlow 1.3 were constructed using a Python script and Mininet 2.3 APIs. Open vSwitch is an open-source distributed virtual multi-layer switch solution and one of the most widely used OpenFlow implementations.
The smart grid’s communication layer is a three-controller SDN framework. Several approaches could be used, such as a hierarchical model or vertical architecture. In this approach, a root controller manages the local controllers, and each local controller manages a network domain or cluster. The root controller coordinates local controllers. To perform inter-domain functions, each local controller queries the root controller for global network state information, which adds latency and still provides a single point of failure [19]. To avoid a single point of failure, a flat, distributed topology is used where the three controllers share the same network authority. We also use ONOS to control packet flow in the smart grid system. Unlike the hierarchical model, that does not connect local controllers, controllers in the flat model have direct connectivity, and every controller has equal access to the network. Therefore, ONOS can quickly redistribute controller load to optimize network performance. Furthermore, ONOS and Atomix can dynamically move workloads from a down controller to the remaining controllers to reduce single points of failure. Atomix is a reactive Java framework for constructing scalable fault-tolerant distributed networks and manages our ONOS controllers as illustrated in Figure 2. It is in charge of ONOS cluster management, service discovery, and data storage. Because of the Atomix framework, ONOS controllers may be rapidly discovered and removed if needed.

The design of a logically distributed framework with low latency and improved resilience of the communication layer of the IEEE-118 bus system for a smart grid is of interest. To incorporate these characteristics into the SDN framework, it was realized a need of a controller that could respond to network demands swiftly, provide global oversight to reroute traffic based on link status, and had a proven performance in both literature and industry. Given these factors, the ONOS controller was chosen.
IV Case Study
A case study was performed to compare the performance of the proposed ONOS managed flat, three-controller, distributed SDN (D3-SDN), against the POX controller approach. The results are presented in Figure 3, Table I, and Figure 4.

First, to evaluate the scalability of D3-SDN we used CBench, a popular controller benchmark tool to test and record throughput performance. These results are shown in Figure 3. For this experiment, the controller configurations ranged from 3 - 192 switches. As shown in Figure 3, the ONOS controllers have a higher initial throughput and maintain a higher throughput as the demand for more switches increases. As the number of switches that must be accounted for by each controller increases, the throughput performance of both controllers decreases. However, ONOS performs more effectively than POX overall.
Next, we compared the latency induced by each approach, based on the analysis in Section II-B. We determined the propagation delay, , for the emulated testbed by estimating the line lengths of the IEEE 118-bus system based on the per-unit to total reactance transformation presented in [20]. From the same reference we obtained each of the 117 line lengths based on area voltage level, after which an average line length was obtained. Then was calculated by dividing the average line length by the recorded link speed of km per second [21] to obtain an average of 203.307s. We add variability by incorporating Gaussian noise to each then assigning the value to each link’s delay in our emulated testbed.
To measure the latency performance of our proposed ONOS D3-SDN approach and the traditional POX approach, we used the Sockperf software to perform a ping pong test. A ping pong test is when computer A sends a packet to computer B (ping) requesting for computer B to send back an echo response (pong). Sockperf operates by the client sending packets to the server, which then returns all or a portion of the packets to the client. It measures roundtrip time, , between the two machines along a specific network path with packets of varying sizes. The latency for a particular one-way link between two computers is the divided by two. As our two nodes, we chose node 1 and node 112, the nodes with that required the most hops to communicate, as the Sockperf server and client, respectively and measured the latency performance on both and packets. Table I displays the results for average latency. The D3-SDN ONOS architecture reduces latency by and latency by over the POX controller approach, demonstrating that ONOS responds to network demands faster than POX.
Network Type | Avg. UDP Latency (s) | Avg. TCP Latency (s) |
---|---|---|
ONOS | 28.727 | 28.846 |
POX | 37.876 | 42.345 |
Finally, to measure the throughput resilience during and after a DoS attack for the D3-SDN ONOS approach versus the traditional POX approach, we conducted a DoS attack on the frameworks using iPerf3 and hping. A server on node 1 and a client on node 2 are emulated using iPerf. To keep the comparison fair between controllers, for each attack simulation for both controllers, the client and server are instructed to have a transfer rate of 18 Gbits/sec for a simulation time of 30 seconds. After 10 seconds, the attacker, node 3, is instructed to ”flood” the client, node 2, with approximately packets as fast as possible, with an IAT of microseconds. After 20 seconds, the DoS attack is stopped, and the simulation continues for 10 additional seconds. This attack scenario is repeated three times for each controller configuration and the results were recorded.
Figure 4 shows the results. For the first 10 seconds, there is a natural initial decrease and variability in network throughput due to the controllers spending the necessary time to learn the network routes. At 10 seconds, the attack begins and both controllers experience throughput decreases as the attacker begins to attack the client. This is also expected behavior. During the DoS attack, however, the POX controller lost 41.11% percent of its throughput, while D3-SDN ONOS lost only 29.77% percent. Therefore, during our DoS attack scenario, ONOS retains an average greater throughput than POX.
After the attack, the POX controller experiences the worst throughput from having been overwhelmed with the increased DoS demand. At its lowest point of the throughput measurements, the throughput drops to Gbits/s, which is a throughput loss of throughput of compared to the virtual lost experienced by D3-SDN ONOS approach at the time of simulation completion. This demonstrates the D3-SDN ONOS approach’s resilience and its capacity to handle increased network demands, albeit fraudulent in the form of a DoS attack in this instance. Furthermore, ONOS is able to recover quickly after these attack instances, which is advantageous when developing robust communication layers for smart grids.

Since POX fails in terms of maintaining throughput and the D3-SDN ONOS approach accommodates the DoS traffic, it is important to be able to determine that an attack has occurred and identify which type. In previous work [2], an algorithm called cross-layer ensemble corrdet is presented for cyber threat detection. Its performance is proven to exceed state-of-the-art physics-based and machine learning-based methodologies. In our previous study [4], the algorithm’s pseudo code and implementation are described. Each row represents a point in time for the relevant measurements, whereas each column represents a grid measurement point. A a 691 x 10,000 matrix of data points is built in Mininet, where one row of data is considered a sample of measurements for the entire grid, and Mininet creates one data point in around 4 seconds, or 45 minutes for each network sample, or row of data. The ML model requires 10,000 rows of data, which poses a time restriction. To address this limitation, SimComponents, a network simulator tool, was used to reduce the amount of time spent obtaining the network data. The SimPy and component toolkit SimComponents are utilized in the communication layer in order to simulate the network traffic one would encounter in the ONOS-managed D-SDN. SimPy is a Python-based discrete-event simulation toolbox. Active components including packets, packet generators, packet sinks, switch ports, and port monitors may be simulated with this tool. The SimComponents toolkit is used to define and replicate various components and their features. SimComponent creates the data required for one data sample in around seconds, which is significantly faster than Mininet, allowing the completion of the necessary dataset to acquire the results for the CECD-AS algorithm technique, as shown in Table II.
The real-time CECD-AS algorithm works exceedingly well for a range of cyber threats mentioned in this research, as seen in Table II. The improved detection is the result of the integration (combined) data from communication and power grid.
Attack type | Accuracy | Precision | Recall | F1-score |
---|---|---|---|---|
MITM | 92.48 00.20 | 91.65 00.29 | 86.41 00.28 | 88.91 00.24 |
FDI | 99.95 00.01 | 99.46 00.34 | 99.87 00.13 | 99.61 00.17 |
DoS | 99.88 00.07 | 99.75 00.09 | 99.80 00.16 | 99.78 00.08 |
FDI-DoS | 99.63 00.08 | 98.42 00.26 | 99.95 00.04 | 99.20 00.15 |
V Conclusion
SDN enables users to manage smart grid communications with greater visibility, control, and reactivity. Deploying a set of ONOS clusters with equal permissions reduces the possibility of a single point of failure that may arise when using a single controller. This study evaluates a distributed three ONOS controller managed SDN architecture for smart grids and compares it with the common alternative POX controller. The ONOS managed architecture significantly outperformed the POX controller framework by reducing latency by and increasing controller throughput ten-fold, resulting in increased scalability and significant throughput resiliency during DoS attacks. These performance results demonstrate that the D3-SDN is the better option over POX implementations regarding cyber security of the smart grid.
References
- [1] A. Bretas, N. Bretas, J. London, and B. Carvalho, Cyber-Physical Power Systems State Estimation. Elsevier, 2021, vol. 1.
- [2] A. Starke, K. Nagaraj, C. Ruben, N. Aljohani, S. Zou, A. Bretas, J. McNair, and A. Zare, “Cross-layered distributed data-driven framework for enhanced smart grid cyber-physical security,” IET Smart Grid, vol. n/a, no. n/a. [Online]. Available: https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/stg2.12070
- [3] D. Agnew, N. Aljohani, R. Mathieu, S. Boamah, K. Nagaraj, J. McNair, and A. Bretas, “Implementation aspects of smart grids cyber-security cross-layered framework for critical infrastructure operation,” Applied Sciences, vol. 12, no. 14, p. 6868, 2022.
- [4] N. Aljohani, D. Agnew, K. Nagaraj, S. A. Boamah, R. Mathieu, A. S. Bretas, J. McNair, and A. Zare, “Cross-layered cyber-physical power system state estimation towards a secure grid operation,” in 2022 IEEE Power & Energy Society General Meeting (PESGM). IEEE, 2022, pp. 1–5.
- [5] A. Starke, J. McNair, R. Trevizan, A. Bretas, J. Peeples, and A. Zare, “Toward resilient smart grid communications using distributed sdn with ml-based anomaly detection,” in International Conference on Wired/Wireless Internet Communication. Springer, 2018, pp. 83–94.
- [6] S. Kaur, J. Singh, and N. S. Ghumman, “Network programmability using pox controller,” in ICCCS International conference on communication, computing & systems, IEEE, vol. 138. sn, 2014, p. 70.
- [7] M. Cokic and I. Seskar, “Software defined network management for dynamic smart grid traffic,” Future Generation Computer Systems, vol. 96, pp. 270–282, 2019.
- [8] H. Mahmood, D. Mahmood, Q. Shaheen, R. Akhtar, and W. Changda, “S-dps: An sdn-based ddos protection system for smart grids,” Security and Communication Networks, vol. 2021, 2021.
- [9] U. Ghosh, P. Chatterjee, and S. Shetty, “A security framework for sdn-enabled smart power grids,” in 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, 2017, pp. 113–118.
- [10] K. N. Qureshi, R. Hussain, and G. Jeon, “A distributed software defined networking model to improve the scalability and quality of services for flexible green energy internet for smart grid systems,” Computers & Electrical Engineering, vol. 84, p. 106634, 2020.
- [11] R. Hussain and M. U. Bashir, “Model to improve scalability and quality of services in software define networking,” in 2019 2nd International Conference on Communication, Computing and Digital systems (C-CODE). IEEE, 2019, pp. 28–33.
- [12] D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-defined networking: A comprehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, 2014.
- [13] S. Sun, X. Fu, B. Luo, and X. Du, “Detecting and mitigating arp attacks in sdn-based cloud environment,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020, pp. 659–664.
- [14] L. Mamushiane and T. Shozi, “A qos-based evaluation of sdn controllers: Onos and opendaylight,” in 2021 IST-Africa Conference (IST-Africa). IEEE, 2021, pp. 1–10.
- [15] “Mininet/mininet: Emulator for rapid prototyping of software defined networks.” [Online]. Available: https://github.com/mininet/mininet#readme
- [16] R. Jain and S. Routhier, “Packet trains–measurements and a new model for computer network traffic,” IEEE journal on selected areas in Communications, vol. 4, no. 6, pp. 986–995, 1986.
- [17] M. Haviv, “Queues–a course in queueing theory,” The Hebrew University, Jerusalem, vol. 91905, 2009.
- [18] F. Bannour, S. Souihi, and A. Mellouk, “Distributed sdn control: Survey, taxonomy, and challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 333–354, 2018.
- [19] Y. E. Oktian, S. Lee, H. Lee, and J. Lam, “Distributed sdn controller system: A survey on design choice,” computer networks, vol. 121, pp. 100–111, 2017.
- [20] PSCAD. (2018) Ieee 118 bus system. [Online]. Available: https://www.pscad.com/knowledge-base/download/ieee_118_bus_technical_note.pdf
- [21] J. Coffey, Latency in optical fiber systems, 2017.