Cyber security in smart grid SCADA automation systems

Cyber attacks into modern SCADA (Supervisory Control and Data Acquisition) lead to vulnerabilities as International Electrotechnical Commission (IEC) 61850 has no security features inbuilt. IEC 62351 is used to secure IEC 61850 profiles. SCADA power utilities, using IEC 61850 protocol, are facing problem of key management as it is not outlined in IEC 62351. In recent times, key management in SCADA networks is a major challenge. Due to lack of resources and low latency requirements in SCADA networks, it is infeasible to use traditional key management schemes such as RSA based PKI (Public Key Infrastructure).This paper will give a general insight on the development of security mechanisms to secure substation level SCADA communication which has a Bump-in-the-wire (Bitw) device. Finally, we propose a security solution to eliminate the problem of key management by integrating CDAC's key distribution and management protocol Sec-KeyD into IEC 62351 to secure IEC 61850 protocol.

[1]  Sugwon Hong,et al.  Challenges and Perspectives in Security Measures for the SCADA System , 2008 .

[2]  Frank Hohlbaum,et al.  Cyber Security Practical considerations for implementing IEC 62351 , 2010 .

[3]  L. Pietre-Cambacedes,et al.  Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[4]  Ross J. Anderson,et al.  The Protection of Substation Communications , 2009 .

[5]  R. P. Gupta Substation Automation Using IEC 61850 Standard , .

[6]  R.E. Mackiewicz,et al.  Overview of IEC 61850 and Benefits , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[7]  Seungjoo Kim,et al.  An Efficient Key Management Scheme for Secure SCADA Communication , 2008 .

[8]  Peeyush Jain,et al.  SCADA security: a review and enhancement for DNP3 based systems , 2013, CSI Transactions on ICT.

[9]  Mark Adamiak,et al.  IEC61850 protocol - practical applications in industrial facilities , 2011, 2011 IEEE Industry Applications Society Annual Meeting.

[10]  Cheryl L. Beaver,et al.  Key Management for SCADA , 2002 .

[11]  Yong Ge Wa Ng - Smart Grid, Automation, and SCADA System Security , 2016 .

[12]  H. Falk Securing IEC 61850 , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[13]  Conversion and delivery of electrical energy in the 21st century , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[14]  Russian Federation,et al.  Software for Emulating the Sampled Values Transmission in Accordance with IEC 61850 Standard , 2013 .

[15]  Mark Adamiak,et al.  Practical Applications of IEC 61850 Protocol in Industrial Facilities , 2011 .

[16]  Kevin McGrath,et al.  Key management for substations: Symmetric keys, public keys or no keys? , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[17]  Marco Janssen,et al.  THE SPECIFICATION OF IEC 61850 BASED SUBSTATION AUTOMATION SYSTEMS , 2022 .

[18]  Tanmay Sinha,et al.  Optimizing Packet Filtering Libraries for Scada System Security , 2014 .

[19]  Steffen Fries,et al.  Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.