Securing GOOSE: The Return of One-Time Pads

IEC 61850 is an international standard that is widely used in substation automation systems (SAS) in smart grids. During its development, security was not considered thus leaving SAS vulnerable to attacks from adversaries. IEC 62351 was developed to provide security recommendations for SAS against (distributed) denial-of-service, replay, alteration, spoofing and detection of devices attacks. However, real-time communications, which require protocols such as Generic Object-Oriented Substation Event (GOOSE) to function efficiently, cannot implement these recommendations due to latency constraints. There has been researching that sought to improve the security of GOOSE messages, however, some cannot be practically implemented due to hardware requirements while others are theoretical, even though latency requirements were met. This research investigates the possibility of encrypting GOOSE messages with One- Time Pads (OTP), leveraging the fact that encryption/decryption processes require the random generation of OTPs and modulo addition (XOR), which could be a realistic approach to secure GOOSE while maintaining latency requirements. Results show that GOOSE messages can be encrypted with some future work required.

[1]  Peter Crossley,et al.  GOOSE performance assessment on an IEC 61850 redundant network , 2018 .

[2]  Roslan Ismail,et al.  A review of security attacks on IEC61850 substation automation system network , 2014, Proceedings of the 6th International Conference on Information Technology and Multimedia.

[3]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[4]  Anna Volkova,et al.  Security Challenges in Control Network Protocols: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[5]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[6]  Mark Adamiak,et al.  IEC 61850 Communication Networks and Systems In Substations: An Overview for Users , 1988 .

[7]  Aladin Zayegh,et al.  Powerful IEDs, ethernet networks and their effects on IEC 61850-based electric power utilities security , 2017, 2017 Australasian Universities Power Engineering Conference (AUPEC).

[8]  Stephen D. Wolthusen,et al.  Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service , 2018, 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).

[9]  Timothy X. Brown,et al.  Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure , 2012, 2012 IEEE Globecom Workshops.

[10]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[11]  Burton S. Kaliski A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .

[12]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[13]  M. Branicky,et al.  Design Considerations for Software Only Implementations of the IEEE 1588 Precision Time Protocol , 2005 .

[14]  Wang Huazhong,et al.  Substation Communication Security Research Based on Hybrid Encryption of DES and RSA , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[15]  Yoohwan Kim,et al.  Application of NTRU Cryptographic Algorithm for SCADA Security , 2014, 2014 11th International Conference on Information Technology: New Generations.

[16]  Ghavameddin Nourbakhsh,et al.  A technique for analysing GOOSE packets when testing relays in an IEC 61850-8-1 environment , 2015 .

[17]  Carl Kriger,et al.  A Detailed Analysis of the GOOSE Message Structure in an IEC 61850 Standard-Based Substation Automation System , 2013, Int. J. Comput. Commun. Control.

[18]  Bin Zhou,et al.  Realization of Communication Security in Substation , 2018, 2018 5th International Conference on Information Science and Control Engineering (ICISCE).

[19]  Jun’e LI,et al.  A security scheme for intelligent substation communications considering real-time performance , 2019, Journal of Modern Power Systems and Clean Energy.

[20]  Yi Yang,et al.  Review on cyber vulnerabilities of communication protocols in industrial control systems , 2017, 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2).

[21]  F. Cleveland,et al.  IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[22]  Débora C. Muchaluat-Saade,et al.  Identifying vulnerabilities in smart gric communication networks of electrical substations using GEESE 2.0 , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).

[23]  Hsinchun Chen,et al.  Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach , 2018, IEEE Intelligent Systems.