Ongoing power system automaton and open access imposed by new government deregulations aggravate cybervulnerability of utility computer networks. This paper proposes an open-access-compatibility (OAC) security layer, installed beneath the data-link layer of the popular utility network protocol DNP3, to enhance data transmission security for utilities with open access capabilities. The OAC security is designed as an extension for a Canadian utility integrated P&C system innovation. The OAC security increases interactions with DNP3 data-link layer to enhance utility network security that is especially important for time-data-critical transmissions of protection information. The OAC security does not alter existing DNP3 specification to maintain interoperability for devices not using OAC. The OAC security uses two independent encryptions, one for exchanging security keys and one for transmitting data, to minimize time required for security operations. The OAC security relaxes authentication requirements to reduce transmission overheads and increase efficiency.
[1]
Charlie Kaufman,et al.
Internet Key Exchange (IKEv2) Protocol
,
2005,
RFC.
[2]
B. Stauffer,et al.
Nine Cautionary Tales
,
2006,
IEEE Spectrum.
[3]
William Stallings,et al.
PGP Message Exchange Formats
,
1996,
RFC.
[4]
Philip R. Zimmermann,et al.
The official PGP user's guide
,
1996
.
[5]
M. Amin.
Balancing market priorities with security issues
,
2004,
IEEE Power and Energy Magazine.
[6]
Lin Wang,et al.
Adapting the Pretty Good Privacy Security Style to Power System Distributed Network Protocol
,
2006,
2006 Large Engineering Systems Conference on Power Engineering.
[7]
L.-A. Dessaint,et al.
Power systems stability enhancement using a wide-area signals based hierarchical controller
,
2005,
IEEE Transactions on Power Systems.