Access Control For Distribution Automation Using Ethernet Passive Optical Network

In electrical power industry, the objectives of smart-grid development can technically reach through the advanced metering infrastructure (AMI), advanced distribution operation (ADO), advanced transmission operation (ATO) and advanced asset management (AAM). This paper addresses the security issues that arise in the communication systems of AMI and ADO using Ethernet Passive Optical Networks (EPON). The communication system architecture with access control mechanism is described. Following the standard registration procedure and based on the challenge-response identification protocol, the mutual device authentication between the OLT and the ONU is also implemented.

[1]  D.E. Nordell,et al.  Communication systems for Distribution Automation , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition.

[2]  A.A. Creery,et al.  Industrial cybersecurity for a power system and SCADA networks - Be secure , 2007, IEEE Industry Applications Magazine.

[3]  T. Kropp System threats and vulnerabilities [power system protection] , 2006, IEEE Power and Energy Magazine.

[4]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[5]  Tao Jiang,et al.  Analysis and solutions of security issue in ethernet PON , 2005 .

[6]  Martin Reisslein,et al.  Ethernet PONs: a survey of dynamic bandwidth allocation (DBA) algorithms , 2004, IEEE Communications Magazine.

[7]  Ed Dawson,et al.  SKMA - A Key Management Architecture for SCADA Systems , 2006 .

[8]  F. Cleveland Enhancing the Reliability and Security of the Information Infrastructure Used to Manage the Power System , 2007, 2007 IEEE Power Engineering Society General Meeting.

[9]  Jen-Hao Teng,et al.  Economic Evaluation of a Distribution Automation Project , 2006, IEEE Transactions on Industry Applications.

[10]  Sun-Sik Roh,et al.  Security model and authentication protocol in EPON-based optical access network , 2003, Proceedings of 2003 5th International Conference on Transparent Optical Networks, 2003..

[11]  E.J. Byres,et al.  Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.

[12]  Marek Hajduczenia,et al.  EPON versus APON and GPON: a detailed performance comparison , 2006 .

[13]  Jeffrey E. Dagle,et al.  Summary of Control System Security Standards Activities in the Energy Sector , 2005 .

[14]  Ieee Standards Board Fiber optic active and passive star-based segments, type 10BASE-F (section 15-18) : IEEE standards for local and metropolitan area networks : supplement to carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications , 1993 .

[15]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[16]  Frank C. Lambert,et al.  A survey on communication networks for electric system automation , 2006, Comput. Networks.

[17]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[18]  G.N. Ericsson Toward a Framework for Managing Information Security for an Electric Power Utility—CIGRÉ Experiences , 2007, IEEE Transactions on Power Delivery.

[19]  Tao Jiang,et al.  Analysis and solutions of security issues in Ethernet PON , 2005, SPIE/OSA/IEEE Asia Communications and Photonics.