Optimized Security Algorithm for IEC 61850 based Power Utility System

As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

[1]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[2]  Hans Dobbertin Cryptanalysis of MD4 , 1996, FSE.

[3]  Hyo-Sik Yang,et al.  Communication Architecture of the IEC 61850-based Micro Grid System , 2011 .

[4]  Byung-Tae Jang,et al.  Gigabit Ethernet Based Substation , 2009 .

[5]  B.F. Wollenberg,et al.  Toward a smart grid: power delivery for the 21st century , 2005, IEEE Power and Energy Magazine.

[6]  Steffen Fries,et al.  Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.

[7]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[8]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[9]  Jyotsna Bapat,et al.  Data communication over the smart grid , 2009, 2009 IEEE International Symposium on Power Line Communications and Its Applications.

[10]  Seong-Jeong Rim,et al.  Development of an Intelligent Station HMI in IEC 61850 Based Substation , 2009 .

[11]  Khosrow Moslehi,et al.  A Reliability Perspective of the Smart Grid , 2010, IEEE Transactions on Smart Grid.

[12]  Thomas Garrity,et al.  Getting Smart , 2008, IEEE Power and Energy Magazine.

[13]  Virgil D. Gligor,et al.  On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  T.S. Sidhu,et al.  Modelling and Simulation for Performance Evaluation of IEC61850-Based Substation Communication Systems , 2007, IEEE Transactions on Power Delivery.

[15]  T. Skeie,et al.  Ethernet in substation automation , 2002 .

[16]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[17]  Young-Hui Chang,et al.  Stimulus Artifact Suppression Using the Stimulation Synchronous Adaptive Impulse Correlated Filter for Surface EMG Application , 2012 .

[18]  Sang-Hee Kang,et al.  Improved operating scheme using an IEC61850-based distance relay for transformer backup protection , 2009, 2009 IEEE Bucharest PowerTech.

[19]  Antoon Bosselaers,et al.  An Attack on the Last Two Rounds of MD4 , 1991, CRYPTO.

[20]  F. Cleveland,et al.  IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[21]  Jin-Hong Jeon,et al.  Development of Simulator System for Microgrids with Renewable Energy Sources , 2006 .