Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems

Utku Tefek, Ertem Esiner, D. Mashima, Yih-Chun Hu
{"title":"Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems","authors":"Utku Tefek, Ertem Esiner, D. Mashima, Yih-Chun Hu","doi":"10.1109/SmartGridComm52983.2022.9961052","DOIUrl":null,"url":null,"abstract":"An inevitable consequence of automated control and communication in electric substations is the vulnerability against cyberattacks that compromise the integrity and authenticity of messages. IEC 62351 standard stipulates the use of message authentication solutions, although there is no firm guidance on the exact method to be adopted. The earlier IEC 62351-6:2007 standard recommended the use of digital signatures. However, digital signatures do not meet the timing requirements of IEC 61850 GOOSE and SV. Thus, the recent revisions to IEC 62351–6 backtracked from digital signatures in favor of message authentication code (MAC) algorithms, thereby sacrificing key properties, i.e., scaling well for multiple destinations, easy key distribution and management, public verifiability, and non-repudiation. Following these revisions, tailoring MAC-based algorithms for IEC 61850 message structure has gained traction. Additionally, new message authentication solutions that exploit the small or low entropy messages, such as those in GOOSE and SV, have been proposed to secure time-critical communication. These solutions retain certain key properties of digital signatures within the delay requirements of GOOSE and SV. This paper addresses the key trade-offs and discusses the feasibility of the promising message authentication solutions for IEC 61850 GOOSE and SV. Through their implementation on a low-cost hardware BeagleBoard-X15 we report on the real-world comparison of performance metrics.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm52983.2022.9961052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

An inevitable consequence of automated control and communication in electric substations is the vulnerability against cyberattacks that compromise the integrity and authenticity of messages. IEC 62351 standard stipulates the use of message authentication solutions, although there is no firm guidance on the exact method to be adopted. The earlier IEC 62351-6:2007 standard recommended the use of digital signatures. However, digital signatures do not meet the timing requirements of IEC 61850 GOOSE and SV. Thus, the recent revisions to IEC 62351–6 backtracked from digital signatures in favor of message authentication code (MAC) algorithms, thereby sacrificing key properties, i.e., scaling well for multiple destinations, easy key distribution and management, public verifiability, and non-repudiation. Following these revisions, tailoring MAC-based algorithms for IEC 61850 message structure has gained traction. Additionally, new message authentication solutions that exploit the small or low entropy messages, such as those in GOOSE and SV, have been proposed to secure time-critical communication. These solutions retain certain key properties of digital signatures within the delay requirements of GOOSE and SV. This paper addresses the key trade-offs and discusses the feasibility of the promising message authentication solutions for IEC 61850 GOOSE and SV. Through their implementation on a low-cost hardware BeagleBoard-X15 we report on the real-world comparison of performance metrics.
IEC 61850在变电站自动化系统中的消息认证方案分析
变电站自动化控制和通信的一个不可避免的后果是容易受到网络攻击,从而损害信息的完整性和真实性。IEC 62351标准规定了消息身份验证解决方案的使用,尽管对于要采用的确切方法没有明确的指导。早期的IEC 62351-6:2007标准建议使用数字签名。然而,数字签名不符合IEC 61850 GOOSE和SV的时序要求。因此,IEC 62351-6的最新修订从数字签名转向了消息身份验证码(MAC)算法,从而牺牲了密钥属性,即多个目的地的良好扩展、易于密钥分发和管理、公共可验证性和不可否认性。在这些修订之后,为IEC 61850消息结构定制基于mac的算法获得了关注。此外,已经提出了利用小或低熵消息(例如GOOSE和SV中的消息)的新消息身份验证解决方案来保护时间关键型通信。这些解决方案在GOOSE和SV的延迟要求内保留了数字签名的某些关键属性。本文讨论了关键的权衡,并讨论了IEC 61850 GOOSE和SV有前途的消息认证解决方案的可行性。通过它们在低成本硬件BeagleBoard-X15上的实现,我们报告了实际性能指标的比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信