Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

Livinus Obiora Nweke, G. Weldehawaryat, S. Wolthusen
{"title":"Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols","authors":"Livinus Obiora Nweke, G. Weldehawaryat, S. Wolthusen","doi":"10.1109/DRCN48652.2020.1570604241","DOIUrl":null,"url":null,"abstract":"Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication networks and systems for power utility automation in particular not only requires distributed processing, but in case of the generic object oriented substation events and sampled value (GOOSE/SV) protocols also hard real-time characteristics. This motivates the desire to include both quality of service (QoS) and explicit network topology in an adversary model based on a π-calculus process algebraic formalism based on earlier work. This allows reasoning over process states, placement of adversarial entities and communication behaviour. We demonstrate the use of our model for the simple case of a replay attack against the publish/subscribe GOOSE/SV subprotocol, showing bounds for non-detectability of such an attack.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DRCN48652.2020.1570604241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication networks and systems for power utility automation in particular not only requires distributed processing, but in case of the generic object oriented substation events and sampled value (GOOSE/SV) protocols also hard real-time characteristics. This motivates the desire to include both quality of service (QoS) and explicit network topology in an adversary model based on a π-calculus process algebraic formalism based on earlier work. This allows reasoning over process states, placement of adversarial entities and communication behaviour. We demonstrate the use of our model for the simple case of a replay attack against the publish/subscribe GOOSE/SV subprotocol, showing bounds for non-detectability of such an attack.
针对IEC 61850实时通信协议攻击的对手模型
对于加密协议,对抗性模型已经建立,但是分布式实时协议具有这些抽象不打算涵盖的需求。针对电力自动化的通信网络和系统的IEEE/IEC 61850标准不仅要求分布式处理,而且在通用面向对象的变电站事件和采样值(GOOSE/SV)协议的情况下也要求具有硬实时特性。这激发了将服务质量(QoS)和显式网络拓扑都包含在基于早期工作的π微积分过程代数形式化的对手模型中的愿望。这允许对过程状态、对抗性实体的放置和通信行为进行推理。我们在针对发布/订阅GOOSE/SV子协议的重播攻击的简单案例中演示了我们的模型的使用,显示了这种攻击不可检测的界限。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信