A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks

Maëlle Kabir-Querrec, Stéphane Mocanu, J. Thiriet, E. Savary
{"title":"A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks","authors":"Maëlle Kabir-Querrec, Stéphane Mocanu, J. Thiriet, E. Savary","doi":"10.1109/ETFA.2016.7733644","DOIUrl":null,"url":null,"abstract":"Industrial control systems rely more and more on digital technologies. Although the cyber risk such technologies induce is widely judged as serious, especially for critical infrastructures, these systems have generally not been designed to serve cybersecurity purposes. Instead they were thought first for serving operational efficiency. It thus becomes critical to study cyber threats in industrial environments and experimental test beds are needed to evaluate risks, physical consequences of cyber incidents, and performance of countermeasures. The test bed we present here focuses on studying cyber risks and their mitigation in IEC 61850 power utility automation systems. The operational part is composed of engineering computers, supervision software, off-the-shelf intelligent relays (Intelligent Electronic Device - IED), a hardware-in-the-loop process simulation, and the cybersecurity tools include an attack generation station and a network analyzer. In this paper, we present the operational part, giving details on the power grid hardware-in-the-loop simulation and its importance in the understanding of cyber consequences on the global system. The article concludes giving preliminary experimental results showing consequences of a false data injection attack on a simple electrical architecture.","PeriodicalId":6483,"journal":{"name":"2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"30 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETFA.2016.7733644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 22

Abstract

Industrial control systems rely more and more on digital technologies. Although the cyber risk such technologies induce is widely judged as serious, especially for critical infrastructures, these systems have generally not been designed to serve cybersecurity purposes. Instead they were thought first for serving operational efficiency. It thus becomes critical to study cyber threats in industrial environments and experimental test beds are needed to evaluate risks, physical consequences of cyber incidents, and performance of countermeasures. The test bed we present here focuses on studying cyber risks and their mitigation in IEC 61850 power utility automation systems. The operational part is composed of engineering computers, supervision software, off-the-shelf intelligent relays (Intelligent Electronic Device - IED), a hardware-in-the-loop process simulation, and the cybersecurity tools include an attack generation station and a network analyzer. In this paper, we present the operational part, giving details on the power grid hardware-in-the-loop simulation and its importance in the understanding of cyber consequences on the global system. The article concludes giving preliminary experimental results showing consequences of a false data injection attack on a simple electrical architecture.
一个专门研究IEC 61850电力自动化网络漏洞的试验台
工业控制系统越来越依赖于数字技术。尽管人们普遍认为此类技术引发的网络风险很严重,尤其是对于关键基础设施而言,但这些系统通常不是为服务于网络安全目的而设计的。相反,他们首先考虑的是服务于运营效率。因此,在工业环境中研究网络威胁变得至关重要,需要实验测试平台来评估风险、网络事件的物理后果和对策的性能。我们在这里介绍的测试平台侧重于研究IEC 61850电力公用事业自动化系统中的网络风险及其缓解措施。操作部分由工程计算机、监控软件、现成的智能继电器(智能电子设备- IED)、硬件在环过程仿真和网络安全工具组成,包括攻击生成站和网络分析仪。在本文中,我们介绍了操作部分,详细介绍了电网硬件在环仿真及其在理解网络对全球系统的影响方面的重要性。文章最后给出了初步的实验结果,显示了对简单的电气架构进行虚假数据注入攻击的后果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信