{"title":"建立变电站的安全体系结构","authors":"Shailendra Fuloria, Ross J. Anderson","doi":"10.1109/ISGTEurope.2011.6162824","DOIUrl":null,"url":null,"abstract":"The security of the electricity delivery system has received much attention recently with increasing focus on Smart Grids. While substations used to be protected by concrete walls and barbed wire, today the industry is getting worried about attacks over the communication infrastructure. In this paper, we analyse the primary threats and present a first cut of a security architecture. We suggest security policy options for utilities, as well as protocols to do key management for substations. We conclude that the priority should be to secure the electronic perimeter of substation—as this has the maximum impact. Authentication should be done at the level of the substation station room rather the substation bays. Using cryptography for authentication inside substation bays does not have significant benefits, but is likely to bring fragility instead.","PeriodicalId":419250,"journal":{"name":"2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Towards a security architecture for substations\",\"authors\":\"Shailendra Fuloria, Ross J. Anderson\",\"doi\":\"10.1109/ISGTEurope.2011.6162824\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of the electricity delivery system has received much attention recently with increasing focus on Smart Grids. While substations used to be protected by concrete walls and barbed wire, today the industry is getting worried about attacks over the communication infrastructure. In this paper, we analyse the primary threats and present a first cut of a security architecture. We suggest security policy options for utilities, as well as protocols to do key management for substations. We conclude that the priority should be to secure the electronic perimeter of substation—as this has the maximum impact. Authentication should be done at the level of the substation station room rather the substation bays. Using cryptography for authentication inside substation bays does not have significant benefits, but is likely to bring fragility instead.\",\"PeriodicalId\":419250,\"journal\":{\"name\":\"2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISGTEurope.2011.6162824\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISGTEurope.2011.6162824","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The security of the electricity delivery system has received much attention recently with increasing focus on Smart Grids. While substations used to be protected by concrete walls and barbed wire, today the industry is getting worried about attacks over the communication infrastructure. In this paper, we analyse the primary threats and present a first cut of a security architecture. We suggest security policy options for utilities, as well as protocols to do key management for substations. We conclude that the priority should be to secure the electronic perimeter of substation—as this has the maximum impact. Authentication should be done at the level of the substation station room rather the substation bays. Using cryptography for authentication inside substation bays does not have significant benefits, but is likely to bring fragility instead.