Evaluating Security Algorithms in the Substation Communication Architecture

被引:1
|
作者
Hong, Sugwon [1 ]
Shin, Dae-Yong [1 ]
Lee, Myongho [1 ]
机构
[1] Myongji Univ, Dept Comp Software, Yongin, South Korea
关键词
IEC; 61850; Substation Security; Message authentication; integrity;
D O I
10.1109/EmbeddedCom-ScalCom.2009.63
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security becomes the major concern in a modernized electricity network. The IEC 61850 standard has been developed for substation automation, providing more enhancing communication functionalities. The standard defines several kinds of messages for data exchange between nodes in the substation. Among them, two critical messages have very stringent performance requirement for secure substation operation and protection. In this paper we design a security protocol for guaranteeing message authentication and integrity. In order to show whether the protocol can achieve the performance criteria imposed by the standard, we conduct some experiments on a desktop PC and an embedded device. Our study shows that the desktop PC is capable of satisfying performance criteria. However, the result shows that the embedded device has some limitation of handling incoming messages and processing cryptographic computation depending on the number of packets.
引用
收藏
页码:314 / 318
页数:5
相关论文
共 50 条
  • [31] Security architecture and mechanism of third generation mobile communication
    Min, L
    Hai, B
    Feng, ZJ
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 813 - 816
  • [32] A Security-Aware Near Field Communication Architecture
    Asaduzzaman, A.
    Mazumder, S.
    Salinas, S.
    Mridha, Muhammad F.
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 33 - 38
  • [33] A Scalable Configurable Architecture for Advanced Wireless Communication Algorithms
    Konstantinos Sarrigeorgidis
    Jan Rabaey
    Journal of VLSI signal processing systems for signal, image and video technology, 2006, 45 : 127 - 151
  • [34] Security Architecture Model for Smart Grid Communication Systems
    Lim, Hyunwoo
    Ko, Jongbin
    Lee, Seokjun
    Kim, Jongwan
    Kim, Mijoo
    Shon, Taeshik
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [35] Mapping wireless communication algorithms onto a reconfigurable architecture
    Rauwerda, GK
    Heysters, PM
    Smit, GJM
    JOURNAL OF SUPERCOMPUTING, 2004, 30 (03): : 263 - 282
  • [36] An Improved Security Scheme for IEC 61850 MMS Messages in Intelligent Substation Communication Networks
    Ustun, Taha Selim
    Hussain, S. M. Suhail
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (03) : 591 - 595
  • [37] Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering
    Gao, Haihui
    Dai, Zhonghua
    Peng, Yong
    Lu, Huikang
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 524 - 527
  • [38] A metric for evaluating software architecture and communication models consistency
    Lafaye, JY
    Louis, G
    RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2005, 39 (02): : 359 - 388
  • [39] Lightweight Security Hardware Architecture Using DWT and AES Algorithms
    Algredo-Badillo, Ignacio
    Castillo-Soria, Francisco R.
    Ramirez-Gutierrez, Kelsey A.
    Morales-Rosales, Luis
    Medina-Santiago, Alejandro
    Feregrino-Uribe, Claudia
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (11): : 2754 - 2761
  • [40] Analysis of Security Algorithms towards secured communication in Wireless Networks
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,