Evaluating Security Algorithms in the Substation Communication Architecture

被引:1
|
作者
Hong, Sugwon [1 ]
Shin, Dae-Yong [1 ]
Lee, Myongho [1 ]
机构
[1] Myongji Univ, Dept Comp Software, Yongin, South Korea
关键词
IEC; 61850; Substation Security; Message authentication; integrity;
D O I
10.1109/EmbeddedCom-ScalCom.2009.63
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security becomes the major concern in a modernized electricity network. The IEC 61850 standard has been developed for substation automation, providing more enhancing communication functionalities. The standard defines several kinds of messages for data exchange between nodes in the substation. Among them, two critical messages have very stringent performance requirement for secure substation operation and protection. In this paper we design a security protocol for guaranteeing message authentication and integrity. In order to show whether the protocol can achieve the performance criteria imposed by the standard, we conduct some experiments on a desktop PC and an embedded device. Our study shows that the desktop PC is capable of satisfying performance criteria. However, the result shows that the embedded device has some limitation of handling incoming messages and processing cryptographic computation depending on the number of packets.
引用
收藏
页码:314 / 318
页数:5
相关论文
共 50 条
  • [41] An Improved Security Scheme for IEC 61850MMS Messages in Intelligent Substation Communication Networks
    Taha Selim Ustun
    S.M.Suhail Hussain
    Journal of Modern Power Systems and Clean Energy, 2020, 8 (03) : 591 - 595
  • [42] Performance Analysis of Routable GOOSE Security Algorithm for Substation Communication through Public Internet Network
    Shin, Soohyun
    Yang, Hyosik
    SENSORS, 2023, 23 (12)
  • [43] Communication analysis of the PIE and QIF algorithms on distributed memory architecture
    Parallel Algorithms Research Centre, Loughborough University Technology, Loughborough, Leics LE11 3TU, United Kingdom
    不详
    不详
    Int J Comput Math, 3-4 (293-313):
  • [44] A user-focused security service architecture for communication networks
    Sailer, R
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2001, 55 (01) : 72 - 80
  • [45] Efficient Security Architecture for Physical Layer in mmWave Communication Systems
    Alhakami, Wajdi
    El-Sayed, Hala S.
    Faragallah, Osama S.
    El-Mashed, Mohamed G.
    IEEE ACCESS, 2022, 10 : 113923 - 113934
  • [46] Performance and Security Evaluation of Intra-Vehicular Communication Architecture
    Liyanage, Madhusanka
    Kumar, Pardeep
    Soderi, Simone
    Ylianttila, Mika
    Gurtov, Andrei
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, : 302 - 308
  • [47] Communication analysis of the PIE and QIF algorithms on distributed memory architecture
    Abdullah, R
    Evans, DJ
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1998, 67 (3-4) : 293 - 313
  • [48] A Security Architecture for Communication between Smart Meters and HAN Devices
    Tanaka, Yasuyuki
    Terashima, Yoshiki
    Kanda, Mitsuru
    Ohba, Yoshihiro
    2012 IEEE THIRD INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2012, : 460 - 464
  • [49] Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges
    Taylor, Sean Joe
    Ahmad, Farhan
    Nguyen, Hoang Nga
    Shaikh, Siraj Ahmed
    SENSORS, 2023, 23 (01)
  • [50] Analysis of Computer Communication Network and Its Security Technology Architecture
    Shao, Ye
    Liu, Jing
    Jiang, Wenbo
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 145 - 148