A Geometrical Approach to Enhance Security Against Cyber Attacks in Digital Substations

被引:1
|
作者
Elrawy, Mohamed F. [1 ,2 ]
Fioravanti, Camilla [3 ]
Oliva, Gabriele [3 ]
Michael, Maria K. [1 ,2 ]
Setola, Roberto [3 ]
机构
[1] Univ Cyprus, Dept Elect & Comp Engn, CY-2109 Nicosia, Cyprus
[2] Univ Cyprus, KIOS Res & Innovat Ctr Excellence, CY-2109 Nicosia, Cyprus
[3] Univ Campus Biomed Rome, Dept Engn, Rome, Italy
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Encryption; Protocols; Standards; Substations; IEC Standards; Security; Authentication; Cyber-physical systems; Computer security; Digital systems; Smart grids; cyber-security; digital substation; GOOSE protocol; IEC; 61850; 62351; smart grid; IMPLEMENTATION; GOOSE;
D O I
10.1109/ACCESS.2024.3361753
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid technology drives economic and social development but raises vulnerability to cyber threats due to digital substations' growing reliance. To counter these risks, recent updates to communication standards, including encryption and authentication processes, have been integrated into the infrastructure. Notably, adhering to the IEC 62351 standard governing the GOOSE protocol for substation communication faces practical challenges due to conflicting time requirements with traditional security procedures. In this paper, we present an innovative geometric approach for GOOSE message authentication and encryption. Utilizing vector coordinate shifts, our method exhibits efficiency and speed of implementation, ensuring compliance with the protocol's stringent time constraints. Importantly, unlike other approaches in the literature, our technique has the potential to be easily applicable and effective for a wide range of infrastructures without requiring the use or addition of specific hardware components or changes to the GOOSE message format, while guaranteeing high performances and computational simplicity. The paper is complemented by a simulation campaign on a digital substation model, assessing the approach's performance and its efficacy in countering cyber threats.
引用
收藏
页码:18724 / 18738
页数:15
相关论文
共 50 条
  • [31] Measuring the Security Posture of IEC 61850 Substations with Redundancy Against Zero Day Attacks
    Duman, Onur
    Zhang, Mengyuan
    Wang, Lingyu
    Debbabi, Mourad
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2017, : 108 - 114
  • [32] Cyber security of smart grids infrastructure: Protective measure against attacks
    Camachi, Balduino Estison Mugilila
    Popescu, Dan
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2020, 82 (03): : 73 - 86
  • [33] An intelligent cyber security system against DDoS attacks in SIP networks
    Semerci, Murat
    Cemgil, Ali Taylan
    Sankur, Bulent
    COMPUTER NETWORKS, 2018, 136 : 137 - 154
  • [34] Security Against Communication Network Attacks of Cyber-Physical Systems
    Lima, Publio Macedo
    Silva Alves, Marcos Vinicius
    Carvalho, Lilian Kawakami
    Moreira, Marcos Vicente
    JOURNAL OF CONTROL AUTOMATION AND ELECTRICAL SYSTEMS, 2019, 30 (01) : 125 - 135
  • [35] Study of Digital Watermarking Techniques for Against Security Attacks
    Maloo, Snehlata
    Lakshmi, N.
    Pareek, N. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 509 - 515
  • [36] Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security
    De Benedictis, Alessandra
    Esposito, Christiancarmine
    Somma, Alessandra
    QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2022, 2022, 1621 : 307 - 321
  • [37] Digital Watermark Algorithm against Geometrical Attacks Based on DWT and DCT
    Jiang Wenbo
    Zhou Dazhuo
    He Liwei
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1 - 4, 2010, : 662 - 665
  • [38] New approach to copyright protection of image against geometrical attacks
    Hao, Hongjie
    Wu, Yiquan
    Transactions of Nanjing University of Aeronautics and Astronautics, 2007, 24 (04) : 335 - 342
  • [39] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [40] Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
    Alahmadi, Adel N.
    Rehman, Saeed Ur
    Alhazmi, Husain S.
    Glynn, David G.
    Shoaib, Hatoon
    Sole, Patrick
    SENSORS, 2022, 22 (09)