Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

被引:1
作者
Wright, James G. [1 ]
Wolthusen, Stephen D. [1 ,2 ]
机构
[1] Royal Holloway Univ London, Sch Math & Informat Secur, Egham TW20 0EX, Surrey, England
[2] Norwegian Univ Sci & Technol, Norwegian Informat Secur Lab, Trondheim, Norway
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016) | 2018年 / 10242卷
基金
英国工程与自然科学研究理事会;
关键词
Smart grid; ISO/IEC; 61850; Access control; Amplification attack; Substation automation protocol; SECURITY;
D O I
10.1007/978-3-319-71368-7_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ISO/IEC 61850 protocol for substation automation is a key component for the safe and efficient operation of smart grids, whilst offering a substantial range of functions. While extension standards, particularly ISO/IEC 62351 provide further security controls, the baseline protocol offers the assurances of access control and availability. In this paper a systematic study of selected aspects of the basic ISO/IEC 61850 protocol demonstrates that protocol-level vulnerabilities exist. The main finding is the development of a credential interception attack allowing an adversary, without credentials, to hijack a session during an initial association; the feasibility of this attack is proven using a formal language representation. A second attack based on a workflow amplification attack which relies on the assumptions in the protocol's substation event model, which is independent of layered security controls and only relies on the protocol's communication patterns is shown.
引用
收藏
页码:239 / 251
页数:13
相关论文
共 25 条
[1]  
[Anonymous], 2007, 62351 IEC
[2]  
[Anonymous], 2010, 6185072 IEC
[3]  
[Anonymous], 2006, TECHNICAL REPORT
[4]  
[Anonymous], 2013, 618505 IEC
[5]  
[Anonymous], 1996, Introduction to the Theory of Computation
[6]   ON COMMUNICATING FINITE-STATE MACHINES [J].
BRAND, D ;
ZAFIROPULO, P .
JOURNAL OF THE ACM, 1983, 30 (02) :323-342
[7]  
Chen XD, 2011, 2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), P1, DOI 10.1109/ICBNMT.2011.6155883
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]  
East S, 2009, IFIP ADV INF COMM TE, V311, P67
[10]  
Elgargouri A, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P2461, DOI 10.1109/ICIT.2015.7125460