Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid

被引:37
作者
Reda, Haftu Tasew [1 ]
Ray, Biplob [2 ]
Peidaee, Pejman [3 ]
Anwar, Adnan [4 ]
Mahmood, Abdun [1 ]
Kalam, Akhtar [3 ]
Islam, Nahina [2 ]
机构
[1] La Trobe Univ, Dept Comp Sci & IT, Plenty Rd, Bundoora, Vic 3086, Australia
[2] CQUniversity, Sch Engn & Technol, Ctr Intelligent Syst CIS, Rockhampton, Qld 4700, Australia
[3] Victoria Univ, Dept Elect & Elect Engn, Ballarat Rd, Footscray, Vic 3011, Australia
[4] Deakin Univ, Sch IT, 75 Pigdons Rd, Waurn Ponds 3216, Australia
关键词
smart grid; cybersecurity; substation protection; IEC; 61850; GOOSE protocol; publish-subscribe communication; FORMAL VERIFICATION; AUTHENTICATION; INTERNET;
D O I
10.3390/s21041554
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 39 条
[1]  
Adamiak M., 2010, PROT CONTROL J SMART, P61
[2]  
Angulo I., 2016, PROC TENOR, P1
[3]  
[Anonymous], 2014, ARXIV14013936
[4]  
[Anonymous], Florida's and Minnesota's operational protocols had not been approved as of April 2012
[5]   Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids [J].
Anwar, Adnan ;
Mahmood, Abdun N. ;
Tari, Zahir .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (06) :3299-3311
[6]   Formal verification of security protocol implementations: a survey [J].
Avalle, Matteo ;
Pironti, Alfredo ;
Sisto, Riccardo .
FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) :99-123
[7]   Excessive sedentary time during in-patient stroke rehabilitation [J].
Barrett, Matthew ;
Snow, John Charles ;
Kirkland, Megan C. ;
Kelly, Liam P. ;
Gehue, Maria ;
Downer, Matthew B. ;
McCarthy, Jason ;
Ploughman, Michelle .
TOPICS IN STROKE REHABILITATION, 2018, 25 (05) :366-374
[8]   Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation [J].
Chattopadhyay, Anupam ;
Ukil, Abhisek ;
Jap, Dirmanto ;
Bhasin, Shivam .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2442-2451
[9]  
Clarke G., 2004, Practical modern SCADA protocols: DNP3, 60870.5 and related systems
[10]  
Clevel F., 2012, CISC VIS NETW IND GL