Substation Communication security Research Based on Hybrid Encryption of DES and RSA

被引:10
作者
Wang Fangfang [1 ]
Wang Huazhong [1 ]
Chen Dongqing [2 ]
Peng Yong [2 ]
机构
[1] East China Univ Sci & Technol, Dept Automat, Shanghai 200237, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing 100085, Peoples R China
来源
2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013) | 2013年
关键词
real time; security; GOOSE message; encryption; OPNET;
D O I
10.1109/IIH-MSP.2013.115
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Real time performance is in rigorous demand in substation. IEC 61850, the only international standard in substation automation system, makes clear requirements on it. However, the standard doesn't give any instructive suggestions on security. Therefore, this paper puts forward an idea of encryption mixed by Data Encryption Standard (DES) and RSA public-key encryption algorithms to further ensure the message's security while maintaining the real time performance. This idea combines the advantages and avoids the defects of either algorithm. The effectiveness of the proposed method is proved by the simulation for the GOOSE message of the substation's transmission with OPNET as the network simulating software.
引用
收藏
页码:437 / 441
页数:5
相关论文
共 10 条
[1]  
[Anonymous], 2008, P 2008 IEEEPES TRANS, DOI DOI 10.1109/TDC.2008.4517287
[2]   Proposal strategies of key management for data encryption in SCADA network of electric power systems [J].
Kang, D. J. ;
Lee, J. J. ;
Kim, B. H. ;
Hur, D. .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2011, 33 (09) :1521-1526
[3]   Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges [J].
Li, Xu ;
Liang, Xiaohui ;
Lu, Rongxing ;
Shen, Xuemin ;
Lin, Xiaodong ;
Zhu, Haojin .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) :38-45
[4]   Implementation of DES Encryption Algorithm Based on FPGA and Performance Analysis [J].
Lian, JiHong ;
Chen, Kai .
MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 :2953-+
[5]  
Lu Chen, 2013, Applied Mechanics and Materials, V260-261, P91, DOI 10.4028/www.scientific.net/AMM.260-261.91
[6]  
Sahu S. K., 2011, 2011 International Conference on Communication Systems and Network Technologies (CSNT), P112, DOI 10.1109/CSNT.2011.30
[7]  
Sidhu T.S., 2010, IEEE PES General Meeting, P1, DOI [10.1109/PES.2010.5590065, DOI 10.1109/PES.2010.5590065]
[8]  
Sridhar S, 2012, POWER ELECTRON POWER, P275, DOI 10.1007/978-1-4614-1605-0_14
[9]   Cyber security in the Smart Grid: Survey and challenges [J].
Wang, Wenye ;
Lu, Zhuo .
COMPUTER NETWORKS, 2013, 57 (05) :1344-1371
[10]  
Zhengwei Chang, 2010, Proceedings of the 2010 International Conference on Machine Vision and Human-Machine Interface (MVHI 2010), P572, DOI 10.1109/MVHI.2010.31