Next Article in Journal
Reliability and Validity of Clinically Accessible Smart Glove Technologies to Measure Joint Range of Motion
Next Article in Special Issue
End-to-End Deep Graph Convolutional Neural Network Approach for Intentional Islanding in Power Systems Considering Load-Generation Balance
Previous Article in Journal
Indirect Estimation of Vertical Ground Reaction Force from a Body-Mounted INS/GPS Using Machine Learning
Previous Article in Special Issue
Dynamic Adaptive Cross-Chain Trading Mode for Multi-Microgrid Joint Operation
Open AccessArticle

Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid

1
Department of Computer Science and IT, La Trobe University, Plenty Rd., Bundoora 3086, Australia
2
Centre for Intelligent Systems (CIS), School of Engineering and Technology, CQUniversity, Rockhampton 4700, Australia
3
Department of Electrical and Electronics Engineering, Victoria University, Ballarat Rd., Footscray 3011, Australia
4
School of IT, Deakin University, 75 Pigdons Rd, Waurn Ponds 3216, Australia
*
Author to whom correspondence should be addressed.
Academic Editor: Panagiotis Sarigiannidis
Sensors 2021, 21(4), 1554; https://doi.org/10.3390/s21041554
Received: 11 January 2021 / Revised: 8 February 2021 / Accepted: 17 February 2021 / Published: 23 February 2021
(This article belongs to the Special Issue Cybersecurity and Privacy-Preserving in Modern Smart Grid)
IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders. View Full-Text
Keywords: smart grid; cybersecurity; substation protection; IEC 61850; GOOSE protocol; publish-subscribe communication smart grid; cybersecurity; substation protection; IEC 61850; GOOSE protocol; publish-subscribe communication
Show Figures

Figure 1

MDPI and ACS Style

Reda, H.T.; Ray, B.; Peidaee, P.; Anwar, A.; Mahmood, A.; Kalam, A.; Islam, N. Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid. Sensors 2021, 21, 1554. https://doi.org/10.3390/s21041554

AMA Style

Reda HT, Ray B, Peidaee P, Anwar A, Mahmood A, Kalam A, Islam N. Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid. Sensors. 2021; 21(4):1554. https://doi.org/10.3390/s21041554

Chicago/Turabian Style

Reda, Haftu T.; Ray, Biplob; Peidaee, Pejman; Anwar, Adnan; Mahmood, Abdun; Kalam, Akhtar; Islam, Nahina. 2021. "Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid" Sensors 21, no. 4: 1554. https://doi.org/10.3390/s21041554

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop