Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5
Abstract
:1. Introduction
2. PMU Communication Standards
IEEE C37.118.2 and IEC 61850-90-5
3. Cyber-Security Vulnerability of PMU Networks Operating with IEC 61850-90-5 GDOI
3.1. IEC 61850-90-5 Cyber Security Considerations
3.2. Man-in-the-Middle (MITM) Attack
3.3. Implementing Certificate Based Authentication Mechanism with IEC 61850-90-5
Algorithm 1. CSRGen (X509Cert) |
1: (PMU_PUB_KEY, PMU_PR_KEY) ← Keygen() 2: X509Cert.name ← ‘PMU_NAME’ 3: X509Cert.issuer_name ← ‘CA_NAME’ 4: X509Cert.Srlno ← rand (). 5: X509Cert.validity ← ‘VALID_DATE ()’ 6: X509Cert.Pubkey ← ‘PMU_PUB_KEY’ 7: return CSRX509Cert |
Algorithm 2. Signing (X509Cert) |
1: PMUID ← X509Cert.credentials 2: h1 ← SIGk (PMUID) 3: x ← ENCCAPrKey (h1) 4: X509Cert.Signature ← x 5: return SX509Cert |
Algorithm 3. Verify(SX509Cert) |
1: PMUID ← X509Cert.credentials 2: h2 ← SIGk (PMUID) 3: x ← SX509Cert.Signature 4: h1 ← DECCAPubKey (x) 5: if h1 = h2 then 6: return Accept 7: else 8: return Reject 9: end if |
4. Python-Based Implementations and Results
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Ali, I.; Aftab, M.A.; Hussain, S.M.S. Performance comparison of IEC 61850-90-5 and IEEE C37.118.2 based wide area PMU communication networks. J. Mod. Power Syst. Clean Energy 2016, 4, 487–495. [Google Scholar] [CrossRef] [Green Version]
- Phadke, A.; Throp, J. Synchronized Phasor Measurements and Their Applications; Springer: New York, NY, USA, 2008; ISBN 978-0-387-76537-2. [Google Scholar]
- IEEE Standard for Synchrophasor for Power Systems; IEEE Std 1344-1995 (R2001); IEEE: Piscataway, NI, USA, 1995; Available online: https://ieeexplore.ieee.org/document/943067 (accessed on 26 November 2018).
- IEEE Standard for Synchrophasor for Power Systems; IEEE Std C37.118-2005; IEEE: Piscataway, NI, USA, 2005.
- IEEE Standard for Synchrophasor Data Transfer for Power Systems; IEEE Std C37.118.2-2011; IEEE: Piscataway, NI, USA, 2011.
- IEEE Standard for Synchrophasor measurements for Power Systems; IEEE C37.118.1-2011; IEEE: Piscataway, NI, USA, 2011.
- Communication Networks and Systems for Power Utility Automation—Part 90–95. In Use of IEC 61850 to Transmit Synchrophasor Information according to IEC C37.118; IEC: Geneva, Switzerland, 2012.
- Vournas, C.D.; Lambrou, C.; Mandoulidis, P. Voltage Stability Monitoring from a Transmission Bus PMU. IEEE Trans. Power Syst. 2017, 32, 3266–3274. [Google Scholar] [CrossRef]
- DOE. Final Report on the August 14, 2003 Blackout in the United States and Canada. U.S.—Canada Power System Outage Task Force. 2004. Available online: http://www.nerc.com/docs/docs/blackout/NERC_Final_Blackout_Report_07_13_04.pdf (accessed on 26 November 2018).
- Musleh, A.S.; Khalid, H.M.; Muyeen, S.M.; Al-Durra, A. A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications. IEEE Syst. J. 2017. [Google Scholar] [CrossRef]
- Morris, T.; Pan, S.; Lewis, J.; Moorhead, J.; Younan, N.; King, R.; Freund, M.; Madani, V. Cybersecurity Testing of Substation Phasor Measurement Units and Phasor Data Concentrators. In Proceedings of the ACM Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA, 12–14 October 2011. [Google Scholar]
- NMAP Security Scanner. Available online: http://www.nmap.org (accessed on 26 November 2018).
- Open Vulnerability Assessment System (OpenVAS). Available online: http://www.openvas.org/ (accessed on 26 November 2018).
- Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
- Coppolino, L.; Antonio, S.D.; Romano, L. Exposing Vulnerabilities in Electric Power Grids: An Experimental Approach. Int. J. Crit. Infrastruct. Prot. 2014, 7, 51–60. [Google Scholar] [CrossRef]
- D’Antonio, S.; Coppolino, L.; Elia, I.; Formicola, V. Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure. In Proceedings of the 13th ACM European Workshop on Dependable Computing, Pisa, Italy, 11–12 May 2011. [Google Scholar]
- Guidelines for Smart Grid Cyber Security, NIST, September 2014. Available online: https://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf (accessed on 26 November 2018).
- Khan, R.; Mclaughlin, K.; Laverty, D.; Sezer, S. Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid. IEEE Access 2017, 5, 11626–11644. [Google Scholar] [CrossRef]
- Harkins, D.; Carrel, D. The Internet Key Exchange (IKE). Internet Engineering Task Force (IETF)—Request for Comments (RFC) No. 2409. 1998. Available online: https://www.rfc-editor.org/rfc/pdfrfc/rfc2409.txt.pdf (accessed on 26 November 2018).
- Yang, W.; Li, X.; Feng, Z.; Hao, J. TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis. In Proceedings of the 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS), Fukuoka, Japan, 5–8 November 2017; pp. 30–39. [Google Scholar]
- Braun, J. Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication. In Proceedings of the 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, USA, 29–31 October 2014; pp. 510–511. [Google Scholar]
- Python Interface to OpenSSL. Available online: https://pyopenssl.org/en/stable/api.html (accessed on 26 November 2018).
- Ustun, T.S. Interoperability and interchangeability for microgrid protection systems using IEC 61850 standard. In Proceedings of the 2016 IEEE International Conference on Power and Energy (PECon), Melaka, Malaysia, 28–29 November 2016; pp. 7–12. [Google Scholar]
- Weis, B.; Rowles, S.; Hardjono, T. The Group Domain of Interpretation. Internet Engineering Task Force (IETF)—Request for Comments (RFC) No. 6407. 2011. Available online: http://www.rfc-editor.org/info/rfc6407 (accessed on 26 November 2018).[Green Version]
- Cooper, D.; Santesson, S.; Farrell, S.; Boeyen, S.; Housley, R.; Polk, W. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) profile. Network Working Group—Request for Comments (RFC) No. 5280. 2008. Available online: https://www.rfc-editor.org/info/rfc5280 (accessed on 26 November 2018).
Type of Encryption | Private Key (bytes) | CSR Size (bytes) | Certificate Size (bytes) | Certificate Verification Computational Time (ms) | |
---|---|---|---|---|---|
Algorithm | Key Size/Curve | ||||
RSA | 1024 | 891 | 745 | 1029 | 7 |
2048 | 1769 | 1147 | 1371 | 7 | |
3072 | 2459 | 1496 | 1753 | 8 | |
7680 | 5973 | 3081 | 3321 | 8 | |
15,360 | 11,823 | 5701 | 5986 | 13 | |
ECDSA | secp224r1 | 278 | 627 | 895 | 8 |
secp521r1 | 436 | 838 | 1099 | 9 | |
prime192v1 | 270 | 627 | 912 | 8 | |
prime256v1 | 302 | 619 | 839 | 7 | |
brainpoolP384r1 | 367 | 725 | 981 | 10 | |
brainpoolP512r1 | 436 | 806 | 1070 | 12 | |
brainpoolP384r1 | 367 | 741 | 985 | 10 | |
brainpoolP512r1 | 436 | 826 | 1123 | 12 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Farooq, S.M.; Hussain, S.M.S.; Kiran, S.; Ustun, T.S. Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5. Electronics 2018, 7, 370. https://doi.org/10.3390/electronics7120370
Farooq SM, Hussain SMS, Kiran S, Ustun TS. Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5. Electronics. 2018; 7(12):370. https://doi.org/10.3390/electronics7120370
Chicago/Turabian StyleFarooq, Shaik Mullapathi, S. M. Suhail Hussain, Siddavaram Kiran, and Taha Selim Ustun. 2018. "Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5" Electronics 7, no. 12: 370. https://doi.org/10.3390/electronics7120370
APA StyleFarooq, S. M., Hussain, S. M. S., Kiran, S., & Ustun, T. S. (2018). Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5. Electronics, 7(12), 370. https://doi.org/10.3390/electronics7120370