BEZBEDNOSNI ASPEKTI TELEZAŠTITNIH UREĐAJA U OKVIRU RADA PO STANDARDU IEC 61850

CIGRE 35 (2021) (str. 1261-1268) 

AUTOR(I) / AUTHOR(S): Milenko Kabović, Anka Kabović, Slavica Boštjančič – Rakas, Valentina Timčenko, Jovanka Gajica

E-ADRESA / E-MAIL: milenko.kabovic@pupin.rs

Download Full Pdf   

DOI: 10.46793/CIGRE35.1261K

SAŽETAK / ABSTRACT:

    U ovom radu se razmatra sajber bezbednost telezaštitnih uređaja koji rade po IEC 61850 standardu, a prenos komandi zaštite vrši se GOOSE protokolom. Predstavljena je arhitektura centralne procesorske jedinice telezaštitnog uređaja i dat je kratak osvrt na standard IEC 61850 kao i na osnovne karakteristike GOOSE poruka. Opisani su bezbednosni aspekti telezaštitnog uređaja, kao i mogući napadi na GOOSE protokol. Na kraju su opisani standardi IEC 62351 i IEEE 1686, koji su namenjeni unapređenju bezbednosti u sistemima automatizacije u okviru elektroenergetskog sistema i uspostavljanju osnovnih sigurnosnih zahteva i karakteristika inteligentnih elektronskih uređaja, kao što je opisani telezaštitni uređaj.

KLJUČNE REČI / KEYWORDS:

GOOSEporuke,IEC61850,IEC62351,bezbednost,telezaštita

LITERATURA / REFERENCES:

  • UseofIEC61850forthecommunicationbetweensubstations,61850901/DTR,International ElectrotechnicalCommission.
  • S.M. Blair, F. Coffele, C.D. Booth, B. De Vaclk, D. Verhulst, ′′Demonstration and analysis of IP/MPLS communications for delivering power system protection solutions using IEEE C37.94, IEC 61850 Sampled Values,and IEC61850 GOOSEprotocols′′,2014 CIGRESession,August2018,B5111(18).
  • E. Kush,N., Ahmed, E., Branagan,M. and Foo,′′Poisoned GOOSE: Exploiting the GOOSE Protocol′′, Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014), 2014, vol. 149, pp. 1722.
  • P. E. Weerathunga, A. Ciora, ′′Securing IEDs against Cyber Threats in Critical Substation Automation and IndustrialControlSystems′′,Proceedingsofthe201770thAnnualConferenceforProtectiveRelay Engineers(CPRE), April2017, CollegeStation, TX, USA,pp. 120.
  • CommunicationNetworksandSystemsforPowerUtilityAutomation,2nded.,StandardIEC61850, InternationalElectrotechnicalCommission, 2021.
  • J.Hoyos,M.Dehus,T.X.Brown,′′ExploitingtheGOOSEProtocol:APracticalAttackonCyberinfrastructure′′,GC’12Workshop:SmartGrid Communications:Design forPerformance,pp.15081513.
  • IEC 623516, Power systems management and associated information exchangePart 6: Security for IEC 61850,Edition1.0,InternationalElectrotechnicalCommission, Geneva, Switzerland, 2020.
  • IEC publication 6185081: Specific Communication Service Mapping (SCSM)Mappings to MMS (ISO 95061 andISO95062) andtoISO/IEC88023,2004.
  • S. M. S. Hussain, T. S. Ustun and A. Kalam, „AReview of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges“, Proceedings of the IEEE Transactions on Industrial Informatics, vol. 16, no. 9, pp. 56435654,September2020.
  • IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities, IEEE Std 1686TM2013, IEEEPowerandEnergySociety, December2013.
  • M. Rodríguez et al. „A FixedLatency Architecture to Secure GOOSE and Sampled Value Messages in SubstationSystems“,IEEE Access, vol. 9, 2021,pp.5164651658.
  • R. Schlegel, S. Obermeier, J. Schneider, „A security evaluation of IEC 62351“,Journal of Information SecurityandApplications,vol. 34,June 2017,pp.197204.
  • G. Elbez, H. B. Keller, V. Hagenmeyer, „Authentication of GOOSE Messages under Timing Constraints in IEC 61850 Substations“,Proceedings of the 6thInternational Symposium for ICS & SCADA Cyber Security Research 2019,September2019, pp. 137143.
  • S. M. Suhail Hussain, S. Mullapathi Farooq, T. Selim Ustun, „Analysis and Implementation of Message Authentication Code (MAC) Algorithmsfor GOOSE Message Security“,IEEE Access, vol, 7, 2019, pp. 8098080984