Computer Science ›› 2013, Vol. 40 ›› Issue (11): 81-84.

Previous Articles     Next Articles

Security Protocol Based on IEC60870-5-104for Communication in Distribution Automation

MA Jun and ZHANG Yi-bin   

  • Online:2018-11-16 Published:2018-11-16

Abstract: It has been found that there are some cyber security risks in the communication process of distribution automation system(DAS)based on IEC60870-5-104protocol.In order to realize mutual authentication and shared key establishment for DAS Front-End Processor(FEP)and any terminal,this article presented a scheme based on unidirectional digital signature and unidirectional Keyed-Hashing for Message Authentication(HMAC)algorithm.It analyzed the features of communication network architecture based on EPON in DAS,the corresponding cyber security risks and security requirements,showed the implementation procedure of the scheme.The scheme needs not change original software and hardware of legacy terminals and considers resource-constraint terminals by using dedicated security devices.Security analysis proves that the scheme can resist outsider attack,replay attack and impersonation attack.Compared with the related works,the proposed scheme is more secure and practical,which can satisfy the application requirement.

Key words: Distribution automation,Cyber security,IEC60870-5-104protocol,Digital signature,HMAC algorithm

[1] IEC TS 62351-1,IEC Technical Committee 57,Data and Communications Security,Part1:Communication Network and System Security-Introduction to Security Issues[S].2007
[2] IEC TS 62351-5,IEC Technical Committee 57,Data and Communications Security,Part5:Security for IEC 60870-5and derivatives[S].2009
[3] Ma Jun,She Jun.Research on Cyber Security Segre-gation for Industrial Control Systems[J].International Journal of Digital Content Technology and its Applications,2011,5(8):9-15
[4] Igure V M,Laughter S A,Williams R D.Security issues in SCADA networks [J].Computers and Security,2006,25(7):498-506
[5] III B C L,Buennemeyer T K ,Thomas R W.Next generation SCADA security:best practices and client puzzles[C]∥Proc.6th Annual.IEEE System,Information Assurance Workshop.2005:426-427
[6] Lim I H,Hong S,Lee S J,et al.Security Protocols Against cyber attacks in the distribution automation system[J].IEEE Transactions on Power Delivery,2010,25(1):448-454
[7] 黄梦婕,胥布工.基于HMAC算法的远程电力监控通信安全策略[J].电力系统保护与控制,2011,39(19):79-82
[8] Kim M,Metzner J J.A key exchange method for intelligent electronic devices in distribution automation[J].IEEE Transactions on Power Delivery,2010,25(3):1458-1463
[9] 孙中伟,张荣刚.智能配电网通信系统访问控制研究[J].电力系统保护与控制,2010,38(21):118-121
[10] Sun Zhong-wei,Wu Ju-ying.Identity-based access con-trol for distribution automation using EPON[J].Chinese Journal of Electronics,2011,0(3):443-446
[11] Hirschler B,Treytl A.Internet Protocol Security and PowerLine Communication[C]∥2012IEEE International Symposium on Power Line Communication and its Applications.2012:102-107
[12] Yan Ye,Hu R Q,Das S K,et al.An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid [J].IEEE Network,2013,7(4):64-71

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!