Zhang2019 A Security Scheme For Intelligent Substation Communications Considering Real-Time Performance
Zhang2019 A Security Scheme For Intelligent Substation Communications Considering Real-Time Performance
Clean Energy
https://doi.org/10.1007/s40565-019-0498-5
Abstract Tampering, forgery and theft of the measure- IEC 62351 are improved to meet the real-time require-
ment and control messages in a smart grid could cause one ments of the messages as well as to provide new security
breakdown in the power system. However, no security features to resist repudiation and replay attacks; and the
measures are employed for communications in intelligent security at transport layer is modified to fit CLPKC, which
substations. Communication services in an intelligent implements mutual authentication by exchanging signa-
substation have high demands for real-time performance, tures. Furthermore, a deployment of CLPKC in an intelli-
which must be considered when deploying security mea- gent substation is presented. We also evaluate the security
sures. This paper studies the security requirements of properties of the scheme and analyze the end-to-end delays
communication services in intelligent substations, analyzes of secured services by combining theoretical calculation
the security capabilities and shortages of IEC 62351, and and simulation in this paper. The results indicate that the
proposes a novel security scheme for intelligent substation proposed scheme meets the requirements of security and
communications. This security scheme covers internal and real-time performance of communications in intelligent
telecontrol communications, in which the real-time per- substations.
formance of each security measure is considered. In this
scheme, certificateless public key cryptography (CLPKC) Keywords Intelligent substation, Security measures,
is used to avoid the latency of certificate exchange in Certificateless public key cryptography (CLPKC), Real-
certificate-based cryptosystem and the problem of key time communication, IEC 62351
escrow in identity-based cryptosystem; the security mea-
sures of generic object-oriented substation event, sampled
measure value and manufacturing message specification in
123
Jie ZHANG et al.
123
A security scheme for intelligent substation communications considering real-time performance
substations; ` attacking the communication network or value messages, from the merging unit (MU) to the pro-
important communication messages to cause abnormalities tection and control (P&C) device, adopt the SMV protocol.
in the physical device, ultimately reaching the purpose of Control instructions and switch status messages adopt the
attacking the smart grid [14]. For the first phase, we can GOOSE protocol. These messages require high real-time
deploy physical isolation, a firewall and other measures in performance. An attacker could control the continuity of a
substations to block the attack path. Therefore, we study primary device or cause a malfunction of a primary device
the threats and security requirements of communication by tampering, forging or replaying messages, thereby
services in the scenario that attackers have successfully causing the breakdown of the primary device or the
accessed the substation’s communication network. instability of the smart grid. Stealing these messages makes
At present, intelligent substations commonly adopt the little sense. Therefore, the security requirements of the
structure of ‘‘three layers, two networks’’. The architecture above communication services include integrity, authen-
shown in Fig. 1 is a typical framework of a substation’s ticity and availability, and no confidentiality.
communication network. The data flows and their message In addition, current intelligent substations lack network
types of communication networks are presented in monitoring and log audit so that the source cannot be
Fig. 1. traced. Therefore, they are vulnerable for repudiation
The data exchanged between the substation level and the attacks. Furthermore, all services in substations could
other substation or remote control center are primarily suffer from denial of service (DoS) attacks that affect the
control instructions and original data files. The data availability of the substations’ resources.
exchanged between the substation level and bay level are In brief, the main security threats of substations are
control instructions, device status information and constant unauthorized access, forgery, theft, DoS, and repudiation.
values. Manufacturing message specification (MMS) pro-
tocol is used in the aforementioned transmission services. 2.2 Security capabilities and shortcomings of IEC
These data may be tampered or forged to disturb normal 62351
operations of substations, and the status data may be stolen
by attackers for future attacks. Therefore, it is necessary to According to Section 2.1 and IEC 62351, security
ensure their confidentiality, integrity and authenticity. threats, requirements and capabilities of IEC 62351 for
The data communications, whether within the bay level messages in substation communication networks can be
or between the bay level and process level, are carried out summarized as shown in Table 1, which shows that the
through the process level network and primarily adopt the security capabilities of IEC 62351 cannot meet the security
generic object oriented substation event (GOOSE) protocol requirements of the substations.
or sampled measure value (SMV) protocol. The sampled There are also additional shortages in IEC 62351 as
follows:
123
Jie ZHANG et al.
Table 1 Security threats, requirements and capabilities of IEC 62351 for messages in substations
Type of message Security threats Security requirements Security capabilities of IEC 62351
GOOSE/SMV Tampering, forgery, repudiation, Integrity, authenticity, non- Message authentication mechanism
DoS attack repudiation, availability
MMS Tampering, forgery, stealing, Integrity, authenticity, confidentiality, Peer entity authentication, transport-
repudiation, DoS attack non-repudiation, availability profile security
this scheme. The main contents are as shown below: the According to IEC 62351-6, the reserved fields and
security measures of GOOSE/SMV and MMS in IEC extension fields in GOOSE/SMV are used to extend the
62351 are improved in Section 3.1; the transport layer function of GOOSE/SMV messages as follows:
security (TLS) protocol is modified to fit CLPKC, and its
1) The first byte of the Reserved1 field shall be used to
handshake process of modified TLS is shown in Sec-
specify the number of octets conveyed by the exten-
tion 3.2; a deployment of CLPKC is presented in Sec-
sion octets; the Reserved2 field shall contain a 16-bit
tion 3.3. The modified TLS is for both telecontrol
cyclic redundancy check (CRC), the CRC shall be
communications and the low-speed messages of internal
calculated over octets 1–8 of the VLAN information of
communications.
the extended protocol data unit (PDU).
2) The extension shall be encoded; the authentication
3.1 Security measures for internal communications
value field shall be used to store the signature value.
of intelligent substations
3) In order to prevent a replay attack, skew filtering and
timestamp checking are proposed to distinguish cur-
The deployment of security measures for communica-
rent messages and outdated messages.
tions within a substation is shown in Fig. 2. Security
measures proposed for GOOSE/SMV can be used to pro- The security measures in IEC 62351 for GOOSE/SMV
tect the communications within the bay level and the cannot resist repudiation. Therefore, this paper proposes
communications between the bay level and process layer that the unique identification on behalf of the identity of a
(shown as the blue arrows in Fig. 2). Security measures device in a substation is added into the Reserved
proposed for MMS can be used to protect the communi- SEQUENCE field. Hence, the device cannot deny its par-
cations within the substation level and the communications ticipation in the communication. Moreover, considering the
between the substation level and bay level (shown as the real-time requirement of GOOSE/SMV messages, a hash-
red arrows in Fig. 2). based message authentication code (HMAC) algorithm is
employed to calculate the signature value instead of the
3.1.1 Security measures for GOOSE/SMV asymmetric RSA algorithm specified in IEC 62351, and the
SHA256 algorithm is employed for the hash calculation.
As discussed in Section 2.1, the security requirements of The specific authentication process of GOOSE/SMV is
GOOSE/SMV are authenticity, integrity, availability and shown in Fig. 3.
non-repudiation. Taking into account the same security
requirements of the SMV and GOOSE protocols, this paper 3.1.2 Security measures for MMS
designs the same measures to protect GOOSE/SMV
messages. MMS is an application protocol based on TCP/IP. The
security requirement of MMS includes confidentiality,
integrity, authenticity, availability and non-repudiation as
Server discussed in Section 2.1.
Substation
level Substation According to IEC 62351-4, the authenticity of MMS is
host Security measures provided by peer entity authentication that occurs at asso-
for MMS ciation set up time. The authentication is implemented
Bay Monitoring through association control service element (ACSE) secu-
level unit P&C rity as follows: enabling sender-ACES-requirements field
Security measures
for GOOSE/SMV
and responder-ACSE-requirement field of the authentica-
Process
Circuit
tion functional unit (FU) of ACSE, defining the data
level MU
break
123
A security scheme for intelligent substation communications considering real-time performance
Y
structure MMS_Authentication-value where the signature Authentication Authentication
value is stored. succeeds fails
In order to improve the security measures in IEC 62351
for MMS in terms of integrity, non-repudiation and confi- End
dentiality, this paper proposes the following security
measures. Fig. 4 Specific authentication process of MMS
To protect the integrity of MMS, this paper adopts the
method of hashing the date of MMS messages by using a Therefore, in this paper, different security measures are
hash algorithm to prevent the unauthorized modification. designed for different services of MMS messages to ensure
Considering the requirements of intelligent substations for their confidentiality after considering their real-time
security and real-time performance, we select SM3 as the requirements: low-speed messages adopt the modified TLS
hash algorithm. To resist the repudiation attack, this paper proposed in this paper; medium-speed messages adopt the
proposes adding a unique identification of the device into method of signature-then-encryption on the sending side
the MMS message. The specific authentication process of and decryption-then-authentication on the receiving side.
MMS is shown in Fig. 4. Compared with the RSA algorithm, SM2 has the advantages
IEC 62351 suggests that the confidentiality of MMS is of higher security, faster operation, and less resource con-
provided by TLS protocol but does not specify details about sumption, so we select SM2 as the algorithm of authenti-
it, and TLS has deficiencies in real time. In addition, there cation and encryption.
are different communication services of MMS messages in
intelligent substations, such as the device status message 3.2 Security measures for telecontrol
and file transfer message. The device status message is a communications
medium-speed message whereas the file transfer message is
a low-speed message. They have different requirements of The deployment of security measures for telecontrol
real-time performance for communication services. communications is shown in Fig. 5. The challenge-
123
Jie ZHANG et al.
response mechanism is adopted to protect the communi- protect telecontrol communications. In order to fit CLPKC,
cations between the two substations. The modified TLS TLS shall be modified as follows: mutual authentication is
protocol, which achieves mutual authentication by completed by exchanging the signature instead of using
exchanging signatures instead of digital certifications, is digital certification, so as to avoid the impact of certificate
used to protect the communications between the substation exchange on real-time performance of the
and remote control center. communication.
Depicted in Fig. 7, the handshake of our modified TLS
3.2.1 Challenge-response mechanism consists of the following three steps:
Step 1: Start handshake.
Challenge-response provides the authentication for the
1) Client sends ClientHello message to server, which
application layer. According to IEC 62351-5, the role of a
contains version, random value a, session_id, and
substation can be a challenger or a responder for one inter-
cipher_suites, etc.
station communication connection. When inter-station
2) Server responds client with ServerHello message,
operations are associated with specific application service
which specifies negotiated parameters and contains
data units (ASDUs) that the challenger considers to be
random value b.
protected, the challenge-response authentication mecha-
nism based on HMAC will be used. The authentication Step 2: Implement mutual authentication between server
process is shown in Fig. 6. and client.
1) Server selects a random plaintext M, and the signature
3.2.2 Modifications to TLS
S = Sig(Ssk, Hash(M)) is calculated with the private
key (Ssk) of server. Then, server sends M and S to
Both of the communications between two substations
client by ServerAuthenicate message.
and the communications between a substation and remote
2) Server sends AuthenticateRequest message to client to
control center primarily use TCP/IP. TLS can be used to
request authenticating the identity of client.
3) Client calculates H = Ver(S, Spk) with the server’s
public key (Spk) and judges whether the identity of
Remote control center server is legal by comparing H with Hash(M). Then,
client calculates S0 = Sig(Csk, Hash(M)) with the
Host Services
Communications with client’s private key (Csk) and sends S0 to server.
TLS security measures 4) Server calculates H0 = Ver(S0 , Cpk) with the client’s
SDH public key (Cpk) to verifies the identity of client.
Communications with
challenge-response
mechanism
Step 3: Negotiate session key and finish handshake.
Gateway
1) Client generates a random number Npm and generates
Substation A Substation B
session key SK with a, b, and Npm. Then,
Fig. 5 Deployment of security measures for telecontrol
communications
ClientHello
Client Server
ServerHello
Responder Challenger
S=Sig(Ssk, Hash(M))
Non-critical ASDU SeverAuthenticate
H=Ver(S, S pk)
Execute Judge whether Ver(S, S pk) AuthenticateRequest
Standard protocol response
equals Hash(M)
Critical ASDU S'=Sig(Csk, Hash(M)) ClientAuthenticate
H'=Ver(S', C pk)
SK=Fuc(a, b, N pm)
Authentication challenge Judge whether Ver(S',
E=Encrypt (Spk, N pm)
(HMAC+random data) Cpk) equals Hash(M)
ClientKeyExchange Npm=Decrypt (Ssk, E)
Authentication response ChangeCipherSpec SK=Fuc(a, b, Npm)
(Authentication value) Authentication
execute ChangeCipherSpec
Standard protocol response
Finished
Fig. 6 Process of challenge-response authentication Fig. 7 Handshake process of modified TLS protocol
123
A security scheme for intelligent substation communications considering real-time performance
E = Encrypt(Spk, Npm) is calculated and sent to the Step 1: The upper KGC generates public parameters
server, where Encrypt() is the encryption function. (spk) and master key (smk) randomly for every
2) Server decrypts E by using the decryption fuction substation.
Decrypt() to obtain Npm = Decrypt(Ssk, E), and then, Step 2: When a device applies for key, the underlying
server calculates the session key SK with a, b and Npm KGC in the substation generate part private key (dID) and
using the function Fuc(). partial public key (pID) with spk, smk and device’s identifier
3) Client and server verify the handshake channel, if ID, and sends dID and pID to the device through the secure
success, both sides exchange communication data by channel.
SK. Then, they indicate that they have switched to Step 3: The device generate a secret value (xID) with spk
encryption mode by ChangeCipherSpec message and and ID, and generate a public key (pkID) with spk, pID and
finish the handshake through Finished message. xID. Then the device publishes pkID out in the substation.
Step 4: Taking spk, dID and xID as input, the device
To ensure the security of the communication process,
generate the private key (skID).
this paper suggests SM2 as the signature algorithm for
The security process based on this deployment of
authentication and the encryption algorithm for encrypting
CLPKC in substation is shown in Fig. 8.
the session key. The advanced encryption standard (AES)
algorithm is used to encrypt the session data, and the
3.3.2 Key updating method
SHA256 algorithm is used to calculate the message
digest.
To ensure the availability of the public key in a certain
period, the traditional public key cryptography binds the
3.3 Scheme of key management
user to the public key by certification authority (CA) cer-
tification, and the cryptographic key of the user is bound to
PKI has been widely used in large-scale public net-
their identification information in the CLPKC. In order to
works, but the certificate management for enormous
complete the key management scheme, this paper considers
intelligent electronic devices (IEDs) in substations and the
the characteristics of substation communications and
exchange of certificates would result in huge communica-
chooses the method in [20] for the key update. The preset
tions costs. The research on IBC is still undergoing and the
time validity shall be attached to the user’s identity to
revocation and escrow of keys are unsolved in IBC.
achieve the update and revocation of the key. For example,
Therefore, considering the characteristics of communica-
if the public key of device A in a substation is (A_Identity,
tions in smart substations and the requirements of messages
spk) || current-day, it means that A needs to update its key
for real-time performance, this paper proposes employing
every day, otherwise the key will automatically expire. One
CLPKC in substations and presents a method of key update
could potentially make this approach more granular by
based on time validity.
changing the preset time validity. The shorter the time
validity is, the higher the frequent update will be, and the
3.3.1 Deployment of CLPKC in substation
more secure the cryptographic key will be. But frequent
updates of cryptographic keys will increase communication
In CLPKC, the generation of the user’s public key is not
latency. Therefore, the update frequency requires consid-
completely based on its identity information, and the key
eration of the real-time requirements of various commu-
generation center (KGC) does not know the user’s whole
nication messages in practice. On the premise of satisfying
private key. CLPKC does not require manage certificates
the real-time performance of the communication, the fre-
and therefore effectively solves the key escrow problem. At
quency of the key update increases. This will be considered
present, there are various models of CLPKC [15–19].
in a future work.
Considering the characteristics of substation communica-
tions, after comparing the existing CLPKC models, this
3.4 Scheme security analysis
paper chooses the model in [18] for the scheme and a
deployment in a substation system based on the following
Security of the proposed scheme is analyzed from the
proposal.
following two aspects.
In this scheme, KGC uses a centralized-distributed
architecture, which should be first established in the power
3.4.1 Security of measures
system. The detailed process of a device obtaining a pair of
public keys and private keys consists of the following four
1) Integrity and authenticity: in this scheme, the
steps.
AuthenticationValue filed in the GOOSE/SMV mes-
sage is enabled with signature authentication based on
123
Jie ZHANG et al.
smk Key generation center smk of messages to ensure that the device cannot deny its
spk (spk, smk) spk participation in the communication, which effectively
ID_B ID_B resists a repudiation attack.
4) Immunity against replay: skew filtering and timestamp
Partial public key Partial private key checking are used to distinguish the current packages
of B (pID) of B (dID) and outdated packages, which effectively prevent a
pID dID replay attack.
Public key of B xID Secret value xID Private key of B
(pkID) (xID) (skID)
pkID
3.4.2 Security of key management
skID
Ciphertext C
Encryption Decryption Considering the disadvantages of PKI and IBC, we
Equipment A Equipment B propose employing CLPKC in substations. As an important
(a) Encryption and decryption part of the security scheme, the security of the key man-
agement is crucial. In the idea of security for CLPKC, there
smk smk are two types of adversaries, type I and type II. The
Key generation center
spk (spk, smk) spk type I adversary AI does not have access to the master key
ID_A
ID_A but it may replace the public key of arbitrary identities with
values of its own choice, whereas the type II adversary AII
Partial private key Partial public key
of A (dID) of A (pID)
does have access to the master key but may not replace the
public keys of entities. In the deployment of CLPKC in
dID pID
substations in this paper, the private key is not only related
Private key of A xID xID xID
Secret value Public key of A to a secret value but also to a partial private key obtained
(skID) (xID) ( pkID)
from the KGC, and the secret value is not transmitted
skID pkID through the channel. It is secure against type I and
Signature Authentication type II adversaries in a strong sense, provided that the
Plaintext and computational Diffie-Hellman problem is intractable and
Equipment A signature Equipment B the underlying hash functions are the random oracles [17].
(b) Signature and authentication
the HMAC algorithm to ensure the integrity and 4.1 Composition of communication delay
authenticity of GOOSE/SMV messages, which pre-
vents the data from being tampered or forged during The end-to-end delay of a message across the secured
the transmission. Furthermore, we define the data network with the proposed security measures primarily
structure of the Authentication value of MMS and includes the following four parts, as shown in Fig. 9.
adopt peer entity authentication based on the SM2 1) Generating delay (TG) and parsing delay (TP): the time
algorithm to verify the integrity and authenticity of that the sender generates and encapsulates the message
MMS messages. The method of hashing the date of from application layer to physical layer, and the time
MMS messages by the SM3 algorithm can prevent an that the receiver parses and extracts the message from
unauthorized modification. By this way, attackers physical layer to application layer.
cannot arbitrarily tamper or forge messages. 2) Delay of security operations (TE): the computing time
2) Confidentiality: in the scheme, as for different types of of security measures and the delay of transmissions
MMS messages, different measures are designed to between the security chip and master CPU.
ensure the confidentiality of message transmissions. 3) Sending delay (TS) and receiving delay (TR): the time
Modified TLS protocol is adopted to ensure the that the sender sends all of the packet’s bits into the
confidentiality of low-speed messages, whereas med- wire and the time that the receiver receives all of the
ium-speed messages adopt the encryption algorithm to packet’s bits from the wire, which is defined the same
ensure their confidentiality. These measures can as usual. This is the delay caused by the data rate of
effectively prevent data from being stolen. the link.
3) Non-repudiation: the unique identification of the 4) Link transmission delay (TL): the amount of the
sender is carried in the Reserved SEQUENCE field propagation delay on the links and the processing
123
A security scheme for intelligent substation communications considering real-time performance
Encryption 112 – 9 – –
Decryption 119 – 7 – –
Signature 285 – – – 7812
Authentication 101 – – – 14705
Digest calculation – 6 – 4 –
123
Jie ZHANG et al.
123
A security scheme for intelligent substation communications considering real-time performance
123
Jie ZHANG et al.
Table 5 Comparison of security operations between existing work and this paper in real-time performance
Source Security operations
GOOSE/SMV MMS TLS
[5] 2E ? 2D ? 2N – –
[6] 2HSM3 ? SSM2 ? VSM2 ? 2C – –
[7] – – 2SSM2 ? 2VSM2 ? 2C ? ERSA
? DRSA ? ESM4 ? DSM4 ? 4HSM3
[8] ERSA ? DRSA ? EDES ? DDES – –
This paper 2HSM3 ? SHMAC ? DHMAC SSM2 ? VSM2 ? ESM2 ? DSM2 2HSM3 ? 2SSM2 ? 2VSM2 ? ESM2
? DSM2 ? EASE ? DASE ? 2H256
123
A security scheme for intelligent substation communications considering real-time performance
real-time performance under the same computing [7] Luo Z, Xie JH, GU W et al (2015) Application of SM2
performance. encrypted system in smart substation inner communication.
Autom Electr Power Syst 39(13):116–123
[8] Zhao L, Yan T, ZHU JP et al (2016) Application of SM2
encrypted system in telecontrol communication for smart sub-
5 Conclusion station. Autom Electr Power Syst 40(19):127–133
[9] Wang FF, Wang HZ, Chen DQ et al (2014) Substation com-
munication security research based on hybrid encryption of DES
It is urgent to deploy security measures for intelligent and RSA. In: Proceedings of 9th international conference on
substation communications. For this reason, the IEC has intelligent information hiding and multimedia signal processing,
developed IEC 62351, but it has shortcomings for real-time Beijing, China, 16–18 October 2014, pp 437–441
performance and security capability, and offers no solution [10] Suhendray V, Wu YD, Saputra H et al (2016) Lightweight key
management protocols for smart grids. In: Proceedings of IEEE
for the management of keys and certificates. In this paper, a international conference on internet of things, Chengdu, China,
new security scheme including security measures and a key 15–18 December 2016, pp 345–348
management method is proposed for smart substations, [11] He XZ, Pun MO, Jay Kuo CC (2012) Secure and efficient
which not only meets the security demands but also satis- cryptosystem for smart grid using homomorphic encryption. In:
Proceedings of IEEE power and energy society innovative smart
fies the real-time requirements of the communications. grid technologies, Washington DC, USA, 16–20 January 2012,
Considering the characteristics of a power system, we pp 1–8
innovatively propose to employ CLPKC in an intelligent [12] Nicanfar H, Jokar P, Beznosov K et al (2014) Efficient
substation. This work provides a practical solution for authentication and key management mechanisms for smart grid
communications. IEEE Syst J 8(2):629–640
securing the communications in intelligent substations and [13] Fuloria S, Anderson R, Mcgrath K et al (2010) The protection of
can be a reference for a revision of IEC 62351. substation communications. http://101.96.10.42/pdfs.
semanticscholar.org/5970/
Acknowledgements This work is supported by the National Key 094d87e87f94e73494523116ba24cfcec584.pdf. Accessed 2
Research and Development Program of China (No. May 2016
2017YFB0903000), the National Natural Science Foundation of [14] Cui XH (2016) Research on the security of message and its real-
China (No. 51377122) and the project of State Grid Corporation of time in smart substation. Dissertation, Harbin Institute of
China (Research on Cooperative Situation Awareness and Active Technology
Defense Method of Cyber Physical Power System for Cyber Attack). [15] Al-Riyami SS, Paterson KG (2003) Certificateless public key
cryptography. In: Laih CS (ed) Advances in cryptology:
Open Access This article is distributed under the terms of the ASIACRYPT 2003. Springer, Heidelberg, pp 452–473
Creative Commons Attribution 4.0 International License (http:// [16] Dent AW (2008) A survey of certificateless encryption schemes
creativecommons.org/licenses/by/4.0/), which permits unrestricted and security models. Int J Info Secur 7(5):349–377
use, distribution, and reproduction in any medium, provided you give [17] Baek J, Safavi-Naini R, Susilo W (2005) Certificateless public
appropriate credit to the original author(s) and the source, provide a key encryption without pairing. In: Zhou J, Lopez J, Deng RH
link to the Creative Commons license, and indicate if changes were et al (eds) Information security, vol 3650. Springer, Heidelberg,
made. pp 134–148
[18] Sun YX, Zhang FT, Baek J (2007) Strongly secure certificate-
less public key encryption without pairing. In: Bao F, Ling S,
Okamoto T et al (eds) Cryptology and network security, vol
4856. Springer, Heidelberg, pp 194–208
References [19] Zhang FT, Sun YX, Zhang L et al (2011) Research on certifi-
cateless public key cryptography. J Softw 22(6):1316–1332
[1] Cleveland F (2006) IEC TC57 security standards for the power [20] Boneh D, Franklin M (2001) Identity-based encryption from the
system’s information infrastructure. In: Proceedings of IEEE Weil pairing. In: Kilian J (ed) Advances in cryptology:
PES transmission and distribution conference and exhibition, CRYPTO 2001, vol 2139. Springer, Heidelberg, pp 213–229
Dallas, USA, 21–24 May 2006, pp 1079–1087 [21] Zhang Z, Huang X, Cao Y et al (2011) Comprehensive data flow
[2] Tong XY, Wang XR (2016) Inference and countermeasure analysis and communication network simulation for virtual local
presupposition of network attack in incident on Ukrainian power area network-based substation. Power Syst Technol
grid. Autom Electr Power Syst 40(7):144–148 35(5):204–209
[3] IEC 62351 (2005) Data and communications security [22] IEC 61850-5 (2003) Communication network and systems in
[4] Strobel M, Wiedermann N, Eckert C (2016) Novel weaknesses substations—part 5: communication requirements for function
in IEC 62351 protected smart grid control systems. In: Pro- and device models
ceedings of IEEE international conference on smart grid com- [23] Zhan Y (2017) The comparison of RSA and ECC. https://blog.
munications, Sydney, Australia, 6–9 November 2016, csdn.net/u010646653/article/details/73888734,2017-06-29.
pp 266–270 Accessed 28 December 2017
[5] Wang B, Wang M, Zhang S (2013) A secure message trans-
mission method based on GCM for smart substation. Autom
Electr Power Syst 37(3):87–92 Jie ZHANG received the B.S. degree in computer science and
[6] Li L, Zhu Y (2009) Authentication scheme for substation technology from Shandong University, China. She is currently
information security based on chaotic theory. In: Proceedings of pursuing her master’s degree in Wuhan University, China. Her
2009 Asia-Pacific power and energy engineering conference, research interest is communication security for power systems.
Wuhan, China, 28–31 March 2009, pp 1–3
123
Jie ZHANG et al.
Jun’e LI is a professor in Key Laboratory of Aerospace Information Ming NI is a principal expert for grid planning and the national
Security and Trusted Computing, Ministry of Education, School of experts of Thousand Talents Plan. His research interests include
Cyber Science and Engineering, Wuhan University, China. Her power system planning and power cyber-physical systems.
research interests include computer network architecture, cyber
security, and the security of cyber-physical systems. Ting WANG is currently pursuing her master’s degree in Wuhan
University. Her research interest is communication security for power
Xiong CHEN is an engineer in NARI Group Corporation/State Grid systems.
Electric Power Research Institute. His research interests include
safety and stability control of power system. Jianbo LUO is a senior engineer in NARI Group Corporation/State
Grid Electric Power Research Institute. His research interests include
safety and stability control of power system.
123