Advanced SearchSearch Tips
Optimized Security Algorithm for IEC 61850 based Power Utility System
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Optimized Security Algorithm for IEC 61850 based Power Utility System
Yang, Hyo-Sik; Kim, Sang-Sig; Jang, Hyuk-Soo;
  PDF(new window)
As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.
IEC 61850;Network performance;Performance analysis;Security;Smart grid;
 Cited by
GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발,김형동;김기현;하재철;

정보보호학회논문지, 2013. vol.23. 6, pp.1181-1190 crossref(new window)
Extended Dual Virtual Paths Algorithm Considering the Timing Requirements of IEC61850 Substation Message Types, IEICE Transactions on Information and Systems, 2016, E99.D, 6, 1563  crossref(new windwow)
Development of Intrusion Detection System for GOOSE Protocol Based on the Snort, Journal of the Korea Institute of Information Security and Cryptology, 2013, 23, 6, 1181  crossref(new windwow)
Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids, International Journal of Distributed Sensor Networks, 2016, 2016, 1  crossref(new windwow)
E. Santacana, G. Rackliffe, T. Tang, and F. Xiaoming, "Getting Smart," IEEE Power and Energy Magazine, vol. 8, no. 2, pp. 41-48, Mar. 2010. crossref(new window)

G. N. S. Prasanna, A. Lakshmi, S. Sumanth, V. Simha, J. Bapat, and G. Koomullil, "Data Communication over the Smart Grid," in Proc. of IEEE Int. Sump. Power Line Communications and Its Applications, Apr. 2009, pp. 273-279.

S. M. Amin and B. F. Wollenberg, "Toward a Smart Grid: Power Delivery for 21st Century," IEEE Power and Energy Magazine, vol. 3, no. 5, pp. 34-41, Sept. 2005.

S.-J. Rim, S.-W. Zeng, and S.-J. Lee, "Development of an Intelligent Station HMI in IEC 61850 Based Substation," Journal of Electrical Engineering & Technology, vol. 4, no. 1, pp. 13-18, 2009. crossref(new window)

IEC 61850, Communication Networks and System in Substation Automation, IEC Std., 2002-2005, available at

B. K. Yoo, S. H. Yang, H. S. Yang, W. Y. Kim, Y. S. Jeong, B. M. Han, K. S. Jang, "Communication Architecture of IEC 61850 based Micro Grid System," Journal of Electrical Engineering & Technology, vol. 6, no. 5, pp. 605-612, 2011 crossref(new window)

J.-H. Jeon, S.-K. Kim, C.-H. Cho, J.-B. Ahn, and E.-S. Kim, "Development of Simulator Systems for Microgrids with Renewable Energy Sources," Journal of Electrical Engineering & Technology, vol. 1, no. 4, pp. 409-413, 2006. crossref(new window)

F. Cleveland, "IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption," in Proc. of IEEE Transmission and Distribution Conf. and Exhib., May 2006, pp. 1079-1087.

A. R. Metke and R. L. Ekl, "Security Technology for Smart Grid Networks," IEEE Trans. on Smart Grid, vol. 1, no. 1, pp. 99-107, 2010. crossref(new window)

G. N. Erricsson, "Cyber Security and Power System Communication-Essential Parts of a Smart Grid Infrastructure," IEEE Trans. on Power Delivery, vol. 25, no. 3, pp. 1501-1507, Apr. 2010. crossref(new window)

H. Khurana, M. Hadley, L. Ning, and D. Frincke, "Smart-Grid Security Issues," IEEE Security and Privacy, vol. 8, no. 1, pp. 81-85, Feb. 2010. crossref(new window)

P. McDaniel and S. McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security and Privacy, vol. 7, no. 3, pp. 75-77, June 2009.

K. Moslehi and R. Kumar, "A Reliability Perspective of the Smart Grid," IEEE Trans. on Smart Grid, vol. 1, no. 1, pp. 57-64, May 2010 crossref(new window)

IEC 62351, Power Systems Management and Associated Information Exchange - Data Communications Security, IEC Std., 2007-2010, available at

S. Fries, H. J. Hof, and M. Seewald, "Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments," in Proc. of Int. Conf. on Internet and Web App., pp. 135-142, 2010.

H. K. Kim, S.-H. Kang, S.-R. Nam, and S.-S. Oh, "Improved Operating Scheme using an IEC 61850- based Distance Relay for Transformer Backup Protection,'' in Proc. of IEEE Bucharest Power Tech., pp. 1-6, 2010.

Cyber security working group, NIST, Smart Grid Interoperability Panel - "Cyber Security Working Group Standards Review,'' pp. 52-54, phase 1 Report, 2010

T. Skiei, S. Johannessen, and C. Brunner, "Ethernet in Substation Automation," IEEE Control Systems Mag., pp. 43-51, June 2002.

T. S. Sidhu and Y. Yin, "Modeling and simulation for performance evaluation of IEC61850-based substation communication systems," IEEE Trans. on Power Delivery, pp. 1482-1489, July 2007.

H. S. Yang and et. al., "Gigabit Ethernet based substation," Jourl. of Power Electronics, pp. 100-108, Jan. 2009.

S. G. Stubblebine and V. D. Gligor, "On Message Integrity in Cryptographic Protocols," in Proc. of IEEE Computer Society Sym. on Research in security and Privacy, 1992, pp. 85-104.

B. D. Boer and A. Bosselaers, "An Attack in the Last Two Rounds of MD4," Lecture Notes in Computer Science, vol. 576, pp. 194-203, 1992.

H. Dobbertin, "Cryptanalysis of MD4," Lecture Notes in Computer Science, vol. 1039, pp. 53-69, 1996.