Analysis of Time Characteristics of MMS Protocol Transmission in Intelligent Substation

  • Wenting WangEmail author
  • Qiang Ma
  • Yong Liu
  • Lin Lin
  • Ti Guan
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 156)


With the rapid cross-integration of industrialization and informatization, industrial network security issues are becoming more and more serious. In this paper, the time characteristics of MMS protocol transmission in intelligent substation are analyzed according to the security scenario of intelligent substation system, and the time characteristics of MMS protocol transmission are analyzed with the methods of Fourier transform and wavelet transform. Through analysis, a method of establishing the baseline of message transmission time characteristics can be obtained, which can be used to detect the anomalies in the intelligent substation system network.


Intelligent substation MMS protocol Fourier transform Wavelet transform 



This work was supported by “Research on Lightweight Active Immune Technology for Electric Power Supervisory Control System”, a science and technology project of State Grid Co., Ltd in 2019.


  1. 1.
    Ralston, P.A.S., Garham, J.H., Hieb, J.L.: Cyber security risk assessment for SCADA and DCS networks. ISA Trans. 46(4), 583–594 (2007)CrossRefGoogle Scholar
  2. 2.
    Keith, S., Joe, F., Karen, S.: Guide to industrial control systems (ICS) security. Natl. Inst. Stand. Technol. (2011)Google Scholar
  3. 3.
    Garcia, T.P., Diaz, V.J., Macia, F.G.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18–28 (2009)CrossRefGoogle Scholar
  4. 4.
    National Infrastructure Plan. Department of Homeland Security, Washington DC, USA (2009)Google Scholar
  5. 5.
    Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems. GAO-04-3 54. General Accounting Office (GAO), Washington DC, USA (2004)Google Scholar
  6. 6.
    Brandle, M., Naedele, M.: Security for process control systems: an overview. IEEE Secur. Priv. 6(6), 24–29 (2008)CrossRefGoogle Scholar
  7. 7.
    International Electrotechnical Commission.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Wenting Wang
    • 1
    Email author
  • Qiang Ma
    • 2
  • Yong Liu
    • 2
  • Lin Lin
    • 2
  • Ti Guan
    • 2
  1. 1.State Grid Shandong Electric Power Research InstituteJinanChina
  2. 2.State Grid Shandong Electric Power CompanyJinanChina

Personalised recommendations