Skip to main content

Network Security for Substation Automation Systems

  • Conference paper
  • First Online:
Computer Safety, Reliability and Security (SAFECOMP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2187))

Included in the following conference series:

Abstract

The protection of critical infrastructure against electronic and communication network based attacks becomes more and more important. This work investigates the threat of network-based attacks on substations, the nodes of the electric power grid. Three fundamental types of attacks are derived and a secure communication protocol is proposed to counter these attacks by reducing them to a failure mode that can be dealt with similar to other, non-malicious subsystem failures by safety mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brett Chappell, David Marlowe, Philip Irey, and Karen O’Donoghue. IP security impact on system performance in a distributed real-time environment. 1999.

    Google Scholar 

  2. CIAO. Practices for securing critical information assets. Technical report, US Critical Infrastructure Assurance Office, Jan 2000.

    Google Scholar 

  3. Niels Ferguson and Bruce Schneier. A cryptographic evaluation of IPsec. http://www.counterpane.com/ipsec.html, 2000.

  4. IEC-TC57-WG10/11/12. IEC61850 communication networks and systems in substations. IEC61850-1..10, Working Draft, http://www.iec.ch, 1999.

  5. IEEE-USA. Legislative agenda for the 107th congress. http://www.ieeeusa.org/forum/AGENDA/index.html, 2000.

  6. S. Kent and R. Atkinson. IP authentication header. RFC 2402, Nov 1998.

    Google Scholar 

  7. S. Kent and R. Atkinson. IP encapsulating security payload (esp). RFC 2406, Nov 1998.

    Google Scholar 

  8. S. Kent and R. Atkinson. Security architecture for the internet protocol. RFC 2401, Nov 1998.

    Google Scholar 

  9. Information Assurance Task Force National Security Telecommunications Advisory Committee. Electric power risk assessment. http://www.ncs.gov/n5 hp/reports/EPRA/electric.htm, Mar 1997.

  10. Paul Oman, Edmund Schweitzer, and Deborah Frincke. Concerns about intrusions into remotely accessible substation controllers and scada systems. Technical report, Schweitzer Engineering Laboratories, 2000.

    Google Scholar 

  11. Peter Palensky and Thilo Sauter. Security considerations for FAN-Internet connections. In proceedings 2000 IEEE International Workshop on Factory Communication Systems, 2000.

    Google Scholar 

  12. Ray Pospisil. The next Y2K? Utilities IT, Jan/Feb 2000.

    Google Scholar 

  13. Bruce Schneier. Applied Cryptography. Wiley, 2nd edition, 1996.

    Google Scholar 

  14. Bruce Schneier. Secrets and Lies-Digital Security in a Networked World. Wiley, 2000.

    Google Scholar 

  15. Jim Wolf. U.S. draws attention to information warfare threat. http://www.securitywatch.com/newsforward/default.asp?AID=5293, 2000.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naedele, M., Dzung, D., Stanimirov, M. (2001). Network Security for Substation Automation Systems. In: Voges, U. (eds) Computer Safety, Reliability and Security. SAFECOMP 2001. Lecture Notes in Computer Science, vol 2187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45416-0_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-45416-0_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42607-3

  • Online ISBN: 978-3-540-45416-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics