A review of security attacks on IEC61850 substation automation system network

Muhammad Talha Abdul Rashid, Salman Yussof, Yunus Yusoff, Roslan Ismail

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.

Original languageEnglish
Title of host publicationConference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN
Subtitle of host publicationCultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5-10
Number of pages6
ISBN (Electronic)9781479954230
DOIs
Publication statusPublished - 23 Mar 2015
Event6th International Conference on Information Technology and Multimedia, ICIMU 2014 - Putrajaya, Malaysia
Duration: 18 Nov 201420 Nov 2014

Other

Other6th International Conference on Information Technology and Multimedia, ICIMU 2014
CountryMalaysia
CityPutrajaya
Period18/11/1420/11/14

Fingerprint

Network security
Intrusion detection
Cryptography
Automation
Industry

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Software

Cite this

Rashid, M. T. A., Yussof, S., Yusoff, Y., & Ismail, R. (2015). A review of security attacks on IEC61850 substation automation system network. In Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN: Cultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014 (pp. 5-10). [7066594] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIMU.2014.7066594
Rashid, Muhammad Talha Abdul ; Yussof, Salman ; Yusoff, Yunus ; Ismail, Roslan. / A review of security attacks on IEC61850 substation automation system network. Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN: Cultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 5-10
@inproceedings{2abec90b7dfe4d82acf38a62864e83e3,
title = "A review of security attacks on IEC61850 substation automation system network",
abstract = "Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.",
author = "Rashid, {Muhammad Talha Abdul} and Salman Yussof and Yunus Yusoff and Roslan Ismail",
year = "2015",
month = "3",
day = "23",
doi = "10.1109/ICIMU.2014.7066594",
language = "English",
pages = "5--10",
booktitle = "Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Rashid, MTA, Yussof, S, Yusoff, Y & Ismail, R 2015, A review of security attacks on IEC61850 substation automation system network. in Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN: Cultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014., 7066594, Institute of Electrical and Electronics Engineers Inc., pp. 5-10, 6th International Conference on Information Technology and Multimedia, ICIMU 2014, Putrajaya, Malaysia, 18/11/14. https://doi.org/10.1109/ICIMU.2014.7066594

A review of security attacks on IEC61850 substation automation system network. / Rashid, Muhammad Talha Abdul; Yussof, Salman; Yusoff, Yunus; Ismail, Roslan.

Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN: Cultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014. Institute of Electrical and Electronics Engineers Inc., 2015. p. 5-10 7066594.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A review of security attacks on IEC61850 substation automation system network

AU - Rashid, Muhammad Talha Abdul

AU - Yussof, Salman

AU - Yusoff, Yunus

AU - Ismail, Roslan

PY - 2015/3/23

Y1 - 2015/3/23

N2 - Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.

AB - Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.

UR - http://www.scopus.com/inward/record.url?scp=84937413995&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84937413995&partnerID=8YFLogxK

U2 - 10.1109/ICIMU.2014.7066594

DO - 10.1109/ICIMU.2014.7066594

M3 - Conference contribution

SP - 5

EP - 10

BT - Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Rashid MTA, Yussof S, Yusoff Y, Ismail R. A review of security attacks on IEC61850 substation automation system network. In Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN: Cultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014. Institute of Electrical and Electronics Engineers Inc. 2015. p. 5-10. 7066594 https://doi.org/10.1109/ICIMU.2014.7066594