A review of security attacks on IEC61850 substation automation system network

Muhammad Talha Abdul Rashid, Salman Yussof, Yunus Yusoff, Roslan Ismail

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

Abstract

Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.

Original languageEnglish
Title of host publicationConference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN
Subtitle of host publicationCultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5-10
Number of pages6
ISBN (Electronic)9781479954230
DOIs
Publication statusPublished - 23 Mar 2015
Event6th International Conference on Information Technology and Multimedia, ICIMU 2014 - Putrajaya, Malaysia
Duration: 18 Nov 201420 Nov 2014

Other

Other6th International Conference on Information Technology and Multimedia, ICIMU 2014
CountryMalaysia
CityPutrajaya
Period18/11/1420/11/14

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Software

Cite this

Rashid, M. T. A., Yussof, S., Yusoff, Y., & Ismail, R. (2015). A review of security attacks on IEC61850 substation automation system network. In Conference Proceedings - 6th International Conference on Information Technology and Multimedia at UNITEN: Cultivating Creativity and Enabling Technology Through the Internet of Things, ICIMU 2014 (pp. 5-10). [7066594] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIMU.2014.7066594