Enhancing Cyber Security for IEC 61850-Based Transmission Line Protection

improving the cyber security of iec 61850 based n.w
1 / 32
Embed
Share

Learn how Dr. Alexander Apostolov from OMICRON Electronics, USA, focuses on improving the cyber security of IEC 61850-based transmission line protection systems by detecting abnormal behaviors, defining prevention methods, and safeguarding against various threats including human errors and malicious attacks.

  • Cyber Security
  • IEC 61850
  • Transmission Line Protection
  • Dr. Alexander Apostolov
  • OMICRON Electronics

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Improving the cyber security of IEC 61850 based transmission line protection Dr. Alexander Apostolov OMICRON electronics, USA C1 - Internal

  2. Introduction C1 - Internal

  3. Questions? What are we doing? Why are we doing it? How are we doing it? C1 - Internal

  4. What are we doing? Detecting abnormal behavior of the electric power system and its protection, automation and control systems Defining methods and tools to identify the reasons for the abnormal behavior Defining methods and tools to prevent or reduce the impact of abnormal behavior caused by humans C1 - Internal

  5. Why are we doing it? To protect the electric power grid and its equipment from short term or long-term damage caused by: Natural weather or other random events Human errors during maintenance or system operation Intentional actions by disgruntled employees Random attacks by unsophisticated hackers Malicious attacks by highly skilled hackers C1 - Internal

  6. How are we doing it? Based on: Understanding of the threats operation of primary equipment, change of the configuration of an IED, publishing of IEC 61850 messages, etc. Understanding of the impact of specific threats Knowledge of the electric power system parameters and connectivity (digital twin) C1 - Internal

  7. How are we doing it? Knowledge of the electric power system real time topology Knowledge of the communications architecture Knowledge of the communications system configuration Knowledge of the capabilities of the components of the SPACS (digital twins) Knowledge of the configuration of the IEDs C1 - Internal

  8. How are we doing it? Knowledge of the IEC 61850 standard Knowledge of the level of implementation of IEC 61850 in the IEDs Knowledge of the test system Continuous collection and analysis of data available from various sources IEDs, MUs, PMUs, weather information, scheduled events information, etc C1 - Internal

  9. How are we doing it? Analysis of the data using different methods expert systems, AI tools, comparison between predicted behavior and actual behavior, etc. C1 - Internal

  10. IEC 61850 C1 - Internal

  11. IEC 61850 Services Page 11 C1 - Internal

  12. Control Blocks Server IEC 61850 Services BUFFERED- REPORT- CTRL-BLOCK 1 0..* 0..* 1..* UNBUFFERED- REPORT- CTRL-BLOCK Logical Device 0..* 0..* 1 1 0..* LOG- CONTROL- BLOCK 0..* 0..* 1..* LOG Logical Node 1 0..1 1 1 1 1 1 SETTING- GROUP- CONTROL-Block LLN0 0..* 1 0..1 1 GOOSE- CONTROL-BLOCK 0..* 1 0..1 GSSE- CONTROL-BLOCK 1 0..1 1 MULTICAST- SAMPLED- VALUE-CTRL-B. 0..1 0..* 1 0..* UNICAST- SAMPLED VALUE-CTRL-B. 1 0..1 1 1..* 1 1 1 1 1 1 1 0..* 0..* DATA DATA DataSet 1 1 1..* Substitution Substitution Time Time DataAttribute 0..* Control File File Page 12 C1 - Internal

  13. GOOSE message C1 - Internal

  14. Sampled Values Communications 7/1/2025 14 C1 - Internal

  15. Accelerated transmission line protection C1 - Internal

  16. IEC 61850 Based Accelerated Line Protection A F3 F1 F2 B A Distance Protection 1 B Distance Protection 1 A Distance Protection 2 B Distance Protection 2 t C1 - Internal

  17. IEC 61850 Based Accelerated Line Protection F3 F1 F2 A B A Distance Protection 1 B Distance Protection 1 MPLS R-GOOSE A Distance Protection 2 B Distance Protection 2 C1 - Internal

  18. Security issues C1 - Internal

  19. Security Issues Transition from local to some forms of distributed protection functionality Requirements for more efficient communications based protection schemes Need for local and remote user interface from different types of corporate clients Page 19 C1 - Internal

  20. Security Issues Use of protection IEDs as the main data source for integrated data acquisition and control systems Use of multifunctional IEDs as distributed power system disturbance recording devices It is not an IEC 61850 problem Page 20 C1 - Internal

  21. Threats Sources Natural disasters and equipment failure Well-intentioned employees who make inadvertent errors, use poor judgment, or are inadequately trained Employees with criminal intent to profit or to damage others by the misappropriation of utility resources Disgruntled employees or ex-employees who cause damage to satisfy a grudge C1 - Internal

  22. Threats Sources Hobbyist intruders who gain pleasure from unauthorized access to utility information systems Criminal activity by both individuals and organizations directed against the utility, its employees, customers, suppliers, or others Terrorists C1 - Internal

  23. Threats Sources Competing organizations searching for proprietary information of the utility, its suppliers, or customers Unscrupulous participants in the markets for electric power or derivatives Software providers who, in attempting to protect their intellectual property rights, create vulnerabilities or threaten to disable the software in contractual disputes C1 - Internal

  24. Hacked GOOSE Messages: Page 24 C1 - Internal

  25. Hacked Sampled Values Communications 7/1/2025 25 C1 - Internal

  26. Mitigation C1 - Internal

  27. GOOSE in WireShark C1 - Internal

  28. IEC 61850 90-5 Session Protocol Session Identifier (SI) = 0xA0 (8 bit) - Tunnelled 0xA1 (8 bit) - GOOSE 0xA2 (8 bit) Sample value 0xA3 (8 bit) Management Session Identifier (SI) Session Header Length (LI) (8 bit) Session Header Header Content Indicator(PI) = 0x80 (8 bit) Session Header Length LI (8 bit) SPDU Length (32 bits) Security Information SPDU Number (32 bits) Version = 2 (8 bit) LI Time of Current Key (32 bits)) Signature domain Time of Next Key (16 bits) Key ID (32 bits) Session User Information Initialization Vector (IV 1-233 bytes) SPDU Length PayloadLength (32 bit) 1..n PDUs Payload Length Length Payload GOOSE APDU Encrypted domain Simulation Padding (0xAF) Choice of APPID PaddingLength (8 bits) m PaddingLength =m APDU Length SV APDU Padding (m bytes) goosePdu Simulation Signature (size of signature +2 bytes) APPID APDU Length SavPdu MNGT APDU Tunnelled Simulation Simulation APPID APPID APDU Length Dst MAC VLAN mngtPdu IEEE 802.1p Frame Length GOOSE or SV Ethertype packets + Ethernet Pad Bytes C1 - Internal

  29. Functional security Based on the protection scheme principle (POTT) Based on redundant data (DTT) C1 - Internal

  30. Functional security testing The implementation of the functional security capability requires proper testing to verify that it is operating as expected under different electric power system conditions. The test system needs to be capable of simulating normal power flow, as well as short circuit fault conditions to verify that the transmission line protection scheme will operate when a short circuit fault occurs without the additional time delay based on the received GOOSE message from the remote end of the line. C1 - Internal

  31. Conclusions The availability of specific features in the GOOSE publishing mechanisms allows for the development of intrusion detection methods that can be implemented in the subscribing IEDs. The intrusion detection is based on the monitoring of state and sequence numbers, as well as data attribute value changes. Additional end-to-end security is implemented in R- GOOSE based on IEC 62351-6. Using good understanding of the protection system of the transmission line and its operation during different fault conditions can be used to implement a mechanism of functional security that will prevent the undesired tripping of the transmission line even if an intruder has been able to successfully avoid the cyber security protection mechanisms. C1 - Internal

  32. Thank you Dr. Alexander Apostolov alex.apostolov@omicronenergy.com +13103514574 C1 - Internal

More Related Content