You are on page 1of 4

2017 the 5th IEEE International Conference on Smart Energy Grid Engineering

A Review of Security in Electrical Power Information System

Tianyang Mao, Liang Zhao


Faculty of Electronic Information and Electrical Engineering
Dalian University of Technology
Dalian, China
e-mail: mty1209@mail.dlut.edu.cn, zliang@dlut.edu.cn

Abstract—In order to provide a reference for the establishment


of power information system, this paper reviewed electrical II. INFORMATION SYSTEM SECURITY MODEL OF POWER
power information system including security model, SYSTEM
communication mechanism and risk assessment. Security
model including OSI and P2DR, communication mechanism A. OSI Standard Model
including IEC 62351 and IEC 61850, risk assessment including OSI (Open System Interconnect) was developed and
Fault Tree and Attack Tree were introduced. In each section,
published by the International Organization for
literature of related work are presented to strengthen the
Standardization in 1985. The architecture standard defines
background of the research, and the drawbacks of each model
are also mentioned. In addition, this paper proposed the seven-layer framework of network interconnection, from
requirements of the power information system design, that bottom to top, namely physical layer, data link layer,
information security is a moment of change in the process. the network layer, transport layer, session layer, presentation
design needs to grasp this feature. layer and application layer [3]. On this basis, the general
elements related to the security architecture are established,
Keywords-electrical power information system; OSI; P2DR; including five types of security services and eight types of
IEC 62351; IEC 61850; fault tree; attack tree security mechanisms.
Shiroshita (1990) [4] presented a data processing
I. INTRODUCTION performance model in the Presentation layer and developed
an evaluation method for Application protocols data
Over the past decade, the rapid development of structures in OSI. It shows that the method is applicable.
information technology and communication technology has Lowe (1994) [5] described a method for running OSI
penetrated into all walks of life, and the information security applications over the Internet and running Internet
has been paid unprecedented attention. The information applications over an OSI network, which is very efficient,
system will also be widely used in the power system. Not with low overhead and small code size. Ge et al (1995) [6]
only will the external electromagnetic interference affect the discussed the functional implementation of the
reliability, authenticity, consistency and integrity of the
connectionless network layer protocol of the OSI gateway in
power information system, but the power information system
the state of network interconnection, and proposed an
is also vulnerable to malicious code threat when in the
address mapping protocol from the network address to the
maintenance and Debugging process, affecting the normal
physical address and the reverse address mapping protocol
operation of the power information system. The safe
operation of power system is more dependent on the security from the physical address to the network address. Based on
of information system. How to promote the development of the OSI management object identification, Chen et al (1996)
information security in power industry has become the focus [7] proposed a method of establishing the information model
of attention of academia and electric power enterprises. based on LAN which reveals the flexibility and uniformity of
Li et al (2003) [1] proposed a model and method based establishing the OSI network management information
on SSE-CMM power system information security model. Shi et al (2013) [8] presented a new model for
assessment, which makes the research of power system distributed intelligent management networks, which is
information security assessment a step further and has been combined with Open Systems Interconnection(OSI)
applied in a power system enterprise in a province. Han et al management model.
(2004) [2] proposed that with the development of OSI standard model has drawbacks. The session layer is
information technology, power systems, information systems rarely used in most applications, and the presentation layer is
and communication systems have been integrated into a almost empty. There are many sublayers inserted between
hybrid system. Therefore, the security of power information the data link layer and the network layer, and each sublayer
system is different from that of pure communication system. has different functions. At the same time, addressing, flow
To ensure the safety of power system business, it is control and error control in each layer are repeated, will
necessary to put the widely distributed and interrelated inevitably reduce system efficiency. In terms of data security,
business system and its interaction with communication encryption and network management issues are also
system into consideration. overlooked in the early stages of reference model design.

978-1-5386-1776-2/17/$31.00 ©2017 IEEE 


B. P2DR Model standards do not propose new security mechanisms, but
The P2DR model includes four main parts: security rather use the Transport Layer Security Protocol, which is
policy, protection, detection and response. Under the widely used on the Internet, to provide information security
guidance of the security policy, the protection, detection and exchanges, including authentication, encryption and integrity.
response form a complete and dynamic security cycle to IEC62351-4 provides security for communication protocols
ensure the safety of information systems. based on Manufacturing Message Specification in power
Basing on the P2DR security model, Zhang et al (2005) systems such as TASE.2 (ICCP) and IEC61850.
[9] designed and implemented an intrusion detection system, Hu et al (2002) [14] introduced several common types of
using the combination of knowledge-based IDS and network attacks and demonstrated the information theft
anomaly-based IDS, with the distributed architecture, to process, introduced the SSL protocol in the negotiation layer
overcome the disadvantages of general system such as high and record layer. based on IEC 62351 standard, they
leakage rate and poor scalability. The practical application proposed a scheme of using software configuration, proxy
shows that the system has a good effect. Huang et al (2007) mechanism and SSL development kit to achieve the goal of
[10] detailed the security strategy of the P2DR model, and strengthening the power system network security. Chen et al
then use the existing network security technology to achieve (2013) [15] proposed a protocol used between IED safety
different levels of security on the Internet dynamic security authentication-Secure Remote Password SRP protocol,
solutions. Based on the P2DR security model, Huang (2008) which provide with reference value to the implementation of
[11] puts forward the principle of information security IEC 62351 in smart substation. Wang et al (2014) [16]
construction for all kinds of systems. Based on the threat designed a MMS-based security message format, which is
analysis and network partition protection, the paper puts determined by IEC 62351 standard. Analysis shows that
forward the detailed construction plan of the information security and interoperability of telecontrol communication
security system of the banking system by using the idea of can be improved to a large extent using different modes of
P2DR closed-loop security model. Xu et al (2013) [12] AES-CCM algorithm for security message transmission
proposed a kind of new active dynamic security model AD- under distinct security requirements. Hu et al (2016) [17]
RPPDRRM based on P2DR and designed a defense in-depth first introduced the IEC 62351 standard, and then introduced
system of a typical network, which can adapt to suit new the contents of the substation security system, including TCP
attacks and security techniques. Based on the theory and / IP protocol set security, MMS protocol set security,
architecture of the security model P2DR, Han and Wu (2013) GOOSE and SMV, and finally designed based on IEC 62351
[13] analyze the current security risks and hidden dangers of substation communication system. The test shows that the
hospital information system (HIS), and discusses how to use system improves network security. Based on the study of
the P2DR model for the construction of HIS to ensure the IEC62351 standard, Cong et al (2016) [18] presents a
reliable, safe and efficient operation of HIS. mechanism for adaptive IEC62351 standard for intelligent
P2DR model puts intrusion detection time, strain time substation automation system data communication. The
and other time factors into consideration, forming a complete interoperability and interchangeability of existing equipment
security architecture. The model emphasizes the dynamic and IEC62351 standard equipment are realized through the
nature of the system, with particular emphasis on construction of SCD file certificate management center, self-
identification of equipment communication codec in station.
management factors. However, the P2DR model has a
significant drawback, that is, ignore the internal changes in B. IEC 61850 Standard
factors, such as the quality of personnel and the IEC61850 is the power system communication system
implementation of the instability of the strategy. In fact, the and network standard. Aiming to the power system
security issues involved in a wide range. Except for the automation function, the standard defines a detailed
design of protection, detection and response, the security communication model, and as needed, gradually extended to
model does not take system security immunity, system and other applications of power systems. IEC 61850 and other
the entire network optimization and personnel quality communication standards that follow its ideas represent the
improvement into account. communication infrastructure of various types of power
monitoring systems in the future production and control
III. INFORMATION COMMUNICATION MECHANISM OF areas of the power industry.
POWER SYSTEM Li et al (2012) [19] modeled the new arc protection
device on the bus and analyze the relationship of ACSI
A. IEC 62351 Standard mapping to MMS based on the international standards of
The IEC 62351 series of international standards IEC 61850. Lee et al (2013) [20] proposed the efficient
developed by the WG15 are composed of seven parts, which model-driven testing technology and a test design system
are intended to provide a safety solution for SCADA-related built based on the proposed model. Wang et al (2014) [21]
power system communications. In this standard, the third, proposed a hierarchical information architecture for battery
fourth, fifth and sixth part of the standards are related to the energy storage system and general design methods for device
power system security communication mechanism. information model to realize the battery energy storage
IEC62351-3 ensures the security of TCP / IP-based system based on IEC 61850. Ali et al (2016) [22] used IP
communication protocols in power systems. The security tunnels and/or mapping over IP layer for transferring IEC


61850 messages to demonstrates the modelling of which is of practical value to the power SCADA
information and services needed for control, management transmission network. Bobbio et al (2013) [30] proposed an
and protection of distribution systems with integrated DERs. analysis technique based on the representation of a WADT
Netto et al (2016) [23] presented the development of a by means of an extension of Binary Decision Diagrams and a
forecast approach to manage IED networks using the IEC running example illustrates the methodology. Shen et al
61850 Standard. The tests revealed that IED functions may (2014) [31] present a method of network attack training
be deteriorated when the network parameter surpasses 5– simulation based on attack tree. The result shows that the
15% of the available bandwidth, depending on the IED method make trainee operate efficient and get target quickly.
manufacturer and model. Garg et al (2014) [32] discusses the usage of game theory
and fuzzy logic in analysis of the attack and defense
IV. SAFETY ASSESSMENT METHOD OF POWER SYSTEM equilibrium. Li et al (2015) [33] proposed an extended attack
tree model to identify RFID system’s flaws and
A. Fault Tree vulnerabilities. Analysis shows that the scheme can calculate
Fault tree analysis is one of the methods that cannot be the overall risk evaluation result value.
ignored in safety system engineering. The fault tree analysis When the attack tree is applied in a concrete instance, its
begins with a possible accident, from top to bottom, step by structure may become large and complex. A complete attack
step to find the direct and indirect cause of the top event, tree is likely to include hundreds of leaf nodes, which greatly
until the basic cause of the event, and uses the logic diagram limits its application
to express the logical relationship between these events. V. POWER INFORMATION SYSTEM DESIGN
SANTIAGO et al (2005) [24] proposed a method REQUIREMENTS
enabling to state formal properties of a logic controller from
a fault-tree analysis taking into account both the controlled The normal operation of the power information system is
process and the controller. Chen et al (2008) [25] proposed a related to the vital interests of the people, and now put
testing approach of component security based on dynamic forward the requirements of power information system
fault tree. The experimental results show that the approach is security model design:
effective and can trigger lots of component exceptions by (1) comprehensive: power information system includes
using fewer test-cases. Li et al (2012) [26] established a fault personnel, equipment, data and other elements, which plays a
tree of an aero-engine rotor using the descending method to very important role in protecting the system in the process of
determine the minimal cut sets and analyzed the resulting security, only from the overall point of view and analysis
fault tree. Wang et al (2013) [27] introduced the risk theory may we get effective, comprehensive and viable security
into dispatching operation quantitative assessment, and a measures. And the safety of power information systems can
real-time dispatching operation risk analysis method is not rely solely on safety technology and products, but also
must take full account of the physical environment, security
proposed. Fault tree is used to simulate dispatching operation
organizations, security management, related laws and
process and comprehensively analyze the system risk in both
regulations and other aspects.
under-successful and failure state of the operation. Ge et al
(2) systematic: The design of the security model of the
(2015) [28] put forward using an adapted K.D. Heidtmann power information system is not simply the use of security
algorithm to analyze the reliability of a complex dynamic technology, or a combination of various security elements,
fault tree. The experiment shows the proposed method is but the use of security engineering process of thinking, the
reasonable and efficient. entire security process planning and implementation.
Fault tree analysis also has some drawbacks. Mainly to (3) dynamic: One important feature of the security of
construct the fault tree is too heavy, the difficulty is also power information systems is dynamic, so security is not
large, the requirements of the analyst is also high, thus done overnight or immutable.
limiting its promotion and popularization. At the same time, (4) Universal: the current security for power information
the reliability of the conclusions is different because each systems using a variety of security technology, security
analyst has a different range of research. measures, security products are basically from a narrow
perspective to analyze and solve the problem, which is lack
B. Attack Tree
of far-sighted ideas for the safety of power information
The attack tree uses a tree diagram to represent the attack systems. We need to consider the problem from a macro
on the system, where the root node represents the node that point of view, so that the application of the model would be
has been attacked and the leaf node indicates the way to more universal.
reach the purpose of the attack. The attack tree provides a (5) Practical: Although the protecting object of power
formal and straightforward way to describe the security information system security is the information system, but
threats that the system faces and the multiple attacks that the most of the process requires the participation of people. if the
system may be exposed to. operation process is too complex, then the model doesn’t
Basing on the defense tree model of the attack tree, have universal significance.
combining with the evidence network reasoning algorithm,
Liu (2013) [29] evaluated the safety of the power SCADA VI. CONCLUSION
transmission network. The feasibility of the proposed safety This paper introduces the safety model, communication
assessment method is verified by the example analysis, mechanism and safety assessment method commonly used in


power information system, and puts forward the design [16] B.-Y. Wang, X.-Y. Jin, and S.-M. Zhang, “Secure message
requirements of power information system security model on transmission method of MMS telecontrol communication based on
AES-CCM,” Applied Mechanics and Materials. vols. 513-517, pp.
the existing basis. Information security is not a static process, 2277-2280, 2014.
which requires the design of the security model to be a [17] W.-M. Hu, H.-G. Zhang, and Y. Hu. “Study on intelligent substation
dynamic, circular, continuous improvement process. The communication system based on IEC 62351,” Electric Age. No. 10,
power information system based on this can be quickly pp. 81-83, 2016.
adapted to the risk change, personnel adjustment, technical [18] C.-T. Cong, F.-E. Sun, and G.-H. Liu, “Study on adaptive IEC 62351
update and other conditions, so that being eliminated by the for smart substation communication,” Information Technology and
times. Informatization. vol. 12, pp.115-119, 2016.
[19] D.-J. Li, and Y. Zhang, “Information model of ARC protection
ACKNOWLEDGMENT system based on IEC 61850,” Advanced Materials Research. vols.
383-390, pp. 2540-2544, 2012
The present research is supported by National Power [20] N.-H. Lee, and B.T. Jang, “Development of the model-driven test
Grid Corp's Technology Project˖2017YF-36. design system for IEC 61850 based substation automation system,”
Journal of International Council on Electrical Engineering. vol. 3, pp.
REFERENCES 20-24, 2013.
[1] Z.-M. Li, L. Cong, Y. Zheng, M.-H. Pan, and R.-Q. Pian, [21] N. Wang, W. Liang, Y.-N. Cheng, and Y.-F. Mu, “Battery energy
“Information security assessment of power systems based on SSE- storage system information modeling based on IEC 61850,” Journal
CMM,” Automation of Electric Power System. vol. 27, pp. 37-40, of Power and Energy Engineering. vol. 2, pp.233-238, 2014.
December 2003. [22] I. Ali, and S.M.S. Hussain, “Control and management of distribution
[2] Z.-X. Han, and Y.-J. Cao, “Power system security and its system with integrated DERs via IEC 61850 based communication,”
prevention,” Power System Technology. Vol. 28, pp. 1-6, May 2004. Engineering Science and Technology. 2016.
[3] Y. Xiao, “OSI security architecture,” Science Mosaic. No. 9, pp.253- [23] U.C. Netto, D.C. Grillo, I.D. Lonel, E.L. Pellini, and D.V. Coury,
254, September 2009. “An ANN based forecast for IED network management using the
IEC61850 standard,” Electric Power Systems Research. vol. 130, pp.
[4] T. Shiroshita, “A data processing performance model for the OSI 148–155, January 2016.
application layer protocols,” ACM SIGCOMM Computer
Communication Review, vol.20, pp. 60-68, 1990. [24] I.B. SANTIAGO, and J.-M. FAURE, “From fault tree analysis to
model checking of logic controllers,” IFAC Proceedings Volumes.
[5] H. Lowe, “Internet/OSI application migration/portability,” Standard vol. 38, pp.86-91, 2005.
View, vol. 2, pp. 46-49, 1994.
[25] J. Chen, Y. Lu, and X. Xie, “Testing approach of component security
[6] F. Ge, and Y.-B. Zhao, B. Du, Y.-X. Zhang, “Design and based on dynamic fault tree,” Information Technology Journal. Vol. 7,
implementation of connectionless mode network layer protocol in pp. 769, 2008.
OSI interconnection environment,” Computer Engineering and
Design, vol. 16, pp. 41-46, 1995. [26] Y.-F. Li, H.-Z. Huang, S.-P. Zhu, Y. Liu, and N.-C. Xiao, “An
application of fuzzy fault tree analysis to uncontained events of an
[7] B. Chen, and Y.-L. Zhong, “Network management information model areo-engine rotor,” Int. J. Turbo Jet-Engines. Vol. 29, pp. 309-315,
based on OSI,”JOURNAL OF SHANGHAI JIAOTONG December 2012.
UNIVERSITY. vol. 30, pp. 124-127, 1996.
[27] E. Wang, W. Wei, B.-D. Wang, and Z. Liu, “Real-time dispatching
[8] Y.-Q. Shi, and Y.-L. Zhu,” A framework for development the Open operation risk assessment based on fault tree theory,” Advanced
Systems Interconnection of integrated intelligent knowledge for Materials Research. vols. 732-733, pp. 909-914, 2013.
management of networks,” Applied Mechanics and Materials. vols.
411-414, pp. 795-798, 2013. [28] D.-C. Ge, M. Lin, Y.-H. Yang, R.-X. Zhang, and Q. Chou,
“Reliability analysis of complex dynamic fault trees based on an
[9] Y.-P. Zhang, F. Hu, Y.-C. Ma, W. Lu, and M. Li, “Design and adapted K.D. Heidtmann algorithm,” Journal of Risk and Reliability.
implementation of distributed intrusion detection system based on vol. 229, pp. 384, 2015.
P2DR model, ” Computer Engineering and Applications. No. 35, pp.
141-144, 2005. [29] L. Liu, “SCADA service oriented security evaluation for electric
power communication networks,” North China Electric Power
[10] Z.-B. Huang, “Study on security solution based on P2DR model,” University, 2013.
Science & Technology Information. No.29, pp. 79-80, 2007.
[30] A. Bobbio, L. Egidi, and R. Terruggia, “A methodology for
[11] Y. Huang, “Research and design of the banking information security qualitative/quantitative analysis of weighted attack trees,” IFAC
system which is based upon P2DR model,” Information Security and Proceedings Volumes. vol. 46, pp. 133-138, 2013.
Communications Privacy. vols. 6, pp.115-118, 2008
[31] J.-J. Shen, J. Yang, and G. Chen, “Research on network attack
[12] S.-P. Xu, Y.-H. Zhang, Y. Zhou, Y.-Q. Bai, and H.-P. Fu, “Design training simulation system based on attack tree,” Applied Mechanics
and application of a network security model,” Applied Mechanics and Materials. vols. 651-653, pp. 1917-1920, 2014.
and Materials. vols. 347-350, pp. 2773-2776, 2013.
[32] S. Garg, and G.S. Aujla, “An attack tree based comprehensive
[13] R. Han and J. Wu, “Application of P2DR model in security of HIS,” framework for the risk and security assessment of VANET using the
China Medical Devices. vol. 7, pp.81-83, 2013. concepts of game theory and fuzzy logic,” Journal of Emerging
[14] Y. Hu, and M.-C. Dong, “Strengthening the security of network Technologies in Web Intelligence. vol. 6, pp. 247-252, May 2014.
application with SSL protocol,” Automation of Electric Power [33] P. Li, C. Xu, L. Chen, R.C. Wang, and N. Park, “RFID privacy risk
Systems. vol. 26, pp. 70-77, August 2002. evaluation based on synthetic method of extended attack tree and
[15] L. Chen, Y.-F. Wang, and T. Zhang, “Security authentication for information feature entropy,” International Journal of Distributed
smart substation communication based on IEC 62351,” Applied Sensor Networks. vol. 11, 2005.
Mechanics and Materials. vols. 260-261, pp. 91-96, 2013.



You might also like