Professional Documents
Culture Documents
61850 messages to demonstrates the modelling of which is of practical value to the power SCADA
information and services needed for control, management transmission network. Bobbio et al (2013) [30] proposed an
and protection of distribution systems with integrated DERs. analysis technique based on the representation of a WADT
Netto et al (2016) [23] presented the development of a by means of an extension of Binary Decision Diagrams and a
forecast approach to manage IED networks using the IEC running example illustrates the methodology. Shen et al
61850 Standard. The tests revealed that IED functions may (2014) [31] present a method of network attack training
be deteriorated when the network parameter surpasses 5– simulation based on attack tree. The result shows that the
15% of the available bandwidth, depending on the IED method make trainee operate efficient and get target quickly.
manufacturer and model. Garg et al (2014) [32] discusses the usage of game theory
and fuzzy logic in analysis of the attack and defense
IV. SAFETY ASSESSMENT METHOD OF POWER SYSTEM equilibrium. Li et al (2015) [33] proposed an extended attack
tree model to identify RFID system’s flaws and
A. Fault Tree vulnerabilities. Analysis shows that the scheme can calculate
Fault tree analysis is one of the methods that cannot be the overall risk evaluation result value.
ignored in safety system engineering. The fault tree analysis When the attack tree is applied in a concrete instance, its
begins with a possible accident, from top to bottom, step by structure may become large and complex. A complete attack
step to find the direct and indirect cause of the top event, tree is likely to include hundreds of leaf nodes, which greatly
until the basic cause of the event, and uses the logic diagram limits its application
to express the logical relationship between these events. V. POWER INFORMATION SYSTEM DESIGN
SANTIAGO et al (2005) [24] proposed a method REQUIREMENTS
enabling to state formal properties of a logic controller from
a fault-tree analysis taking into account both the controlled The normal operation of the power information system is
process and the controller. Chen et al (2008) [25] proposed a related to the vital interests of the people, and now put
testing approach of component security based on dynamic forward the requirements of power information system
fault tree. The experimental results show that the approach is security model design:
effective and can trigger lots of component exceptions by (1) comprehensive: power information system includes
using fewer test-cases. Li et al (2012) [26] established a fault personnel, equipment, data and other elements, which plays a
tree of an aero-engine rotor using the descending method to very important role in protecting the system in the process of
determine the minimal cut sets and analyzed the resulting security, only from the overall point of view and analysis
fault tree. Wang et al (2013) [27] introduced the risk theory may we get effective, comprehensive and viable security
into dispatching operation quantitative assessment, and a measures. And the safety of power information systems can
real-time dispatching operation risk analysis method is not rely solely on safety technology and products, but also
must take full account of the physical environment, security
proposed. Fault tree is used to simulate dispatching operation
organizations, security management, related laws and
process and comprehensively analyze the system risk in both
regulations and other aspects.
under-successful and failure state of the operation. Ge et al
(2) systematic: The design of the security model of the
(2015) [28] put forward using an adapted K.D. Heidtmann power information system is not simply the use of security
algorithm to analyze the reliability of a complex dynamic technology, or a combination of various security elements,
fault tree. The experiment shows the proposed method is but the use of security engineering process of thinking, the
reasonable and efficient. entire security process planning and implementation.
Fault tree analysis also has some drawbacks. Mainly to (3) dynamic: One important feature of the security of
construct the fault tree is too heavy, the difficulty is also power information systems is dynamic, so security is not
large, the requirements of the analyst is also high, thus done overnight or immutable.
limiting its promotion and popularization. At the same time, (4) Universal: the current security for power information
the reliability of the conclusions is different because each systems using a variety of security technology, security
analyst has a different range of research. measures, security products are basically from a narrow
perspective to analyze and solve the problem, which is lack
B. Attack Tree
of far-sighted ideas for the safety of power information
The attack tree uses a tree diagram to represent the attack systems. We need to consider the problem from a macro
on the system, where the root node represents the node that point of view, so that the application of the model would be
has been attacked and the leaf node indicates the way to more universal.
reach the purpose of the attack. The attack tree provides a (5) Practical: Although the protecting object of power
formal and straightforward way to describe the security information system security is the information system, but
threats that the system faces and the multiple attacks that the most of the process requires the participation of people. if the
system may be exposed to. operation process is too complex, then the model doesn’t
Basing on the defense tree model of the attack tree, have universal significance.
combining with the evidence network reasoning algorithm,
Liu (2013) [29] evaluated the safety of the power SCADA VI. CONCLUSION
transmission network. The feasibility of the proposed safety This paper introduces the safety model, communication
assessment method is verified by the example analysis, mechanism and safety assessment method commonly used in
power information system, and puts forward the design [16] B.-Y. Wang, X.-Y. Jin, and S.-M. Zhang, “Secure message
requirements of power information system security model on transmission method of MMS telecontrol communication based on
AES-CCM,” Applied Mechanics and Materials. vols. 513-517, pp.
the existing basis. Information security is not a static process, 2277-2280, 2014.
which requires the design of the security model to be a [17] W.-M. Hu, H.-G. Zhang, and Y. Hu. “Study on intelligent substation
dynamic, circular, continuous improvement process. The communication system based on IEC 62351,” Electric Age. No. 10,
power information system based on this can be quickly pp. 81-83, 2016.
adapted to the risk change, personnel adjustment, technical [18] C.-T. Cong, F.-E. Sun, and G.-H. Liu, “Study on adaptive IEC 62351
update and other conditions, so that being eliminated by the for smart substation communication,” Information Technology and
times. Informatization. vol. 12, pp.115-119, 2016.
[19] D.-J. Li, and Y. Zhang, “Information model of ARC protection
ACKNOWLEDGMENT system based on IEC 61850,” Advanced Materials Research. vols.
383-390, pp. 2540-2544, 2012
The present research is supported by National Power [20] N.-H. Lee, and B.T. Jang, “Development of the model-driven test
Grid Corp's Technology Project˖2017YF-36. design system for IEC 61850 based substation automation system,”
Journal of International Council on Electrical Engineering. vol. 3, pp.
REFERENCES 20-24, 2013.
[1] Z.-M. Li, L. Cong, Y. Zheng, M.-H. Pan, and R.-Q. Pian, [21] N. Wang, W. Liang, Y.-N. Cheng, and Y.-F. Mu, “Battery energy
“Information security assessment of power systems based on SSE- storage system information modeling based on IEC 61850,” Journal
CMM,” Automation of Electric Power System. vol. 27, pp. 37-40, of Power and Energy Engineering. vol. 2, pp.233-238, 2014.
December 2003. [22] I. Ali, and S.M.S. Hussain, “Control and management of distribution
[2] Z.-X. Han, and Y.-J. Cao, “Power system security and its system with integrated DERs via IEC 61850 based communication,”
prevention,” Power System Technology. Vol. 28, pp. 1-6, May 2004. Engineering Science and Technology. 2016.
[3] Y. Xiao, “OSI security architecture,” Science Mosaic. No. 9, pp.253- [23] U.C. Netto, D.C. Grillo, I.D. Lonel, E.L. Pellini, and D.V. Coury,
254, September 2009. “An ANN based forecast for IED network management using the
IEC61850 standard,” Electric Power Systems Research. vol. 130, pp.
[4] T. Shiroshita, “A data processing performance model for the OSI 148–155, January 2016.
application layer protocols,” ACM SIGCOMM Computer
Communication Review, vol.20, pp. 60-68, 1990. [24] I.B. SANTIAGO, and J.-M. FAURE, “From fault tree analysis to
model checking of logic controllers,” IFAC Proceedings Volumes.
[5] H. Lowe, “Internet/OSI application migration/portability,” Standard vol. 38, pp.86-91, 2005.
View, vol. 2, pp. 46-49, 1994.
[25] J. Chen, Y. Lu, and X. Xie, “Testing approach of component security
[6] F. Ge, and Y.-B. Zhao, B. Du, Y.-X. Zhang, “Design and based on dynamic fault tree,” Information Technology Journal. Vol. 7,
implementation of connectionless mode network layer protocol in pp. 769, 2008.
OSI interconnection environment,” Computer Engineering and
Design, vol. 16, pp. 41-46, 1995. [26] Y.-F. Li, H.-Z. Huang, S.-P. Zhu, Y. Liu, and N.-C. Xiao, “An
application of fuzzy fault tree analysis to uncontained events of an
[7] B. Chen, and Y.-L. Zhong, “Network management information model areo-engine rotor,” Int. J. Turbo Jet-Engines. Vol. 29, pp. 309-315,
based on OSI,”JOURNAL OF SHANGHAI JIAOTONG December 2012.
UNIVERSITY. vol. 30, pp. 124-127, 1996.
[27] E. Wang, W. Wei, B.-D. Wang, and Z. Liu, “Real-time dispatching
[8] Y.-Q. Shi, and Y.-L. Zhu,” A framework for development the Open operation risk assessment based on fault tree theory,” Advanced
Systems Interconnection of integrated intelligent knowledge for Materials Research. vols. 732-733, pp. 909-914, 2013.
management of networks,” Applied Mechanics and Materials. vols.
411-414, pp. 795-798, 2013. [28] D.-C. Ge, M. Lin, Y.-H. Yang, R.-X. Zhang, and Q. Chou,
“Reliability analysis of complex dynamic fault trees based on an
[9] Y.-P. Zhang, F. Hu, Y.-C. Ma, W. Lu, and M. Li, “Design and adapted K.D. Heidtmann algorithm,” Journal of Risk and Reliability.
implementation of distributed intrusion detection system based on vol. 229, pp. 384, 2015.
P2DR model, ” Computer Engineering and Applications. No. 35, pp.
141-144, 2005. [29] L. Liu, “SCADA service oriented security evaluation for electric
power communication networks,” North China Electric Power
[10] Z.-B. Huang, “Study on security solution based on P2DR model,” University, 2013.
Science & Technology Information. No.29, pp. 79-80, 2007.
[30] A. Bobbio, L. Egidi, and R. Terruggia, “A methodology for
[11] Y. Huang, “Research and design of the banking information security qualitative/quantitative analysis of weighted attack trees,” IFAC
system which is based upon P2DR model,” Information Security and Proceedings Volumes. vol. 46, pp. 133-138, 2013.
Communications Privacy. vols. 6, pp.115-118, 2008
[31] J.-J. Shen, J. Yang, and G. Chen, “Research on network attack
[12] S.-P. Xu, Y.-H. Zhang, Y. Zhou, Y.-Q. Bai, and H.-P. Fu, “Design training simulation system based on attack tree,” Applied Mechanics
and application of a network security model,” Applied Mechanics and Materials. vols. 651-653, pp. 1917-1920, 2014.
and Materials. vols. 347-350, pp. 2773-2776, 2013.
[32] S. Garg, and G.S. Aujla, “An attack tree based comprehensive
[13] R. Han and J. Wu, “Application of P2DR model in security of HIS,” framework for the risk and security assessment of VANET using the
China Medical Devices. vol. 7, pp.81-83, 2013. concepts of game theory and fuzzy logic,” Journal of Emerging
[14] Y. Hu, and M.-C. Dong, “Strengthening the security of network Technologies in Web Intelligence. vol. 6, pp. 247-252, May 2014.
application with SSL protocol,” Automation of Electric Power [33] P. Li, C. Xu, L. Chen, R.C. Wang, and N. Park, “RFID privacy risk
Systems. vol. 26, pp. 70-77, August 2002. evaluation based on synthetic method of extended attack tree and
[15] L. Chen, Y.-F. Wang, and T. Zhang, “Security authentication for information feature entropy,” International Journal of Distributed
smart substation communication based on IEC 62351,” Applied Sensor Networks. vol. 11, 2005.
Mechanics and Materials. vols. 260-261, pp. 91-96, 2013.