Professional Documents
Culture Documents
A R T I C LE I N FO A B S T R A C T
Keywords: Power systems are undergoing an evolution similar to what telecommunications sector went through several
Substation Automation System (SAS) decades ago. Analog and hard-wired systems are replaced with automated digital ones. Infrastructure designs are
Substation Communication Network (SCN) not static anymore and are geared towards accepting new deployments as easily as possible. Limited data ex-
IEC 61850 changes of the past are giving way to detailed data collection, reporting and analysis. When equipped with smart
Intelligent Electronic Devices (IEDs)
algorithms and techniques such as machine learning, these significantly enhance the capabilities of smart grids.
Sampled Values (SVs)
Generic Object-Oriented Substation Event
Substations are core component of smart grid, where communication system is integrated. However, achieving a
(GOOSE) standard substation communication system that can operate with the principles of plug-and-play (PnP) is not a
trivial task. Considering the cyber-physical nature of power system equipment, integration requires more dili-
gence for safe operation. Furthermore, there are many different types of substation equipment which are
manufactured by, again, countless many vendors. Achieving a common language and interoperability between
them is a difficult task. IEC 61850 standard has been taking strides towards that goal. Its object-oriented
structure makes its versatile while well-defined modeling blocks ensures compatibility. Recent work has focused
on IEC 61850 based modeling of substation equipment, developing message exchange formats for substation
functionalities as well as investigating the performance of different communication technologies when they are
used to implement IEC 61850 based models. This paper reviews these efforts, their benefits to substation op-
eration and possible future work, including cybersecurity considerations.
⁎
Corresponding author.
E-mail address: suhail.hussain@aist.go.jp (S.M.S. Hussain).
https://doi.org/10.1016/j.ijepes.2020.106008
Received 7 February 2020; Accepted 11 March 2020
0142-0615/ © 2020 Elsevier Ltd. All rights reserved.
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
Language (XML) schema for configurations, peer to peer links and communicating power system information in a predefined fashion.
availability of communication conformance tests [2]. With the use of The IEC 61850 standard advocates use of object-oriented approach
IEC 61850 for substation automation system, the performance testing for modeling of engineering tasks in a SAS. The advantage of having an
and functional testing of the IEDs is also changed. Authors in [3] per- abstract interface provides flexibility to the design engineer in adopting
formed functional testing of IEC 61850 based systems. The principles of any underlying technology and protocol for a particular process in a
different IEC 61850 communication-based functions are discussed substation. Abstract interface means that the standard is intended to
along with various factors which affect the system performance. A provide guidelines for describing services rather than information on
comparison between functional testing of conventional and IEC 61850 how these services are to be built. Also, the IEC 61850 standard defines
devices along with the testing methods have been presented in their a set of generic services for client/server interactions and transmission
work. requirements for all sets of measurements in a substation in terms of
Due to emergence of IEC 61850 as the leading protocol for substa- latency, reliability and security. IEC 61850 defines all known functions
tion automation systems (SAS), several studies were reported on the in a substation and splits them into sub-functions known as Logical
applicability and enhancement of usage of the standard for substation Nodes (LNs). Logical nodes are virtual representation of physical de-
functionalities. In [2], the evolutions required during designing, con- vices and exchanges information as per the standard. The term in-
figuring and testing an IEC 61850 based SAS has been presented. The formation modeling is way of exchanging standardized information and
transition from the physical architecture of a substation to a logical is realized by defining logical nodes. A group of logical nodes combine
architecture based on IEC 61850 has also been addressed in [2]. The to form a Logical Device (LD). The implementation details and appli-
roadmap of IEC 61850, as a de facto standard for SAS, including the cation view of the IEC 61850 standard is discussed by authors in [13].
system configuration and interoperable design has also been presented.
The SAS based on IEC 61850 was divided into three levels by author in
2.1. Object oriented modeling of IEC 61850
[4]. The first level was the core function of a substation i.e. the op-
eration of power system, the second being reliability and third being
The IEC 61850 standard adopts object-oriented methodology and
visibility. It also showed how the IEC 61850 protocol is to be employed
technique for modeling the data and data sets in a SAS. Authors in [18]
for system design.
provided a holistic overview of the IEC 61850 standard and the process
The first real time implementation of an IEC 61850 based SAS was
of standardizing the substation data using object-oriented approach.
at the Tennessee Valley Authority’s (TVA) substation [5]. The re-
IEC 61850 standard supports all functions of the substation and its
searchers at TVA believed that the IEC 61850 based communication can
engineering by employing a object-oriented data models which are used
streamline the substation application environment for advanced cap-
to describe the processes to be implemented and controlled in a sub-
abilities and can also result in resource savings in terms of construction,
station. An outline and application view of IEC 61850, describing the
operation, maintenance and data management. Further in this direc-
information model, logical nodes and data objects that are used to re-
tion, to develop industry ready engineers and practitioners, a substation
present a physical device in IEC 61850 standard is discussed in detail in
automation laboratory was developed at Jamia Millia Islamia Uni-
[18].
versity, New Delhi [6].
Further in this direction, the impact of edition 2 of the IEC 61850
IEC 61850 has gained popularity and has become a defacto standard
standard on the object modeling of IEDs has been covered by author in
for substation automation world over. Utilities world over upgraded or
[19]. As per Edition 2 of IEC 61850 standard, complex devices can be
automated the substation according to IEC 61850 [7–12]. This paper
modeled as servers containing multiple logical nodes to realize various
presents a holistic review of different advancements in SAS through IEC
substation functions such as protection, measurement etc. The func-
61850 standard.
tional hierarchy in the nested model is an important parameter to im-
prove the overall efficiency of the device. The changes in the multi-
functional distribution IEDs due to adoption of Edition 2 of IEC 61850
2. IEC 61850 background
has been discussed in their work.
The first edition of IEC 61850 standard series had 10 main parts.
The Table 1 gives the brief description of different parts of IEC 61850 2.2. Information modeling
standard. The first four parts contain information about the standards
concepts and ideology. Information modeling is a well-established and effective method for
The main strength of IEC 61850 standard is the common data model managing information exchanges. Its main purpose is to provide stan-
it uses for devices as well as its unique message protocols for dardized syntax, semantics and hierarchical structures for the data that
Table 1
Description of IEC 61850 standard Parts for SAS.
Parts Description
2
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
is exchanged among different devices and systems. To achieve inter- 61850-90-5 for PMU [21], IEC 61850-90-8 for electric vehicles [22],
operability, all Data Objects (DOs) in the data model need a strong IEC 61850-90-7 for power converters [23], IEC 61850-90-1 for inter-
definition with regard to syntax and semantics. In IEC 61850, the group substation communication [24], IEC 61850 was extended to entire
of DOs that serve specific functions are defined as LNs. Composition of power utility automation systems. Further, based on these standards the
relevant LNs for providing information needed for a particular device is information models for different components such as smart meters [25],
defined as LD. An IED may contain a number of LDs and even one LD DERs [26–28], EV and charging stations [29–31], PMU [32,33], fault
device may be part of different IEDs. current limiters [34] etc., were developed and reported in literature.
A LN consists of a set of DOs, and these DOs can be of any one of The information models contain the data objects and attributes that
following type: Transient (T), Mandatory (M), Optional (O) and are required by a particular component. In order to exchange this in-
Conditional (C). The status of DO with (T) or (M) or (O) or (C) desig- formation for realizing different functions and services, this information
nation specifies whether the DO in the LN is momentary or mandatory model has to be mapped to different protocols. The next section details
or optional or conditional respectively. Interoperability becomes much about different functions, messages and protocols defined in IEC 61850
easier to achieve, when more DOs are defined as mandatory. IEC 61850 for exchanging this information that is modeled in a standardized
standard defines a large number of LNs corresponding to different fashion.
components of power utility systems. Furthermore, IEC 61850 standard
defines the DOs with full semantics which further make the interoper-
ability with the LNs even more convenient. 3. IEC 61850 substation automation systems functions and
To avoid exclusive extensions that are developed by separate enti- requirements
ties in an incompatible way, IEC 61850 specifies normative naming
rules for LN classes and data object names. The LNs have 4 letter names The functions of a SAS are the tasks which are performed inside a
where the first letter corresponds to the group that LN belongs to. substation. These are functions to control, monitor and protect the
Different groups of LNs are defined in IEC 61850-7-4 standard. For equipment of the substation and its feeders [14]. In addition, there exist
example, the LN MMXU belongs to the measurement group. The data functions, which are needed to maintain the SAS, i.e. for system con-
model of the MMXU LN is shown in Fig. 1. The MMXU data model is figuration, communication management or software management.
composed of the instance of the data object phase voltage (PhV) in- These functions of a SAS are logically divided into three levels such as
stantiated from the Common Data Class (CDC) WYE, which is composed process, bay and station levels as shown in Fig. 2. The process level
of phase A voltage (phsA) instantiated from CDC CMV, which is also functions are all functions interfacing to the process. The sensors or
composed of complex value cVal (of type Vector), which is, further, actuators are interfaced to the SAS functions through the process level.
composed of voltage mag (of type AnalogueValue), which is, finally, The bay level functions are functions which uses data of one bay and act
composed of floating-point value f (of type FLOAT32). mainly on primary equipment of one bay. The protection and control
Initially IEC 61850 standard was developed for substation auto- functions of bay which require data or information from other bays are
mation and it contained the information models (i.e. logical nodes de- known as inter bay protection and control functions. The bay level
fined) for different components of substations. Later, with publication communicates with the process level as shown in Fig. 2.
of new parts of IEC 61850 such as IEC 61850-7-420 for DERs [20], IEC The station level functions are divided into two categories, process
related station level function and interface related process level
3
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
functions. The process related station level functions are functions seven types which are further subdivided in to two independent groups
which uses the data of more than one bay or of the complete substation of performance classes.
and acting on the primary equipment of more than one bay or of the
complete substation. The interface related station level functions re- 3.1.1. Type 1 - Fast messages
present interfacing of the substation to local station operator (such as This category of messages contains a single point status data or
Human Machine Interface (HMI)) or to a remote control center or to command such as “trip”, “close”, “start”, “stop” or “block”. The mes-
remote engineering for monitoring and maintenance purposes. sages carrying the “trip” command is further named as Type 1A, while
The devices of a SAS are implemented physically on the process, bay other fast messages are named as Type 1B. The Type 1A message have
and station levels. The process and bay level functions are usually stringent timing requirements and are most important than other fast
performed inside a same device. This does not change the logical in- type of messages.
terpretation but only changes the physical operation. The process level Whenever a fault occurs it is detected by protection devices which
devices include I/O devices, sensors and actuators connected by a respond to it by generating burst of Type 1A Generic Object-Oriented
process bus. The station level devices include IEDs which are used for Substation Event (GOOSE) messages. During fault conditions, the per-
monitoring, control and protection functions. The station level devices iodic heartbeat nature of GOOSE message is changed to burst mode. In
are station level computers, operator’s workplace, remote commu- burst mode, the transmission interval of GOOSE messages increases
nication interface. To fulfill the requirements of a SAS, the functions are sequentially. As an event occurs (such as a fault) the retransmission
decomposed in form of LNs which may reside logically in a physical time of GOOSE message is changed from To to T1, T2, T3, ……Tn such
device. The discussion on LNs has been presented in next subsection. that T1 < T2 < T3 < …. < Tn. The sequential increase in re-
For proper running of functions in a SAS, it is essential and crucial to transmission time ends until Tn reaches to To. After some period of time,
meet the performance requirements of the supporting communication the retransmission time changes back to normal periodic nature as
interface. This includes the total latency, i.e. the total transfer time shown in Fig. 4. The gradual increase in retransmission time in bursts is
between two functions in a SAS. The total transfer time is defined as the adopted in order to increase reliability of the network, since the Type
sum of communication processing delay at sending and receiving end 1A GOOSE message conveys critical commands.
and the propagation delay as shown in Fig. 3.
The transfer time is applicable for the complete transmission chain 3.1.2. Type 2- Medium speed messages
as indicated in Fig. 3. In physical device 1, a function f1 sends data to This category of messages contains transmission of normal state
another function f2, located in physical device 2. The transfer time is information which contains the important message but the time for
sum of processing times at communication processors and the network transmission in noncritical. These messages include a time tag field
transfer time, including queueing and processing time at routers and from the sender, and the receiver is expected to react normally after an
other devices in the network. The testing and verification of transfer inherent time delay computed from the time tag. The medium speed
times for the communication network is performed before deployment message category contains client–server type of messages which are
to ensure reliable operation. either periodic Manufacturing Message Specification (MMS) messages
The data between different functions of a physical device is trans- or event triggered MMS messages.
ferred in form of messages.
3.1.3. Type 3- Low speed messages and Type 7- Command messages
3.1. Message types and structures This category includes messages which are used for slow auto-
control functions, event record transmission, reading/changing set
According to IEC 61850, the different messages are classified into point values etc. Generally, slow speed functions such as transmitting
4
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
non-electrical parameters like pressure, temperature are Type 3 mes- required transmission times.
sages. Also, the Type 7 messages used to send control commands to Messages of type 1 and type 1A are GOOSE, which are mapped
provide access control are same as Type 3 messages with an additional directly to ethernet layer to reduce the protocol stack size as these
feature of password protection. messages are time critical. The transmission of raw data or type 4
messages (SVs) are also mapped directly onto ethernet layer with
3.1.4. Type 4-Raw data messages broadcast/multicast addressing. The GOOSE and SV messages are
This category of messages includes cyclic/periodic sampling mes- normally sent to many IEDs at the same time. Hence, these messages
sages from the instrument transformers. They contain continuous syn- generally are either broadcast or multicast. To broadcast the GOOSE or
chronized data streams generated in a SAS. The Sample Value (SV) SV messages, the destination Media Access Control (MAC) address is
message generated from the Merging Unit (MU) IED which is trans- specified as “FF:FF:FF:FF:FF:FF”. For multicast of these messages the
mitted to Protection and Control (P&C) IED is a typical example of range of MAC address is given in Table 3.
cyclic raw data message. Messages of Type 2, 3, and 5 corresponds to Abstract
Communication Service Interface (ACSI) services which require client
server communication. These type of ACSI services are mapped to MMS
3.1.5. Type 5- File transfer messages protocols with Transport Control Protocol and Internet Protocol (TCP/
This category of message contains bulk of data consisting of re- IP) stack are used. The time synchronization or type 6 messages use
corded files, information files, setting files which are transmitted as and IEEE 1588 Precision Time Protocol (PTP) over UDP/IP transport layer.
when required by a receiver in a randomly selected time. The data is Fig. 5 shows the communication stack mapping of different messages.
split into smaller blocks to allow other network activities to occur in The ethernet frame format/communication stack of GOOSE and SV
between and to ease continuous traffic in the network. A typical File is as shown in Fig. 6. The frame format/communication stack of Man-
Transfer Protocol (FTP) message in a SAS belongs to Type 5 message ufacturing Message Specification (MMS) is as shown in Fig. 7. The MMS
class. protocol is defined to be used on top of TCP/IP stack. Different types of
MMS PDUs and its corresponding tags are shown in Table 4.
3.1.6. Type 6- Time synchronization messages
This category of message contains the synchronization messages for
the internal clocks of IEDs in an SAS. These messages are periodic in 3.2. System configuration language (SCL) for substation automation system
nature and their periodicity is determined based on the accuracy for the
application. However, time synchronization message accuracy must be In Substation Communication Network (SCN), for seamless com-
an order above the accuracy required by the functional requirements of munication, IEDs need to possess some information on specifications of
the application. Table 2 summarizes the different message types and the the substation such as the single line diagram, switchyard
5
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
Table 2
Different Message Types and their Transmission TImes.
Message type Description Transmission times (ms)
Type 1A “Trip” ‘Trip’ which is the most important fast message with demanding requirements < 10 <3
Type 1B “others” Other time critical fast messages such as Trip, Close, Start, Stop, etc. < 100 < 20
Type 2 Messages containing normal ‘state’ information, where transmission time is less critical < 100
Type 3 The messages comprising auto-control functions, transmission of event records, general < 500
presentation of system data which are time-tagged
Type 4 raw data messages < 10 < 3
Type 5 file transfer messages, where large files of data of recording, information or settings are > =1000
transferred
Type 6 The messages used to synchronize the internal clocks of IEDs in system –
Type 7 The messages of high degree of security used for transfer of control orders command messages –
with access control.
6
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
With the adoption of IEC 61850 standard for SAS, the typical
hardwired copper cables in the substation and control centers were
7
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
replaced with the process bus technology. This transition results into work was to create a roadmap for future deployment of different
elimination of potentially hazardous copper cables with cost savings merging units for protection and control applications. Also, interoper-
and creation of spacious substations. The process bus technology is ability testing for different vendor merging units was carried out and it
based upon transfer of current and voltage signals in the substation was found that instantaneous interoperability for certain applications
using IEC 61850-9-2 SVs [17]. This is realized using a device known as does not work in certain vendor combinations.
merging unit which samples the signals from CT/PT and transmits it in In another work [41], directional comparison-based protection
the form of SVs. In the process bus technology, the trip signals are using process bus technique has been carried out. Superimposed Di-
transmitted through high speed peer to peer communication of IEC rectional Comparison-Based Protection (DCBP) scheme in time domain
61850-8-1 GOOSE messages over the Ethernet [16]. This transition mode has been used. Due to communication delays in IEC 61850 which
gave an impetus to research and design in process bus technology for adds up in relay operating time, time domain-based scheme has been
monitoring, protection and control applications. used due to fast operation. PSCAD simulation as well as hardware
To adopt the process bus technology in substation, the performance testing of the scheme has been carried out in their work. From the
of the ethernet switches in the process bus network with respect to the performance evaluation results, it is found that the DCBP scheme is
sampled value transmission is analyzed in [39]. The measurements of insensitive to CT saturation and does not lose dependability and se-
sampled values from a replicated merging unit in their test setup con- curity due to packet loss and latency in data transmission. On similar
firmed that multiple sampled values transmissions can occur at same lines, authors in [42] carried out performance evaluation for SV loss
rate in same time. From their work, it was concluded that the process and delays in process bus communication network for digital protection
bus network is reliable and can be used in future deployments in IEC using a MU developed in laboratory as shown in Fig. 10. The impact of
61850 based substations. SV loss on bus bar protection was analyzed and it was found that
In [40], a multivendor process bus technology design for protection protection IED may malfunction due to SV loss/delay in certain fault
application for use in mesh transmission networks is presented. Also, conditions. Also, from their work, it was concluded that corrective
performance evaluation for multivendor devices (merging units) was measures for SV loss/delay could certainly improve performance of
carried out in the laboratory as shown in Fig. 9. The motive of their process bus communication network for digital protection schemes.
8
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
9
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
been experimentally evaluated by means of real prototypes using FPGA network simulator tool. Also, in their work, algorithm for estimation of
based motherboards. From the experimental results it was concluded sampled value loss based on adaptative filtering using phasor least
that timing gateways prototype was able to perform well on the net- square error approach has been proposed. The sampled value loss es-
work performance metrics such as jitter. In other work [50], hardware timation algorithm has been formulated in MATLAB and tested on a test
evaluation of PTP devices was carried out by analyzing the jitter in system in PSCAD. It is observed that the maximum estimation error for
various grandmaster/slave combinations. Grandmaster, slave, the algorithm ranges about 8.5%. However, the major limitation in the
boundary clocks are the commercially available PTP devices. The per- SV loss estimation approach is that it could only be used for one SV loss
formance test is carried out by comparing jitter of various slave devices in an SV sample.
with the master. The results show that all tested grandmaster and slave Another challenge in the process bus communication network is the
clocks were interoperable, however, a tenfold difference in jitter be- synchronization loss due to which the MUs are unable to generate SV
tween the grandmaster and slave exists between the best and the worst with same sample count in the same second when sampled at the same
combinations. The series of tests carried out in their work can be used instant. The authors in [55] proposed a solution based on propagation
by system designers to evaluate timing components and can be used for delay compensation for SV synchronization in a switched network of a
systematic testing. smart substation. The proposed method does not rely on external re-
In another work, performance of time synchronization network with ference clock, so the reliability of the SV synchronization method is
1588 and for SAS has been reported [51]. With the adoption of 1588 for improved.
timing synchronization by various utilities, there is a need of reliability
assessment for confidence of utility before its final roll out. This was
performed by the authors in their work by assessing the performance of 4.4. Architectures with simulation analysis
a timing-based system based on mixture of receivers and PTP devices. It
was found that high quality systems with appropriate installations and 4.4.1. Typical architecture
engineering is required to meet the stringent accuracy requirement. Various types of IEDs in a SAS and their modeling with a network
The security and availability of PTP based time synchronization is simulator (OPNET) has been presented in [56]. There are three main
tested by authors in [52]. To assess its security, detection and preven- types of IEDs in a SAS viz. MU IED, P&C IED and Breaker IED. The MU
tion attacks related to PTP, delay were simulated and tested on PTP IED is responsible for processing data from the field CT and PT and
time synchronization. A PTP master slave model has been constructed transmitting them digitally on the process bus. The P&C IED combines
and attacks were simulated and experimentally tested using a prob- the protection and control functionalities in a bay of a substation. The
abilistic model checker, PRISM. It is used for quantitative and quali- breaker IED controls the operation of circuit breaker along with its
tative verification for security assessment of protocols. It was concluded condition monitoring. The modeled IEDs has been employed for con-
that the PTP time synchronization method is secure and robust towards struction of a SCN for its performance evaluation. The performance of
PTP delay attacks. raw data messages with and without priority tagging for Local Area
The revision in IEEE 1588, in 2008 created PTPv2 which provides Network (LAN) with different link speeds has been presented. Ex-
greater accuracy for network based timing synchronization with timing haustive performance evaluation results for various types of SAS ar-
error less than ± 100 ns is utilized for process bus synchronization in chitectures presented in their work allows automation engineers to
[53]. The experimental setup for time synchronization testing is shown adopt the best topology as per the requirement.
in Fig. 12. Steady state and dynamic performance tests were performed For accurate performance evaluation of SAS, complete functional
on commercially available PTPv2 clocks for time synchronization for requirements of protection and control in a substation must be con-
MUs. It was concluded that the PTPv2 timing synchronization is within sidered. In this regard, authors in [57] considered a large substation
the tolerable error for sampled value communication. with 14 bays and 159 IEDs. The network performance by analytical and
simulation means in terms of end to end delay, traffic delay and
4.3. Simulation studies probabilistic delay analysis has been carried out in their work. It is
concluded from the results that for finding maximum network delay,
The performance evaluation of process bus network in terms of analytical method is much faster than the simulation method. Also, the
process bus sampling rate, Bit Error Rate (BER) and background traffic maximum traffic on the link is due to the SV traffic which is periodic in
on process bus has been performed by authors in [54]. The performance nature.
evaluation was done using OPNET (now Riverbed Modeler) as the
10
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
11
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
[65], analytical modeling of source and destination traffic has been tested using RTDS. The voltage and current phasors from GTNET-SV
done using network calculus approach. A laboratory setup for an SCN enabled card of RTDS is sent to the FPGA based relay which then issues
has been designed using station PCs, ethernet switches and network a command to the GTNET GOOSE enabled card for circuit breaking. The
analyzer as shown in Fig. 14. The performance of the SCN has been proposed relay was found to make early trip decisions even with fault
analyzed for various scenarios such as heavy traffic, minimum load and located at remote ends and with large CCVT transient errors.
typical event scenarios. The traffic load and network delay proposed by In [73], Fault Location, Isolation and System Restoration (FLISR) for
the analytical method is found to be very close as computed by the Distributed Automation System (DAS) using IEC 61850 information
network analyzer during the laboratory investigation. Thus, the pro- modeling, as shown in Fig. 15, has been proposed. A DAS consist of
posed methodology has been validated and is found to be very reliable more entities than a SAS and the concept of interoperability and in-
for designing SCN traffic flows. In another work [66], for carrying out formation exchange to address the more complex architecture of DAS is
quantitative analysis, traffic flow in an SCN is classified as cyclic, sto- required to be addressed by IEC 61850 standard. Since, IEC 61850 does
chastic and burst data. The performance of an SCN based on the traffic not include information models for FLISR, new logical nodes such as
data modeling has been carried out in OPNET modeler. The concept of Feeder fault location function (FLOC), Fault isolation function (FISO)
Virtual LAN (VLAN) and the impact of faults on the VLAN network is and Non-fault area power restoration function (FRES) are proposed.
also presented. The presented data flow models in their work will act as The proposed logical nodes have been validated by model checking and
the building blocks for system engineers to evaluate the performance of implementation in an IED using intelligent distribution simulation
SCN before its actual deployment. system. The results conform to the validation of proposed logical nodes
Improving this performance evaluation further, authors in [67], development. Further, extending the IEC 61850 beyond substation,
proposed bounded model for the modeling of communication delay. many adaptive protection schemes for distribution system and micro-
Instead of stochastic or average modeling, bounded model is found to grid protection are reported in literature [74–77].
provide more realistic results. System Integrity Protection Scheme In [78], authors have developed an IEC 61850 communication
(SIPS) has been evaluated to determine its latency and the prediction of based line differential protection scheme and its performance is vali-
latency for SIPS is performed through the bounded model. The pro- dated in a Software-In-The-Loop (SITL) setup by a network simulator
posed approach is found to provide relay bounds for SIPS scheme and tool. The communication based differential protection scheme is rea-
works in providing planning, designing and assessment of SIPS net- lized by transferring the SV signal to the distant substation for im-
works. plementing the protection algorithm. For this the LAN based SV mes-
Effect of noise on Wireless LAN (WLAN) based IEC 61850 substation sage protocol stack is added with TCP/IP functionality in the network
is carried out in [68]. Authors have developed a laboratory prototype simulator tool and sent to the distant substation. The results have been
for testing effect of noise on IEC 61850 messages traversing in a sub- presented for different networks such as ATM, SONET and Fiber Optic.
station through IEDs. The prototype has been validated by im- It is concluded from the research that IEC 61850 communication-based
plementing in a real substation in London and Canada. Their work helps protection meets the stringent timing requirements of power system
to prove the effectiveness of WLAN in IEC 61850 based smart substa- protection schemes.
tions. In a similar work, authors have proposed IEC 61850 based ac-
Reliability evaluation of IEC 61850 based SCN components has been celerated distance protection scheme for inter-substation communica-
carried out in [69]. The reliability analysis has been carried out for a tion [79]. The experimental validation and performance evaluation of
modern protection system in IEC 61850 based substation. Reliability GOOSE based accelerated distance protection scheme has been done by
analysis of cyber-physical components has been done by introducing transporting the LAN based GOOSE message through tunneling. Also,
the concept of cyber-physical interface matrix. the authors have developed a SITL setup to study the performance of
Table 5 summarizes the different works reported in literature re- their scheme under different Wide Area Network (WAN) scenarios as
garding performance evaluation in SAS. shown in Fig. 16. It is concluded from their work, that there is a sig-
nificant time saving by using the accelerated GOOSE based distance
5. Application fields protection scheme from the conventional schemes.
A Software Defined Network (SDN) separates the control and the The IEC 61850 standard provides flexibility and interoperability in
data plane into two different entities running in a same network. The automating any type of industry such as mining, semiconductor, oil and
separation of data plane and control plane helps in management of the gas etc. To harness the benefits of IEC 61850, providing greater trans-
network and flexibility in the implementation of solutions that lead to parency in the substation, faster commissioning of a system, structured
operational and capital cost reduction. A review of SDN for its appli- tag names are maintained in the automaton controller. Authors in [80]
cation to power utility automation has been presented by authors in provided solutions for development of nameplates/faceplates for an IEC
[71]. In another work [72], concept of SDN has been applied for 61850 based substation. Their work provides reduction in start-up time,
prioritization of time critical GOOSE messages in an Active Distribution easy configurable SCADA reporting and interfacing of electrical dis-
System Substation. The proposed prioritization algorithm has been tribution system with traditional process control applications. Also, in
validated by running an SDN in a virtual environment. The results in- their work, the process owners can work on a single and standard in-
dicate that among different messages in a substation, the GOOSE terface which adheres to IEC 61850 and provides vendor interoper-
message is prioritized by using SDN concept and reaches destination ability.
with less latency as compared to without prioritization scheme.
5.4. Cybersecurity considerations in substation automation system
5.2. IEC 61850 based adaptive protection
Due to standardized message structure and interoperability, IEC
A high speed distance relaying scheme by taking into consideration 61850 based SAS are prone to cyber-attacks. There have been several
both magnitude and angle of voltage and current phasors is developed attempts to present cybersecurity attacks in SAS. Authors in [81] dis-
in [70]. The authors in their work have implemented their proposed cussed three types of attacks on GOOSE messages known as GOOSE
high-speed distance relaying scheme on a FPGA board. To validate the poisoning. These attacks are high-status number attack, high rate
performance of their proposed relaying scheme, the proposed relay was flooding attack and semantic attack. In high-status number attack the
12
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
Table 5
Performance Evaluation of SAS.
Reference Year Focus of work Simulation Analytical Experimental SAS Architecture Implementation
Fig. 15. Breaker level Fault location isolation and restoration system design proposed in [73].
attacker multicasts a single spoofed GOOSE message with high status flooding attack also known as status number flooding attack, the at-
number. When the spoofed GOOSE message reaches the GOOSE sub- tacker multicasts a range of spoofed GOOSE messages with increasing
scribers, it discards the other legitimate GOOSE messages with status status numbers. This causes the GOOSE subscriber to expect a very
number equal to or less than that of spoofed messages. In high rate high-status number for the next GOOSE message. In sematic attack, the
13
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
Fig. 16. Accelerated GOOSE based distance protection scheme proposed in [79].
attacker firstly observes the network traffic and determines the rate of consider confidentiality as major security requirement for GOOSE and
status change. Then, the attacker multicasts spoofed GOOSE messages SV message in SAS. The IEC 62351-6 [93] standard proposes use of RSA
with a different rate. When these GOOSE messages reach GOOSE sub- based digital signatures for securing GOOSE and SV messages in SAS.
scribers, the subscriber is unable to process the legitimate GOOSE However, studies reported in [94,95] have concluded that RSA based
messages. Similar type of replay and tampering attacks on GOOSE digital signatures result in higher processing times and thus, cannot
messages have also been discussed in [82,83]. The GOOSE message applied for time critical GOOSE and SV messages. Alternatively, HMAC
inherently do not have confidentiality and authenticity due to which based security schemes were proposed for securing GOOSE and SV
these spoofing attacks are possible. messages [96,97]. For MMS messages, the IEC 62351-4 recommends
Authors in [84] presented a scheme to audit the security of IEC transport layer security (TLS), as per RFC 5246, having cipher suite
61850 based substation. It was concluded from their research that in- TLS_DH_DSS_WITH_AES_256_SHA [98]. In [99] authors present a
trusion detection for IEC 61850 networks must be employed as a viable comprehensive review of IEC 62351 security mechanism for securing
security countermeasure. Node authentication of all the entities in the IEC 61850 messages.
network solves the problem of network intrusions. Authors in [85]
discussed cyber intrusion attacks on GOOSE and SV messages. With 6. Conclusion and future work
intrusion, the GOOSE messages can be modified which leads to false
tripping of circuit breakers in substations. Intruded SV messages can With the emergence of IEC 61850 as the leading standard for sub-
lead to sending of fabricated values to control centers which conse- station automation, in recent years many efforts were focused on IEC
quently result in false conclusions and operational decisions. Authors in 61850 based substation automation. This paper presents a holistic re-
[86] presents integrated Anomaly Detection System (ADS) to prevent view of IEC 61850 based SASs.
intruders gaining access to SAS. Similarly, in [87] an intrusion detec- With the increasing impetus towards renewable energy integration
tion system is developed by using data collected from simulated attacks in power sector, the common services and interfaces for DER, EV in-
on IEDs and packet sniffing attacks using forged address resolution tegration must be made available. In this regard, new extensions of IEC
protocol (ARP) packets. However, still these detection systems do not 61850 are published and updated covering entire power utility auto-
fulfill the authenticity and message integrity security requirements and mation. Although, standardized DER functions have been dealt in IEC
hence are prone to intrusion attacks. Authors in [88] presented Man In 61850-7-420, 90-7 and 90-5 standards, still services and interfaces for
The Middle (MITM) attack on IEC 61850 MMS messages by ARP DER, EVs leading to a secure adaptation of the functional structure
spoofing. Based upon the MITM attack, the attacker may further launch which can provide a more efficient energy system must be investigated
series of new attacks such as eavesdropping, masquerade, false data and developed.
injection, replay and DoS. Malicious fault injection attack and hardware Future work can be focused on developing the IEC 61850 in-
Trojan attack were implemented on embedded systems in [89]. This formation models and functions for new equipment such as smart in-
study was done to know the impact of these attacks on substation se- verters, Distributed Energy Resource - Management Systems (DERMS),
curity and, eventually, power grid integrity and availability. Their re- Virtual Synchronous Generators (VSGs), etc. Also, cybersecurity is a
search concluded that efficient countermeasures to prevent these at- must as the research shows. Its implementation is required for security
tacks must be designed and developed to safeguard the SAS. while it should be ensured that timing requirements are satisfied for
Review of cyberattacks and their challenges in IEC 61850 based proper operation.
SASs are discussed in [90–92]. To address these cybersecurity chal-
lenges IEC 62,351 standard series is developed which provides guide-
lines for securing IEC 61850 messages. Declaration of Competing Interest
For GOOSE and SV messages, IEC 62351 identifies that integrity and
authentication are major security requirements. However, it does not The authors declare that they have no known competing financial
interests or personal relationships that could have appeared to
14
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
influence the work reported in this paper. communication based integrated EV charging management in smart grids. IEEE
Trans Veh Technol 2018;67(8):7690–7.
[30] Nsonga P, Hussain SMS, Ali I, Ustun TS. Using IEC 61850 and IEEE WAVE standards
Acknowledgement in ad-hoc networks for electric vehicle charging management. In: 2016 IEEE online
conference on green communications (OnlineGreenComm); 2016, p. 39–44.
This work was supported in part by AIST Research and Innovation [31] Aftab MA, Hussain SMS, Ali I, Ustun TS. IEC 61850 and XMPP communication
based energy management in microgrids considering electric vehicles. IEEE Access
Fund 2019. 2018;6:35657–68.
[32] Ali I, Aftab MA, Hussain SMS. Performance comparison of IEC 61850–90-5 and
References IEEE C37.118.2 based wide area PMU communication networks. J Mod Power Syst
Clean Energy 2016;4(3):487–95.
[33] Khan R, Mclaughlin K, Laverty D, Sezer S. Design and implementation of security
[1] McDonald JD. Substation automation. IEEE Power Energy Mag 2003;99(2):22–31. gateway for synchrophasor based real-time control and monitoring in smart grid.
[2] Hossenlopp L. Engineering perspectives on IEC 61850. IEEE Power Energy Mag IEEE Access 2017;5:11626–44.
2007;5(3):45–50. [34] Ustun TS, Ozansoy C, Zayegh A. Extending IEC 61850-7-420 for distributed gen-
[3] Apostolov A, Vandiver B. Functional testing of IEC 61850 based protection relays. erators with fault current limiters. In: 2011 IEEE PES innovative smart grid tech-
In: 2007 60th annual conference for protective relay engineers; 2007, p. 333–40. nologies; 2011, p. 1–8.
[4] Myrda P, Donahoe K. The true vision of automation. IEEE Power Energy Mag [35] Zhu L, Shi D, Wang P. IEC 61850-based information model and configuration de-
2007;5(3):32–44. scription of communication network in Substation Automation. IEEE Trans Power
[5] Ingram M, Ehlers R. Toward effective substation automation. IEEE Power Energy Deliv 2014;29(1):97–107.
Mag 2007;5(3):67–73. [36] Hadbah A, Ustun TS, Kalam A. Using IEDScout software for managing multivendor
[6] Thomas MS, Kothari DP, Prakash A. Design, development, and commissioning of a IEC61850 IEDs in substation automation systems. In: 2014 IEEE international
substation automation laboratory to enhance learning. IEEE Trans Educ conference on smart grid communications (SmartGridComm); 2014, p. 67–72.
2011;54(2):286–93. [37] Clavel F, Savary E, Angays P, Vieux-Melchior A. Integration of a new standard: a
[7] Semjan A, Ji N. Experience sharing - challenges and solutions on IEC 61850 sub- network simulator of IEC 61850 architectures for electrical substations. IEEE Ind
station commissioning and supervision in Thailand. In: 2019 IEEE PES GTD grand Appl Mag 2015;21(1):41–8.
international conference and exposition Asia (GTD Asia); 2019. p. 228–34. [38] Aftab MA, Hussain SMS, Ali I, Ustun TS. A novel SCL configuration method for
[8] Vardhan H, Ramlachan R, Szela W, Gdowik E. Deploying digital substations: modeling microgrids with IEC 61850. IEEE Syst J 2019:1–8.
Experience with a digital substation pilot in North America. In: 2018 71st annual [39] Ingram DME, Schaub P, Taylor RR, Campbell DA. Performance analysis of IEC
conference for protective relay engineers (CPRE); 2018. p. 1–9. 61850 sampled value process bus networks. IEEE Trans Ind Informatics
[9] Newman P, Boucherit M, Diemer P, Varghese A, Pavaiya N. IEC 61850 process bus 2013;9(3):1445–54.
application in energinet, Denmark. In: 12th IET international conference on de- [40] Yang L, Crossley PA, Wen A, Chatfield R, Wright J. Design and performance testing
velopments in power system protection (DPSP 2014); 2014, p. 8.2.5–8.2.5. of a multivendor IEC61850–9-2 process bus based protection scheme. IEEE Trans
[10] Al Obaidli S, et al. IEC 61850 beyond compliance: A case study of modernizing Smart Grid 2014;5(3):1159–64.
automation systems in transmission power substations in Emirate of Dubai towards [41] Zadeh MRD, Sidhu TS, Klimek A. Implementation and testing of directional com-
smart grid. In: 2017 Saudi Arabia Smart Grid (SASG); 2017, p. 1–9. parison bus protection based on IEC61850 process bus. IEEE Trans Power Deliv
[11] Buhagiar T, Cayuela J-P, Procopiou A, Richards S. Poste intelligent - the next 2011;26(3):1530–7.
generation smart substation for the French power grid. In: 13th international con- [42] Kanabar MG, Sidhu TS, Zadeh MRD. Laboratory investigation of IEC 61850-9-2-
ference on development in power system protection 2016 (DPSP); 2016, p. 4–4. based busbar and distance relaying with corrective measure for sampled value loss/
[12] Chikuni E, Engelbrecht F, Okoro OI, Dondo M. The emergence of substation auto- delay. IEEE Trans Power Deliv 2011;26(4):2587–95.
mation in Southern Africa, opportunities, challenges and threats. In: 2010 inter- [43] Ingram DME, Schaub P, Taylor RR, Campbell DA. System-level tests of transformer
national conference on power system technology; 2010, p. 1–5. differential protection using an IEC 61850 process bus. IEEE Trans Power Deliv
[13] Ozansoy CR, Zayegh A, Kalam A. The application-view model of the international 2014;29(3):1382–9.
standard IEC 61850. IEEE Trans Power Deliv 2009;24(3):1132–9. [44] Ingram DME, Schaub P, Taylor RR, Campbell DA. Network interactions and per-
[14] Communication networks and systems for power utility automation - Part 5: formance of a multifunction IEC 61850 process bus. IEEE Trans Ind Electron
Communication requirements for functions and device models, 2.0. IEC 61850-5, 2013;60(12):5933–42.
IEC; 2013. [45] Ingram DME, Steinhauser F, Marinescu C, Taylor RR, Schaub P, Campbell DA.
[15] Communication networks and systems for power utility automation - Part 7-4: Basic Direct evaluation of IEC 61850-9-2 process bus network performance. IEEE Trans
communication structure - Compatible logical node classes and data object classes, Smart Grid 2012;3(4):1853–4.
2.0. IEC 61850-7-4. IEC. [46] Gaouda AM, et al. A smart IEC 61850 merging unit for impending fault detection in
[16] Communication networks and systems for power utility automation - Part 8-1: transformers. IEEE Trans Smart Grid 2018;9(3):1812–21.
Specific communication service mapping (SCSM) - Mappings to MMS (ISO 9506-1 [47] IEEE standard for a precision clock synchronization protocol for networked mea-
and ISO 9506-2) and to ISO/IEC 8802-3, 2.0. IEC 61850-8-1, IEC; 2011. surement and control systems. IEEE Std 1588-2008. IEEE; 2008.
[17] Communication networks and systems for power utility automation - Part 9-2: [48] De Dominicis CM, Ferrari P, Flammini A, Rinaldi S, Quarantelli M. On the use of
Specific communication service mapping (SCSM) - Sampled values over ISO/IEC IEEE 1588 in existing IEC 61850-based SASs: Current behavior and future chal-
8802-3, 2.0. IEC 61850-9-2, IEC; 2011. lenges. IEEE Trans Instrum Meas 2011;60(9):3070–81.
[18] Ozansoy CR, Zayegh A, Kalam A. Object modeling of data and datasets in the in- [49] Ferrari P, Flammini A, Rinaldi S, Prytz G. Evaluation of time gateways for syn-
ternational standard IEC 61850. IEEE Trans Power Deliv 2009;24(3):1140–7. chronization of substation automation systems. IEEE Trans Instrum Meas
[19] Apostolov A. Impact of IEC 61850 edition 2 on the object modeling of distribution 2012;61(10):2612–21.
protection IEDs. CIRED Open Access Proc J 2017;20(1):1184–7. [50] Ingram DME, Schaub P, Campbell DA, Taylor RR. Performance analysis of PTP
[20] Communication networks and systems for power utility automation - Part 7-420: components for IEC 61850 process bus applications. IEEE Trans Instrum Meas
Basic communication structure - Distributed energy resources logical nodes, 1st ed. 2013;62(4):710–9.
IEC 61850-7-420. IEC; 2009. [51] Guo H, Crossley P. Design of a time synchronization system based on GPS and IEEE
[21] Communication networks and systems for power utility automation - Part 90-5: Use 1588 for transmission substations. IEEE Trans Power Deliv 2017;32(4):2091–100.
of IEC 61850 to transmit synchrophasor information according to IEEE C37.118, 1. [52] Moussa B, Debbabi M, Assi C. A detection and mitigation model for PTP delay
0. IEC 61850-90-5. IEC; 2012. attack in an IEC 61850 substation. IEEE Trans Smart Grid 2018;9(5):3954–65.
[22] Communication networks and systems for power utility automation - Part 90-8: [53] Ingram DME, Schaub P, Campbell DA. Use of precision time protocol to synchronize
Object model for E-mobility, 1.0. IEC 61850-90-8. IEC; 2016. sampled-value process buses. IEEE Trans Instrum Meas 2012;61(5):1173–80.
[23] Communication networks and systems for power utility automation - Part 90-7: [54] Kanabar MG, Sidhu TS. Performance of IEC 61850-9-2 process bus and corrective
Object models for power converters in distributed energy resources (DER) systems, measure for digital relaying. IEEE Trans Power Deliv 2011;26(2):725–35.
1.0. IEC 61850-90-7. IEC; 2013. [55] Zhang Y, Cai Z, Li X, He R. Propagation delay measurement and compensation for
[24] Ali I, Hussain SMS. Control and management of distribution system with integrated sampled value synchronization in a smart substation. CSEE J Power Energy Syst
DERs via IEC 61850 based communication. Eng Sci Technol an Int J 2017;3(2):196–202.
2017;20(3):956–64. [56] Sidhu TS, Yin Y. Modelling and simulation for performance evaluation of IEC61850-
[25] Hussain SMS, Tak A, Ustun TS, Ali I. Communication Modeling of solar home based substation communication systems. IEEE Trans Power Deliv
system and smart meter in smart grids. IEEE Access 2018;6:16985–96. 2007;22(3):1482–9.
[26] Ustun TS, Cagil O, Zayegh A. Distributed Energy Resources (DER) object modeling [57] dos Santos A, et al. Characterization of substation process bus network delays. IEEE
with IEC 61850–7–420. In: Australasian universities power engineering conference Trans Ind Informatics 2018;14(5):2085–94.
(AUPEC); 2011. [58] Thomas MS, Ali I. Reliable, fast, and deterministic substation communication net-
[27] Ustun TS, Ozansoy C, Zayegh A. Modeling of a centralized microgrid protection work architecture and its performance simulation. IEEE Trans Power Deliv
system and distributed energy resources according to IEC 61850-7-420. IEEE Trans 2010;25(4):2364–70.
Power Syst 2012;27(3):1560–7. [59] Liu X, Pang J, Zhang L, Xu D, Member S. A high-reliability and determinacy ar-
[28] Ustun TS, Hussain SMS, Kikusato H. IEC 61850-based communication modeling of chitecture for smart substation process-level network based on cobweb topology.
EV charge-discharge management for maximum PV generation. IEEE Access IEEE Trans Power Deliv 2014;29(2):842–50.
2019;7:4219–31. [60] Araujo JÁ, Lázaro J, Astarloa A, Zuloaga A, Gárate JI. PRP and HSR for high
[29] Hussain SMS, Ustun TS, Nsonga P, Ali I. IEEE 1609 WAVE and IEC 61850 standard availability networks in power utility automation: a method for redundant frames
15
M.A. Aftab, et al. Electrical Power and Energy Systems 120 (2020) 106008
discarding. IEEE Trans Smart Grid 2015;6(5):2325–32. [80] Mazur DC, Kreiter JH, Rourke ME, Syme E. Developing protective relay faceplates:
[61] Chen X, Guo H, Crossley P. Interoperability performance assessment of multivendor taking advantage of the benefits of IEC 61850. IEEE Ind Appl Mag
IEC61850 process bus. IEEE Trans Power Deliv 2016;31(4):1934–44. 2015;21(1):33–40.
[62] Suhail Hussain SM, Aftab MA, Ali I. A novel PRP based deterministic, redundant [81] Kush NE, Ahmed E, Branagan M, Foo. Poisoned GOOSE: exploiting the GOOSE
and resilient IEC 61850 substation communication architecture. Perspect Sci protocol. In: Twelfth Australasian information security conference (AISC 2014);
2016;8:747–50. 2014, p. 17–22.
[63] Nsaif SA, Rhee JM. RMT: a novel algorithm for reducing multicast traffic in HSR [82] Caserza Magro M, Pinceti P, Rocca L, Rossi G. Safety related functions with IEC
protocol networks. J Commun Networks 2016;18(1):123–31. 61850 GOOSE messaging. Int J Electr Power Energy Syst 2019;104:515–23.
[64] Ngo HD, Yang HS. Latency and traffic reduction for process-level network in smart [83] da Silva LE, Coury DV. A new methodology for real-time detection of attacks in IEC
substation based on high-availability seamless redundancy. IEEE Trans Ind Electron 61850-based systems. Electr Power Syst Res 2017;143:825–33.
2016;63(4):2181–9. [84] Premaratne U, Samarabandu J, Sidhu T, Beresh R, Tan J-C. Security analysis and
[65] Zhang Y, Cai Z, Li X, He R. Analytical modeling of traffic flow in the substation auditing of IEC61850-based automated substations. IEEE Trans Power Deliv
communication network. IEEE Trans Power Deliv Oct. 2015;30(5):2119–27. 2010;25(4):2346–55.
[66] Zhang Z, Huang X, Keune B, Cao Y, Li Y. Modeling and simulation of data flow for [85] Hong J, Liu C-C, Govindarasu M. Detection of cyber intrusions using network-based
VLAN-based communication in substations. IEEE Syst J 2017;11(4):2467–78. multicast messages for substation automation. ISGT 2014;2014:1–5.
[67] Huang C, Li F, Ding T, Jiang Y, Guo J, Liu Y. A bounded model of the commu- [86] Hong J, Liu C-C, Govindarasu M. Integrated anomaly detection for cyber security of
nication delay for system integrity protection schemes. IEEE Trans Power Deliv the substations. IEEE Trans Smart Grid 2014;5(4):1643–53.
2016;31(4):1921–33. [87] Premaratne UK, Samarabandu J, Sidhu TS, Beresh R, Tan J-C. An intrusion detec-
[68] Parikh PP, Sidhu TS, Shami A. A comprehensive investigation of wireless LAN for tion system for IEC61850 automated substations. IEEE Trans Power Deliv
IEC 61850–based smart distribution substation applications. IEEE Trans Ind 2010;25(4):2376–83.
Informatics 2013;9(3):1466–76. [88] Kang B, et al. Investigating cyber-physical attacks against IEC 61850 photovoltaic
[69] Lei H, Singh C, Sprintson A. Reliability modeling and analysis of IEC 61850 based inverter installations. In: 2015 IEEE 20th conference on emerging technologies &
substation protection systems. IEEE Trans Smart Grid 2014;5(5):2194–202. factory automation (ETFA); 2015, p. 1–8.
[70] Jin X, Gokaraju R, Wierckx R, Nayak O. High speed digital distance relaying scheme [89] Chattopadhyay A, Ukil A, Jap D, Bhasin S. Toward threat of implementation attacks
using FPGA and IEC 61850. IEEE Trans Smart Grid 2018;9(5):4383–93. on substation security: case study on fault detection and isolation. IEEE Trans Ind
[71] Leal EA, Botero JF. Transforming communication networks in power substations Informatics 2018;14(6):2442–51.
through SDN. IEEE Lat Am Trans 2016;14(10):4409–15. [90] Rashid MTA, Yussof S, Yusoff Y, Ismail R. A review of security attacks on IEC61850
[72] Ali I, Aftab MA, Hussain SMS, Gupta S. Software defined networks for smart sub- substation automation system network. Proceedings of the 6th international con-
stations in an active distribution system. J Eng Res 2019;7(1). ference on information technology and multimedia. 2014. p. 5–10.
[73] Ling W, Liu D, Lu Y, Du P, Pan F. IEC 61850 model expansion toward distributed [91] Cai J, Zheng Y, Zhou Z. Review of cyber-security challenges and measures in smart
fault localization, isolation, and supply restoration. IEEE Trans Power Deliv substation. In: 2016 international conference on smart grid and clean energy
2014;29(3):977–84. technologies (ICSGCE); 2016, p. 65–9.
[74] Ustun TS, Ozansoy C, Zayegh A. Simulation of communication infrastructure of a [92] Volkova A, Niedermeier M, Basmadjian R, de Meer H. Security challenges in control
centralized microgrid protection system based on IEC 61850-7-420. In: 2012 IEEE network protocols: a survey. IEEE Commun Surv Tutorials 2019;21(1):619–39.
third international conference on smart grid communications (SmartGridComm); [93] Power systems management and associated information exchange-Data and com-
2012, p. 492–97. munications security, Part 6: Security for IEC 61850. IEC 62351-6, IEC; 2007.
[75] Ustun TS, Khan RH, Hadbah A, Kalam A. An adaptive microgrid protection scheme [94] Tesfay TT, Le Boudec J-Y. Experimental comparison of multicast authentication for
based on a wide-area smart grid communications network. In: 2013 IEEE Latin- wide area monitoring systems. IEEE Trans Smart Grid 2018;9(5):4394–404.
America Conf. Commun. LATINCOM 2013 - Conf. Proc.; 2013. [95] Farooq SM, Hussain SMS, Ustun TS. Performance evaluation and analysis of IEC
[76] Alvarez de Sotomayor A, Della Giustina D, Massa G, Dedè A, Ramos F, Barbato A, 62351–6 probabilistic signature scheme for securing GOOSE messages. IEEE Access
et al. 61850-based adaptive protection system for the MV distribution smart grid. 2019;7:32343–51.
Sustain Energy, Grids Networks 2018;15:26–33. [96] Hussain SMS, Farooq SM, Ustun TS. Analysis and implementation of message au-
[77] Ali NH, Eissa MM. Accelerating the protection schemes through IEC 61850 proto- thentication code (MAC) algorithms for GOOSE message security. IEEE Access
cols. Int J Electr Power Energy Syst 2018;102:189–200. 2019;7:80980–4.
[78] Ali I, Hussain SMS, Tak A, Ustun TS. Communication modeling for differential [97] Farooq SM, Hussain SMS, Ustun TS. S-GoSV: framework for generating secure IEC
protection in IEC-61850-based substations. IEEE Trans Ind Appl 61850 GOOSE and sample value messages. Energies 2019;12(13):2536.
2018;54(1):135–42. [98] Power systems management and associated information exchange - Data and
[79] Aftab MA, Roostaee S, Suhail Hussain SM, Ali I, Thomas MS, Mehfuz S. Performance communications security - Part 4: Profiles including MMS and derivatives. IEC
evaluation of IEC 61850 GOOSE-based inter-substation communication for ac- 62351-4, IEC; 2018.
celerated distance protection scheme. IET Gener Transm Distrib [99] Hussain SMS, Ustun TS, Kalam A. A review of IEC 62351 security mechanisms for
2018;12(18):4089–98. IEC 61850 message exchanges. IEEE Trans Ind Informatics 2019:1.
16