You are on page 1of 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/279852991

Security in Smart Grid Environments – Improving IEC 62351

Conference Paper · April 2010

CITATIONS READS

0 116

1 author:

Steffen Fries
Siemens
85 PUBLICATIONS   395 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Steffen Fries on 16 November 2015.

The user has requested enhancement of the downloaded file.


Security in Smart Grid Environments – Improving IEC 62351

Steffen Fries
Siemens AG
Corporate Technology
Germany
steffen.fries@siemens.com

Abstract— Information security has gained tremen- Services, TCP/IP, and Ethernet). Security is ad-
dous importance for energy distribution and energy dressed in an associated standard IEC 62351.
automation systems over the last years. Standards like
IEC61850 offer communication services and data mod- Today, IEC 61850 is mainly used for reporting
els for communication in energy automation. IEC 61850 status and sampled value information from Intelligent
is flanked by the standard IEC 62351 that especially Electronic Devices (IED) to Substation automation
addresses security and specifies technical requirements,
controller as well as for command transport from
which have to be met by vendors. Especially, vendors
that cover the entire energy automation chain with their Substation automation controller to IEDs. It also
product portfolio face new demanding challenges im- addresses the communication directly between IEDs
posed by new use cases that come with the rise of the using the Ethernet instead of dedicated wires.
Smart Grid. This contribution depicts the current state
of the standardization of IEC 62351, gives an overview In the near future it is expected that the related use
of current and new use cases, which are not completely cases will be widened in scope. Smart Home scenar-
covered, and discusses potential enhancements of the ios in combination with the Smart Grid will allow
standard to address new use cases. The enhancements people to understand how their household uses en-
allow multiple parallel distinguishable sessions based on ergy, manage energy use better, and reduce their
MMS and proper authentication as well as authoriza-
tion.
carbon footprint. It will also allow customers to feed
energy back into the smart grid and to participate on
Keywords – Smart Grid, Security, Energy energy market places.
Automation
This requires better control of the energy grid to
ensure the safe transportation and distribution of
I. INTRODUCTION
available energy within the physical energy network.
Decentralized energy generation (e.g., solar cells) Especially fast load changes or changes in the energy
is getting more momentum to fight global warming provisioning through decentralized resources need to
and to cope with the increasing local demand of be managed to ensure a consistent high quality en-
energy. Building a Smart Energy Grid, by introduc- ergy supply.
ing decentralized energy generators into the current
distribution network poses great challenges for the New scenarios will influence the current energy
energy transmission, distribution, and control net- automation architecture in terms of a additional com-
works from the physical as well as from the commu- ponents introduced, like smart meters or energy gate-
nication side. Security is a basic requirement for such ways, which connect households directly to the smart
applications to ensure a safe and reliable operation of grid. This poses new requirements to security like the
the energy grid. provisioning of appropriate credentials to end cus-
tomers to enable secured communication as well as
IEC 61850 is a popular standard for communica- authorization of energy providers to invoke certain
tion in the domain of energy automation. It is as- actions at the household site. Furthermore, it is also
sumed to be the successor of the currently used stan- expected roles leading to new participating parties in
dards IEC 60870-4-104 and DNP3 also for the North the communication architecture will be introduced,
American region. IEC 61850 addresses the data ex- which most likely will lead to new or changed trust
change on process level, field level, and station level relations. An example is a gateway service provider
and defines abstract communication services that are in Smart Grid scenarios, which concentrate the con-
mapped on existing protocols (e.g., MMS1, Web nections of a high number of smart home energy
gateways.
1
Manufacturing Message Specification
II. SECURE ENERGY AUTOMATION BASED ON performed only during connection establishment on
IEC62351 application layer using the MMS initiate command.
In contrast to office networks, automation net- Moreover this authentication does not provide appli-
works have different requirements to security ser- cation layer message integrity and is also not used to
vices as shown in the following figure. form a session. A session in this context crypto-
graphically binds the authentication performed dur-
Office EA-Network ing the connection setup with the subsequent mes-
Confidentiality (Data) High Low – Medium sages exchanged between the communicating peers.
Thus, in the current stage of the standard messages
Integrity (Data) Medium High
on application layer are not protected regarding their
Availability / Reliability Medium High integrity. To achieve integrity protection, the applica-
Non-Repudiation Medium High
tion of the T-Profile is being referred.
Combining A-Profile and T-Profile provides a
Component Lifetime Short - medium Long
connection allowing for authentication, integrity
protection and confidentiality. This approach works
Figure 1: Comparison Office/Automation security fine in scenarios, where the transport connection
For these security services IEC 62351 defines in spans the same entities as the application connections
currently 7 parts explicit measures for TCP based and may be sufficient for many energy automation
and serial protocols used directly in substation auto- scenarios. But it may not cope with all use cases in
mation deploying IEC 61850 and IEC 60870-x pro- the smart grid. As soon as there is a difference in
tocols as well as in adjacent communication proto- transport connection endpoints and application con-
cols supporting energy automation, like ICCP nection endpoints, security problems may arise.
(TASE.2) used for control center communication. A An example scenario is given through proxy com-
clear goal of the standardization of IEC62351 is the bining different connections or to multicast a single
assurance of end-to-end security. command to several other connections. Here, the T-
For TCP based communication this is achieved by Profile is terminated by the proxy, while the applica-
relying on TLS and on integrity protection based on tion connection may be established end-to-end.
keyed hashes or digital signatures for serial links, Hence, no end-to-end application level integrity is
Ethernet links or application layer connections. provided. Such a scenario is called a multi-hop con-
nection from a transport level view and would re-
Nevertheless, there is a gap between the security quire that the proxy is a trusted intermediate host,
services defined on network layer and the ones de- which cannot be guaranteed in many scenarios.
fined on application layer, when considering espe-
cially the new scenarios addressed by smart grid use The presentation depicts smart grid use cases in
cases. which the shortcomings of IEC 62351 are evident
and suggests potential enhancements of the standard
based on existing approaches from multimedia re-
lated standards.
III. MISSING PIECES IN IEC62351
Part 4 of IEC 612351 specifies procedures, proto-
col enhancements, and algorithms targeting the secu- REFERENCES
rity of applications utilizing the MMS. MMS is an [1] RFC 5246: The Transport Layer Security (TLS) Protocol,
international standard (ISO 9506) defining a messag- Version 1.2, T. Dierks, E Rescorla, August 2008
ing system for transferring real time process data and [2] ISO-IEC 61850, Part 8-1: Specific Communication Service
Mapping (SCSM) – Mappings to MMS (ISO 9506-1 and
supervisory control information either between net- ISO 9506-2) and to ISO/IEC 8802-3, May 2004
worked devices or in communication with computer [3] ISO-IEC 62351, Part 4: Communication Network and
applications. System Security – Profiles Including MMS, October 2006
[4] ISO-IEC 62351, Part 5: Security for IEC 60870 and De-
The security in Part 4 is defined as two profiles rivatives, February 2007
targeting transport security as T-Profile on one hand [5] ISO-IEC 62351, Part 6: Security for IEC 61850, October
2006
and application security as A-Profile. The T-Profile
describes the protection of information, which is
exchanged over TCP using TLS. The A-Profile de-
fines security services on application layer, targeting
mainly authentication. The authentication itself is

View publication stats

You might also like