You are on page 1of 6

Whitepaper

Cyber Security
Practical considerations for implementing IEC 62351
Cybersecurity for Substation Automation Systems

1. Introduction Application
Data Model (Objects, Services)
Two trends are currently changing substation automation systems:
IEC 61850 and the need for increased cyber security. IEC 61850 Client Server Sampled
GOOSE*
has gained global acceptance by both vendors as well as Communication Values

customers. Cyber security on the other hand has quickly become Abstract
Communication
one of the most dominant topics for control systems in general Services
Interface (ACSI)
Mapping (split data model from communication)
and electrical utilities in particular. The combination of the two, Stack
Interface
securing IEC 61850 based communications, has been one of the
goals of the recently published technical specification IEC 62351. MMS

Realtime Priority
communication
In the authors‟ view IEC 62351 is overall a good starting TCP

point and will be the future standard to help secure IEC 61850 ISO/OSI-Stack IP
Hierarchical set of rules how
communication. However, there are some shortcomings of the information is coded for transmission Ethernet Link Layer
According to state-of-the art
current standard and some challenges that need to be addressed communication technology Ethernet Physical Layer with Priority tagging (100 Mbit/s)

before IEC 62351 can be implemented and gain wide acceptance. *Generic Object Oriented Stack selection according to the state-of-the-art
Substation Event Communication technology

This paper will highlight the challenge of addressing secure Figure 1: IEC61850 Communication Services Overview
communication in the substation real-time environment,
complying with the IEC 61850 real-time specifications. The
major difficulties are to reach the performance defined in
IEC 61850 for GOOSE and SV data with today’s proposed
technical specification defined for IEC 62351 part 6.

In chapter 2, we will give a short overview about the structure of The standard defines strict interoperability rules between
IEC 61850 as well as the detailed performance requirements for the functions and devices, independent of the device manufacturer,
various data types. Chapter 3 will present an introduction of the IEC providing protection, monitoring, control and automation. IEC
62351 standard including the used methods to secure the IEC 61850 61850 was published as a standard by IEC in fourteen parts
communication. Chapter 4 will then show the major implementation between 2003 and 2005 [1]. In the meantime, this standard has
issues of IEC 62351 part 6. Chapters 5 and 6 highlight two of the gained global acceptance and several thousands of substations
main remaining challenges: interoperability and manageability worldwide have been energized. The standardization activity
of security solutions. This paper focuses on IEC61850 based has reached a next step and the Edition II of IEC 61850 should
systems, security, however, must be addressed for all computer be available by end of 2010. Due to the fact that the technical
systems and communication. Most of the challenges mentioned specification IEC 62351 is not jet finalized, security is not finally
in this paper are not limited to IEC61850 based systems, but are addressed in IEC 61850 Edition II but it will come in a later step.
general in nature. Even system based on serial communications
cannot work properly without any security measures. A key feature of IEC 61850 is that it separates the application
from the communication by means of an abstract interface. A
2. IEC 61850 Overview domain-specific, object-oriented function and device model
IEC 61850 is the first and only global standard that considers all describes the application data with all services needed. The
communication needs within the substation automation environment. functions can be allocated freely to different devices.
Rate
Accuracy classes Resolution (Bits) Part Title Status
Data type Class (Samples/s)
and harmonics Amplitude
Frequency
Communication network and system security –
Voltage 12 1 TS
Class 0.5 (IEC 62053-22) Introduction to security issues
M1 Class 0.2 (IEC 60044-8) 1500
2 Glossary of terms TS
Current Up to 5th harmonic 14
3 Security for profiles including TCP/IP TS

Voltage 14 4 Profiles including MMS TS


Class 0.2 (IEC 62053-22)
M2 Class 0.1 (IEC 60044-8) 4000 5 Security for IEC 60870-5 and derivatives TS
Current Up to 13th harmonic 16 6 Security for IEC 61850 TS
Network and system management (NSM) data
7 CDTS
Voltage 16 object models
Class 0.1
M3 (not defined by IEC) 12000 8 Role-Based Access Control ACDV
Current Up to 40th harmonic 18 Key Management (Certificate Handling) NWP
Security Architecture NWP

Figure 2: Performance classes for raw data messages used for metering Table 1: Overview of IEC 62351 standard series

As shown in Figure 1 the stack, selected from mainstream 3. Introduction to IEC 62351
communication technology, comprises MMS (Manufacturing The scope of the IEC 62351 series is information security for
Message Specification) over TCP/IP and Ethernet. The power system control operations. Its primary objective is to
object model is mapped in a standardized way to the MMS undertake the development of standards for security of the
application layer, but time critical messages pass directly communication protocols defined by IEC TC 57, specifically
to the link layer of Ethernet. Specific performance classes the IEC 60870-5 series, the IEC 60870-6 series, the IEC 61850
are defined for the different communication methods. series, the IEC 61970 series, and the IEC 61968 series.

Goose messages like trip, interlocking and inter-trip signals The IEC 62351 standard is currently divided into 8 parts. As
belong to the fast messages which should be transmitted shown in Table 1 parts 1 - 6 are officially categorized as TS
within 10ms (Performance Class P1). For some signals (technical specification) and released by IEC. Parts 7 and 8 are
event within 3ms (Performance Class P2/3) are specified. currently under development, with the current state of part 7
For Sampled Values (SV) the IEC61850-5 standard defines being “Circulated Draft Technical Specification” (CDTS) and Part 8
several performance classes for raw data messages from being “Draft approved for Committee Draft with Vote” (ACDV). In
digitizing transducers and digital instrument transformers. addition, two new work item proposals (NWP) exist to address “Key
management (certificate handling)” and “Security Architecture”.
As show in Figure 2 the performance classes start with class
M1 (sample rate of 1,5 kHz) refers to revenue metering with In this paper we will focus mainly on parts 3, 4, and 6,
accuracy class 0.5, performance class M2 (sample rate of 4 with an emphasis on part 6 because it defines
kHz) refers to revenue metering with accuracy class 0.2 and specific requirements for IEC 61850 based communications.
performance class M3 (sample rate of 12 kHz) refers to quality
metering. Therefore, the devices have to process the raw As discussed in the previous section IEC 61850 communications
data each 666 us in performance class M1, each 250 us in can be divided into client server (i.e., MMS) and real time (i.e.,
performance class M2 and each 83 us in performance class M3. GOOSE and Sample Values) communications. IEC 62351 provides
different methods for securing the different communication types:
For Client - Server communication there are no explicit • MMS (IEC 61850-8-1): securing MMS traffic is done on the
timing requirements defined but nevertheless IEC 61850 application and the transport level. Peer authentication is
clients have to receive several hundreds of events performed on the application level by carrying authentication
information in the ACSE AARQ and AARE PDUs [2]. Authentication
from the various protection and control IED‟s.
information comprises a X.509 encoded certificate, a time stamp
and the digitally signed time value. For security on the transport
Any security standard that attempts to secure IEC 61850 layer IEC 62351 refers to TLS [4]. It specifies to us port 3782 for
based traffic must take these performance requirements into secure communications instead of standard port 102. It also
account. The fast response times that are required for some of specifies a set of mandatory and recommended cipher suites to
the communication types coupled with the limited processing be used, at a minimum TLS_DH_DSS_WITH_AES_256_SHA1 and
TLS_DH_RSA_WITH_AES_128_SHA2 must be supported.
capabilities of some of the device (e.g., IEDs) present a clear
challenge. We will look at these challenges in the following
sections and analyze if and how IEC 62351 addresses them.
• GOOSE / Sampled Values: security of real-time traffic is limited to Pentium M 1.7 GHz Intel Core 2 Duo @ 2.2 GHz
message authentication, i.e., use encryption is not specified. Key-size
(1GB RAM) (2 GB RAM)
Message authentication is defined by extending the GOOSE / SV
PDUs with an authentication value that is calculated by signing a 1024 6.8 ms 4 ms
SHA256 hash using RSA [3]. Certificate exchange is not done as 512 3.9 ms 1.5 ms
part of the messages; X.509 encoded certificates must be pre-
Table 2: Time use for RSA signature operations
installed on the receiving nodes.

A more promising approach that has been followed after the


Protocol extensions to the affected communication standards first study was to base cryptographic operations on special
are required in order to actually be able to implement IEC 62351. purpose hardware. However, the results from the hardware
IEC 61850 does not yet include these necessary extensions implementation could not meet the strict real-time constraints
in its current release. The upcoming Edition II will also not of GOOSE and SV. Even with an increment of several hundred
completely cover this because IEC 62351 is not yet finalized. dollars in hardware production costs per device the real-time
performance of 3ms for GOOSE massages and the support for
4. Performance issues in IEC 62351 Part 6 12 kHz SV sampling rates remain very difficult to achieve.
Performance impacts should always be considered for any
communication infrastructure before introducing encryption FPGA Platforms
and / or message authentication. This is particularly true if Table 3 shows a summary of the performance measures using
asymmetric cryptography, real-time traffic or systems with FPGA based solutions. The overhead for message authentication
limited resources are involved. In case of securing GOOSE (i.e., calculation of the hash and RSA signing by sender, calculation
and SV using IEC 62315 all three constraints apply: of hash and verification of signature by recipient) is between 2 and
• Embedded devices such as Protection & Control IEDs or RTUs
4 milliseconds. Although at a first glance, 2 milliseconds seem to
typically have little computational power (as compared to personal
computers or servers) and only a (small) portion can be made be acceptable using two thirds of the overall allowed response
available to functionality other than protection and control. In time is not adequate considering the time that would be left for
addition, changing or upgrading hardware is not an easy task for other calculations. Additionally the 12 kHz sampling rate for SV
embedded devices that potentially have a very long lifetime. requires messages to be processed within 83 microseconds,
Security solutions for embedded devices should therefore not more than an order of magnitude less than needed for sending
require major hardware changes.
of messages (Note that the processing times for signing GOOSE
• For both GOOSE and SV strict real-time constraints exist – 3ms
and SV messages are the same). Our results were confirmed by
response time for GOOSE and sampling rates up to 12 kHz for
Sampled Values. [5] and others that all needed 3 milliseconds or more to perform
an RSA signature with a key length of 1024 bits using FPGA.
• IEC 62351, as of today, specifies the use of digital signatures
(asymmetric cryptography using RSA) to authenticate broadcast
GOOSE and SV packets FPGA
GOOSE sending GOOSE Receiving Total Processing
Clock

100 MHz 3.748 ms 0.155 ms 3.903 ms


We focus our attention in this discussion on the performance
impact on securing real-time traffic as specified in IEC 62351 200 MHz 1.917 ms 0.129 ms 2.036ms

part 6, in particular the signing of the hash value using the Table 3: Time measurement for securing GOOSE with FPGA
RSA algorithm. The calculation of the SHA256 hash value as
well as the verification of the digital signature is considerably ASIC Platforms
less CPU intense and therefore omitted for the moment. ASIC platforms are as expected significantly faster than FPGA.
However, only a handful of solutions exist today that are capable
In a first step implementing digital signatures in software was of meeting the requirements. The three best solutions that were
analyzed. The first results quickly showed that a software found calculate a 1024-bit private key RSA signature in 0.16,
implementation of digital signatures would not meet the real- 0.34, respectively 0.95 milliseconds, making only two of them
time requirements with today’s existing IED‟s hardware. Table 2 real options for applying IEC 62351 part 6 to GOOSE. Since
shows the performance results of implementing RSA signing on none of them are capable of dealing with the maximum sampling
two different platforms using C. The reader will notice that even rate of 12 kHz for SV and since these top solutions come at a
though the processor and memory available on both platforms are significant cost ASIC platform can currently not be considered
exceeding those of typical embedded devices the times needed a feasible solution for implementing IEC 62351 part 6.
for a single digital signature are at least 1.5 milliseconds, i.e.,
half of the minimum response time for GOOSE messages. For a
RSA crypto chips
key length of 1024 bits, which can be considered minimum best
The last hardware solution that was evaluated were specialized
practice, calculating the signature took at least 4 milliseconds.
crypto-chips. The top in class chips that were looked at are capable
of calculating a single RSA signature with a key length of 1024 use of security. Therefore, legacy equipment can be replaced by
bits in as little as 23.8 microseconds, which in theory would even new devices gradually without having to replace or upgrade the
allow supporting 12 kHz sampling rates. However, integrating whole system at once. However, it is clear that unless all devices
such crypto-chips would require a major redesign of the overall support IEC 62351, encryption cannot be used. The obvious risk
hardware, including possibly dedicated external memory, complex of never using security features must be taken seriously, especially
interface glue logic or cooling systems. For future systems this is if no governmental standard explicitly demands these features.
certainly possible, but for short or mid-term solutions not feasible.
For securing GOOSE and SV backward compatibility has also
Based on the evaluation the conclusions are clear: authentication been addressed by IEC 62351. First, receiving devices that do
of GOOSE and SV broadcast messages using digital signatures not support IEC 62351 can simply ignore the security extensions
is not feasible with today’s embedded devices, even without of IEC 62351 in the PDUs and process messages as before.
considering cost. A hardware implementation today would not If the receiving device supports IEC 62351 but the sending
meet SV real-time requirements. Protection and control IED‟s must device does not, then the recipient can be configured to accept
handle between 100 and 300 GOOSE packets per second while unauthenticated messages from the particular sender.
receiving SV packets at the same time (4‟000 Packets / sec), and
while running their protection algorithms and doing other tasks such 6. Manageability
as refreshing user interfaces, logging, time synchronization etc. Besides the interoperability of devices, the second major hurdle
to overcome is the usability and manageability of security.
These findings have been presented to TC 57 WG 15 in October Experience has shown that security is often compromised if
2009 and convinced the working group that another approach it cannot be used, managed and maintained easily. Personnel
is needed. A solution using symmetric cryptography (using of responsible for the operation of automation and control
HMACs) was suggested and IEC 62351-6 will now be revised systems are typically not security experts and they will likely
accordingly, with a first draft targeted for the first half of 2010. find workarounds if security presents too much of a challenge.
Examples are default passwords that are not changed or firewalls
5. Interoperability that are not configured correctly and not properly maintained.
One of the most important aspects for the acceptance of IEC
62351, and any other security standard, is interoperability - In the case of IEC 62351 the main challenge for the use of
interoperability between implementations of different vendors as asymmetric cryptography is the handling of certificates and
well as interoperability of new solutions with the installed base, certificate revocation lists. While the standard defines in technical
i.e., backward compatibility. While the first, interoperability of detail how certificates shall be used and what format they shall have,
implementations of different vendors, might seem trivial with the management of them is (currently) not addressed. It starts with
having a standard there are some considerations that must be generating and installing certificates. End-users often do not have
made. Backward compatibility on the other hand seems difficult the knowhow and / or infrastructure (i.e., a certificate authority) to
at a first look because security mechanisms such as encryption generate certificates for all individual devices. Major providers of
seem to require all entities to support the new functionality. certificates have so far not been much involved with the electric
industry and do not have a business model for it, i.e., addressing
Interoperability of vendor implementations the issue of needing thousands of certificates within a single
Achieving interoperability with security related standards organization. Once the certificates have been installed technical
imposes new challenges extending beyond pure definition and solutions are needed to prevent certificate expiration, which could
implementation of communication protocols and interfaces. have severe consequences. End-users must thus receive automated
Interoperability of security protocols is also depending on the notifications in due time before a certificate expires. Finally, yet
use of standardized cryptographic algorithms. Implementations importantly, proper use of certificates also depends on technical
of SSL / TLS for example, while being fully compliant with the solutions for handling certificate revocation lists (CRL). With IED‟s
standard itself, are only capable of setting up a secure session if typically not being directly connected to external networks updating
the same crypto suites are supported. IEC 62351 addresses this CRLs is not trivial and endusers must be presented with solutions
by mandating support of TLS_DH_DSS_WITH_AES_256_SHA and architectures that allow a timely handling of any changes in
and TLS_DH_RSA_WITH_AES_128_SHA at a minimum. CRLs. [6] describes in detail the major challenges associated with
certificate handling in industrial automation and control systems.
Backward compatibility
Introducing new technologies can be facilitated be allowing for The two new work item proposals “Key management
backward compatibility and thus by allowing a stepwise introduction (certificate handling)” and “Security Architecture” currently
of the new technology. IEC 62351 specifies that for securing under discussion in TC57 WG15 will hopefully address the
MMS traffic security mechanisms can be disabled for devices for issues of using, managing and maintaining certificates. In
the purpose of compatibility. This allows IEC 62351 compliant the author’s view, it would be a big and important step that
devices to be installed in an existing infrastructure without the increases the acceptance and usability of IEC 62351.
7. Summary IEC 62351 can gain wide acceptance. The very good initiative of
TC57 WG15 has started to address the security issues TC57 WG15 must be driven further, addressing the raised issues,
for communication protocols defined by IEC TC 57, so that security can become an integrated part of IEC 61850.
specifically the IEC 60870-5 series, the IEC 60870-6 series,
the IEC 61850 series, the IEC 61970 series, and the IEC While this paper focused on IEC 62351 to help secure IEC 61850
61968 series. Some parts of this technical specification based substations there are many other security mechanisms
are finalized while work on others has just stared. that can and must be used to improve the overall security
architecture of modern substation automation systems. The fact
The performance evaluation done for IEC 62351 part 6 showed that IEC61850 uses mainstream communication technology,
that both software as well hardware solutions could not satisfy the i.e., Ethernet and TCP/IP, makes a wide variety of solutions
performance requirements defined in IEC 61850 for GOOSE and SV available. Firewalls for examples can protect the security
data. TC57 WG15 has accepted these findings and is now looking perimeter and VPN technology can build up secure channels to
at a new approach, which will likely use symmetric cryptography. remote centers. Access to systems and devices can and must
TC57 WG15 is currently also addressing certificate handling, be further protected by using individual user authentication and
which in the authors‟ view is a key challenge to overcome before authorization coupled with detailed logging of all user activity.

Literature
[1] IEC 61850 - Communication Networks and Systems in Substations, 14 parts: IEC 61850-x-y © IEC: 2003-2005, www.iec.ch
[2] ISO/IEC 8650-1- Information technology -- Open Systems Interconnection -- Connection-oriented
protocol for the Association Control Service Element: Protocol specification, 1996, ISO
[3] “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1”, RFC 3447, February 2003
[4] “The TLS Protocol Version 1.0”, RFC 2246, 1999
[5] D. Amanor, C. Paar, J. Pelzl, V. Bunimov, M. Schimmler” Efficient hardware architectures for modular
multiplication on FPGAs”, International Conference on Field Programmable Logic and Applications, 2005
[6] S. Obermeier, Hadeli, R. Schierholz, R. Enderlein, „Certificate Management for Embedded Industrial Devices “, ICSJWG, 2009

Abstract
Two trends are currently changing substation automation systems: The acceptance of IEC 62351 will largely depend on its impact
IEC 61850 and the need for increased cyber security. IEC 61850 on interoperability, performance, and manageability. This paper
has gained global acceptance by both vendors as well as will present performance evaluations that show the limitations
customers. Cyber security on the other hand has quickly become on the technical feasibility of the current IEC 62351 documents.
one of the most dominant topics for control systems in general The authors will also give insights on how interoperability and
and electrical utilities in particular. The combination of the two, manageability are affected. Finally, the paper will show how some
securing IEC 61850 based communications, has been one of the of the current shortcomings should be addressed in the future.
goals of the recently published technical specification IEC 62351.
Authors Information

Markus Braendle Fernando Alvarez


Division Cyber Security Manager, Technical Security Architect, Power Systems
Power Systems Division, Hitachi Energy Substations, Hitachi Energy
Markus is globally responsible for all aspects of cyber security Fernando is the chief architect for defining security architecture
within Hitachi Energy’s Power Systems division. He heads the and development strategies for Hitachi Energy’s Power Systems
Power Systems Security Council which defines, develops, and Substations. As a Security expert, he leads the technical
implements the security strategy for all products and systems group related to security for Substation Automation Products.
within the Power Systems division. Markus is an active member of Fernando is an active member of TC57 WG15. A technologist
several security standardization efforts and working groups, e.g., with vast experience in software and system design and
IEEE PSRC H13, Cigre B5.38, ICSJWG or NIST SmartGrid CSCTG, implementation, he graduated from California State University,
and a recognized member in the industrial control system security Long Beach with Bachelors in Computer Science Engineering.
community. Markus holds a doctoral degree in Computer Science
from the Federal Institute for Technology in Zurich, Switzerland.

Frank Hohlbaum,
Global Security Manager Power System
Substations, Hitachi Energy
Frank is globally responsible for all aspects of cyber security
within Hitachi Energy’s Power System Substations and
drives the security activities in this business unit. He is an
active member of the Power System Security Council and
represents the business unit Power System Substations.

Frank Hohlbaum joined Hitachi Energy Inc. in 1996 and has 14


years of experience in substation automation. He graduated
from University in Furtwangen (Germany) with Bachelor of
Sciences concentrated in software and electrical technologies.
Additionally, he did post graduate studies in business
administration at the University in Zurich (Switzerland).

Hitachi Energy We reserve the right to make technical changes or modify the We reserve all rights in this document and in the subject matter
© 2023 Hitachi Energy. All rights reserved. contents of this document without prior notice. With regard and illustrations contained therein. Any reproduction, disclosure
1MRG006973 to purchase orders, the agreed particulars shall prevail. Hitachi to third parties or utilization of its contents – in whole or in parts
Energy Ltd. does not accept any responsibility whatsoever for – is forbidden without prior written consent of Hitachi Energy Ltd.
www.hitachienergy.com potential errors or possible lack of information in this document.

You might also like