Novel weaknesses in IEC 62351 protected Smart Grid control systems

Maximilian Strobel, Norbert Wiedermann, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

41 Scopus citations

Abstract

Smart Grids are characterized by a high level of interconnectedness and interdependency between their sub-components. As this increases the surface for potential cyber attacks, the control system communication needs to be protected. IEC 61850 is about to become the most prevalent communication standard in the process related parts of Smart Grid control systems, but it was not designed with security in mind. IEC 62351 extends IEC 61850 by comprehensive security measures. By analyzing the IEC 61850 and IEC 62351 specifications, three novel weaknesses in the IEC 62351 standard were discovered which will be presented in this paper. Two weaknesses allow for replay of GOOSE and Sampled Values messages and one weakness in the protocol used for time exchange (SNTP) leaves the system vulnerable to a variety of attacks.

Original languageEnglish
Title of host publication2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages266-270
Number of pages5
ISBN (Electronic)9781509040759
DOIs
StatePublished - 8 Dec 2016
Event7th IEEE International Conference on Smart Grid Communications, SmartGridComm 2016 - Sydney, Australia
Duration: 6 Nov 20169 Nov 2016

Publication series

Name2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016

Conference

Conference7th IEEE International Conference on Smart Grid Communications, SmartGridComm 2016
Country/TerritoryAustralia
CitySydney
Period6/11/169/11/16

Keywords

  • Attacks
  • GOOSE
  • IEC 61850
  • IEC 62351
  • Power Utility Automation
  • Replay
  • SNTP
  • Sampled Values
  • Security
  • Smart Grid
  • Weaknesses

Fingerprint

Dive into the research topics of 'Novel weaknesses in IEC 62351 protected Smart Grid control systems'. Together they form a unique fingerprint.

Cite this