The assessment method of cyber-security vulnerability for smart substation
CSTR:
Author:
Clc Number:

TN914

  • Article
  • | |
  • Metrics
  • |
  • Reference [17]
  • |
  • Related
  • | | |
  • Comments
    Abstract:

    The cyber security of the IEC 61850-based smart substations has become an inevitable issue since they rely heavily on information and communication technologies. This paper analyzed the current security situation of smart substation from two aspects:cyber security vulnerability of smart substation and limitation of traditional cyber security evaluation methods. It proposed a security analysis and estimation method for information system and automation system, which estimated the security levels of any devices or equipment in substation separately by detecting known or unknown vulnerabilities. The method managed to assess the daily management by using static assessment tool. Through the practical test in the experimental environment for smart substation, several system vulnerabilities were detected towards information system and automation system, where the effectiveness of the cyber security analysis and estimation method for smart substation was verified. By applying this method, vulnerabilities of substation information system and automation system can be controlled, and the overall security of smart substation thereby can be enhanced.

    Reference
    [1] Q/GDW 383-2009智能变电站技术导则[S]. 国家电网公司, 2009. Q/GDW 383-2009 Technical guide for smart substation[S]. State Grid Corporation of China (SGCC), 2009.
    [2] Ten C W, Liu C C, Manimaran G. Vulnerability Assessment of Cybersecurity for SCADA Systems[J]. IEEE Transactions on Power Systems, 2008, 23(4):1836-1846.
    [3] Power systems management and associated information exchange-data and communications security[S]. IEC Std. 62351.
    [4] Industrial Communication Networks-Network and System Security[S]. IEC Std. 62443.
    [5] Tawde R, Nivangune A, Sankhe M. Cyber security in smart grid SCADA automation systems[C]//International Conference on Innovations in Information, Embedded and Communication Systems. IEEE, 2015:1-5.
    [6] Yang Y, Jiang H T, Mclaughlin K, et al. Cybersecurity test-bed for IEC 61850 based smart substations[C]//Power & Energy Society General Meeting. IEEE, 2015:1-5.
    [7] Drias Z, Serhrouchni A, Vogel O. Analysis of cyber security for industrial control systems[C]//International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications. IEEE, 2015:1-8.
    [8] Ten C W, Hong H J, Liu C C. Anomaly detection for cybersecurity of the substations[J]. IEEE Transactions on Smart Grid, 2011, 2(4):865-873.
    [9] 赵敏,陈红伟.数字化变电站的主要特征和关键技术分析[J].中国电力教育,2012(33):138-139. ZHAO Min, CHENG Hongwei. Main features and key technology analysis of digital substation[J]. China Electric Power Education, 2012(33):138-139. (in Chinese)
    [10] 肖静.基于IEC 61850规约的智能变电站在线监测系统设计[J].自动化应用,2015(9):107-108. XIAO Jing. Design of intelligent substation online monitoring system based on IEC 61850[J]. Automation Application, 2015(9):107-108. (in Chinese)
    [11] 曹楠,李刚,王冬青.智能变电站关键技术及其构建方式的探讨[J].电力系统保护与控制,2011,39(5):63-68. CAO Nan, LI Gang, WANG Dongqing. Key technologies and construction methods ofsmart substation[J]. Power System Protection and Control, 2011, 39(5):63-68. (in Chinese)
    [12] Elgargouri A, Virrankoski R, Elmusrati M. IEC 61850 based smart grid security[C]. Industrial Technology (ICIT), 2015 IEEE International Conference on. IEEE, 2015:2461-2465. (in Chinese)
    [13] Wang W, Lu Z. Cyber security in the Smart Grid:Survey and challenges[J]. Computer Networks, 2013, 57(5):1344-1371.
    [14] Wu S S, Liu C C, Shosha A F, et al. Cyber Security and Information Protection in a Smart Grid Environment[J]. IFAC Proceedings Volumes, 2011, 44(1):13696-13704.
    [15] Rashid M T A, Yussof S, Yusoff Y, et al. A review of security attacks on IEC61850 substation automation system network[C]//Information Technology and Multimedia (ICIMU), 2014 International Conference on. IEEE, 2014:5-10.
    [16] Jones B F, Sthamer H H, Eyres D E. Automatic structural testing using genetic algorithms[J]. Software Engineering Journal, 1996, 11(5):299-306.
    [17] Jones B F, Sthamer H H, Eyres D E. Generating test data for ADA procedures using genetic algorithms[C]//Genetic Algorithms in Engineering Systems:Innovations and Applications, 1995. IET, 1995:65-70.
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

刘姗梅,王胜,柴继文,夏晓峰.智能变电站安全脆弱性评估方法[J].重庆大学学报,2017,40(7):52~62

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 27,2017
  • Online: August 01,2017
Article QR Code