Cybersecurity and IEC 62351 for SCADA Systems of Power Grid
International Journal of Electrical and Electronics Engineering |
© 2024 by SSRG - IJEEE Journal |
Volume 11 Issue 12 |
Year of Publication : 2024 |
Authors : V. Shivakumar, M.B. Veena |
How to Cite?
V. Shivakumar, M.B. Veena, "Cybersecurity and IEC 62351 for SCADA Systems of Power Grid," SSRG International Journal of Electrical and Electronics Engineering, vol. 11, no. 12, pp. 36-52, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I12P104
Abstract:
As Information and Communication Technology (ICT) brought automation and improved the efficiency and performance of electric power supply systems from generation to end utilization of electricity by consumers, it has also increased the chances of cyber attacks and threats. However, automation is inevitable, and it is required to take care of the prevention, detection and mitigation of cyber threats and make the grid resilient. Globally, work is happening in this direction, especially in the last decade, as more and smarter grid systems are being deployed, which involves extensive use of ICT and automation of grid operation. The national and international standards organizations are also working towards developing standards for making the grid resilient to cyber threats. The International Electrotechnical Commission (IEC) is one of the important standardization organizations that brought out a series of IEC 62351 standards (IEC 62351:2024 SER Power systems management and associated information exchange - Data and communications security - ALL PARTS) for data and communication security for power system operation. In this paper how the IEC 62351 series of standards could be applied to the SCADA systems in making the grid resilient to cyber threats with more focus emphasized on the Remote Terminal Unit (RTU) communication with the SCADA control centre of the Power system operation has been explained. Also, laboratory testing of RTUs for conformance to IEC 62351 standards and its results are discussed. The laboratory testing of sample RTUs shows that many of the manufacturer's implementations differ from the standard specifications. Deployment of RTUs not following the IEC 62351 specifications in the field may lead to security threats such as man-in-the-middle attacks.
Keywords:
Critical Infrastructure Security, Cyber Security, RTUs, SCADA systems, Smart grids, Standards.
References:
[1] Teodor Sommestad, Göran N. Ericsson, and Jakob Nordlander, “SCADA System Cyber Security - A Comparison of Standards,” IEEE PES General Meeting, Minneapolis, MN, USA, pp. 1-8, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Göran N. Ericsson, “Cyber Security and Power System Communication - Essential Parts of a Smart Grid Infrastructure,” IEEE Transactions on Power Delivery, vol. 25, no. 3, pp. 1501-1507, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Steve Livingston et al., “Managing Cyber Risk in the Electric Power Sector Emerging Threats to Supply Chain and Industrial Control Systems,” Deloitte Insights, 2019.
[Google Scholar] [Publisher Link]
[4] Darshana Upadhyay, and Srinivas Sampalli, “SCADA (Supervisory Control and Data Acquisition) Systems: Vulnerability Assessment and Security Recommendations,” Computer Security, vol. 89, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] György Dán et al., “Challenges in Power System Information Security,” IEEE Security & Privacy, vol. 10, no. 4, pp. 62-70, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Yulia Cherdantseva et al., “A Review of Cyber Security Risk Assessment Methods for SCADA Systems,” Computers & Security, vol. 56, pp. 1-27, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Matoušek Petr, “Description and Analysis of IEC 104 Protocol,” Technical Report, Faculty of Information Technology BUT, Brno University of Technology, Czech Republic, 2017.
[Google Scholar] [Publisher Link]
[8] International Electrotechnical Commission, Telecontrol Equipment and Systems - Part 5-104: Transmission Protocols - Network Access for IEC 60870-5-101 Using Standard Transport Profiles, IEC 60870-5-104:2006+AMD1:2016 CSV Consolidated Version, 2016.
[Publisher Link]
[9] Isaac Monroy, “Security Analysis and Implementation of DNP3 Multilayer Protocol for Secure and Safe Communication in SCADA Systems,” M.S Thesis, Texas University, EI Paso, USA, 2022.
[Google Scholar] [Publisher Link]
[10] Dimitrios Pliatsios et al., “A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1942-1976, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Tim Krause et al., “Cybersecurity in Power Grids: Challenges and Opportunities,” Sensors, vol. 21, no. 18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Péter György, and Tamás Holczer, “Attacking IEC 60870-5-104 Protocol,” 1st Conference on Information Technology and Data Science (CITDS), vol. 2874, pp. 140-150, 2020.
[Google Scholar] [Publisher Link]
[13] László Erdődi et al., “Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104,” Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1-10, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] János Csatár, Péter György, and Tamás Holczer, “Holistic Attack Methods against Power Systems Using the IEC 60870-5-104 Protocol,” Infocommunications Journal, vol. 15, no. 3, pp. 42-53, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. Kerkers, “Assessing the Security of IEC 60870-5-104 Implementations Using Automata Learning,” Master Thesis, University of Twente, 2017.
[Google Scholar] [Publisher Link]
[16] Engla Rencelj Ling et al., “Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis,” Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1-7, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] M. Agus Syamsul Arifin et al., “Malicious Activity Recognition on SCADA Network IEC 60870-5-104 Protocol,” 2021 International Conference on Technology and Policy in Energy and Electric Power (ICT-PEP), Jakarta, Indonesia, pp. 46-51, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Petr Matoušek, Ondřej Ryšavý, and Matěj Grégr, “Increasing Visibility of IEC 104 Communication in the Smart Grid,” 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] International Electrotechnical Commission, Power Systems Management and Associated Information Exchange - Data and Communications Security - All Parts, IEC 62351:2024 SER, IEC 62351 Series, 2024.
[Publisher Link]
[20] Anna Volkova et al., “Security Challenges in Control Network Protocols: A Survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 619-639, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] IEC, “Cyber Security and Resilience Guidelines for the Smart Energy Operational Environment”, International Electrotechnical Commission (IEC), Switzerland, IEC Technology Report, 2019.
[Publisher Link]
[22] Frances Cleveland, “IEC TC 57 WG 15: IEC 62351 Security Standards for the Power System Information Infrastructure,” 2014.
[Google Scholar] [Publisher Link]
[23] Roman Schlegel, Sebastian Obermeier, and Johannes Schneider, “Assessing the Security of IEC 62351” Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, pp. 11-19, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Luis Salazar et al., “Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems,” CPSIOTSEC 2020 -Proceedings of the 2020 Joint Workshop on CPS & IoT Security and Privacy, pp. 3-12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Mauro G. Todeschini, and Giovanna Dondossola, “Securing IEC 60870-5-104 Communications Following IEC 62351 Standard: Lab Tests and Results,” 2020 AEIT International Annual Conference (AEIT), Catania, Italy, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Rafał Leszczyna, “Standards on Cyber Security Assessment of Smart Grid,” International Journal of Critical Infrastructure Protection, vol. 22, pp. 70-89, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Sukumara T. et al., “Cyber Security - Security Strategy for Distribution Management System and Security Architecture Considerations,” 24th International Conference & Exhibition on Electricity Distribution (CIRED), vol. 2017, no. 1, pp. 2653-2656, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[28] International Electrotechnical Commission, Information Technology - Security Techniques - Information Security Management Systems - Information Security Controls for the Energy Utility Industry, First Edition, ISO / IEC 27019: 2017, 2017.[Publisher Link]