已阅读5页,还剩3页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
EnhancingtheReliabilityandSecurityoftheInformationInfrastructureUsedtoManagethePowerSystemFrancesCleveland,IEEEMember,PES-PSCCAbstractInthepowerindustry,thefocushasbeenalmostexclusivelyonimplementingequipmentthatcankeepthepowersystemreliable.Untilrecently,communicationsandinformationflowshavebeenconsideredofperipheralimportance.However,increasinglytheInformationInfrastructurethatsupportsthemonitoringandcontrolofthepowersystemhascometobecriticaltothereliabilityofthepowersystem.Communicationprotocolsareoneofthemostcriticalpartsofpowersystemoperations,responsibleforretrievinginformationfromfieldequipmentand,viceversa,forsendingcontrolcommands.Despitetheirkeyfunction,to-datethesecommunicationprotocolshaverarelyincorporatedanysecuritymeasures,includingsecurityagainstinadvertenterrors,powersystemequipmentmalfunctions,communicationsequipmentfailures,ordeliberatesabotage.Sincetheseprotocolswereveryspecialized,“SecuritybyObscurity”hasbeentheprimaryapproach.However,securitybyobscurityisnolongeravalidconcept.Inparticular,theelectricitymarketispressuringmarketparticipantstogainanyedgetheycan.Atinyamountofinformationcanturnalosingbidintoawinningbidorwithholdingthatinformationfromyourcompetitorcanmaketheirwinningbidintoalosingbid.Andthedesiretodisruptpowersystemoperationscanstemfromcarelessmistakes,tosimpleteenagerbravado,tocompetitivegame-playingintheelectricalmarketplace,andeventoactualterrorism.Asthepowerindustryreliesincreasinglyoninformationtooperatethepowersystem,twoinfrastructuresmustnowbemanaged:notonlythePowerSystemInfrastructure,butalsotheInformationInfrastructure.Themanagementofthepowersysteminfrastructurehasbecomereliantontheinformationinfrastructureasautomationcontinuestoreplacemanualoperations,asmarketforcesdemandmoreaccurateandtimelyinformation,andasthepowersystemequipmentages.Therefore,thereliabilityofthepowersystemisincreasinglyaffectedbyanyproblemsthattheinformationinfrastructuremightsuffer.ThispaperfocusesonIECTC57WG15securitystandardsworkwhichisaddressingthereliabilityandsecurityoftheinformationinfrastructure.IndexSecurity,reliability,informationinfrastructure,communications,IEC,powersystemoperations,IEC61850,DNP,ICCP,IEC60870-5.I.DualInfrastructures:thePowerSystemandtheInformationSystemInthepowerindustry,thefocushasbeenalmostexclusivelyonimplementingequipmentthatcankeepthepowersystemreliable.Untilrecently,communicationsandinformationflowshavebeenconsideredofperipheralimportance.However,increasinglytheInformationInfrastructurethatsupportsthemonitoringandcontrolofthepowersystemhascometobecriticaltothereliabilityofthepowersystem.WiththeexceptionoftheinitialpowerequipmentproblemsintheAugust14,2003blackout,theon-goingandcascadingfailureswerealmostexclusivelyduetoproblemsinprovidingtherightinformationtotherightplacewithintherighttime.Figure1:August14,2003Blackout(NOAAprocessedthedatafromtheDefenseMeteorologicalSatelliteProgram.PleasecreditNOAA/DMSP)Communicationprotocolsareoneofthemostcriticalpartsofpowersystemoperations,responsibleforretrievinginformationfromfieldequipmentand,viceversa,forsendingcontrolcommands.Despitetheirkeyfunction,to-datethesecommunicationprotocolshaverarelyincorporatedanysecuritymeasures,includingsecurityagainstinadvertenterrors,powersystemequipmentmalfunctions,communicationsequipmentfailures,ordeliberatesabotage.Sincetheseprotocolswereveryspecialized,“SecuritybyObscurity”hasbeentheprimaryapproach.Afterall,onlyoperatorsareallowedtocontrolbreakersfromhighlyprotectedcontrolcenter.Whocouldpossiblycareaboutthemegawattsonaline,orhavetheknowledgeofhowtoreadtheidiosyncraticbitsandbytestheappropriateone-out-of-a-hundredcommunicationprotocols.Andwhywouldanyonewanttodisruptpowersystems?1-4244-1298-6/07/$25.002007IEEE.However,securitybyobscurityisnolongeravalidconcept.Inparticular,theelectricitymarketispressuringmarketparticipantstogainanyedgetheycan.Atinyamountofinformationcanturnalosingbidintoawinningbidorwithholdingthatinformationfromyourcompetitorcanmaketheirwinningbidintoalosingbid.Andthedesiretodisruptpowersystemoperationscanstemfromsimpleteenagerbravadotocompetitivegame-playingintheelectricalmarketplacetoactualterrorism.Itisnotonlythemarketforcesthataremakingsecuritycrucial.Thesheercomplexityofoperatingapowersystemhasincreasedovertheyears,makingequipmentfailuresandoperationalmistakesmorelikelyandtheirimpactgreaterinscopeandcost.Inaddition,theolder,“obscure”communicationsprotocolsarebeingreplacedbystandardized,well-documentedprotocolsthataremoresusceptibletohackersandindustrialspies.Asthepowerindustryreliesincreasinglyoninformationtooperatethepowersystem,twoinfrastructuresmustnowbemanaged:notonlythePowerSystemInfrastructure,butalsotheInformationInfrastructure.Themanagementofthepowersysteminfrastructurehasbecomereliantontheinformationinfrastructureasautomationcontinuestoreplacemanualoperations,asmarketforcesdemandmoreaccurateandtimelyinformation,andasthepowersystemequipmentages.Therefore,thereliabilityofthepowersystemisincreasinglyaffectedbyanyproblemsthattheinformationinfrastructuremightsuffer.Figure2:TwoInfrastructuresMustBeManaged,NotJustOneII.IECTC57asDeveloperofInternationalStandardsforSCADAProtocolsTheInternationalElectrotechnicalCommission(IEC)TechnicalCouncil(TC)57PowerSystemsManagementAndAssociatedInformationExchangeisresponsiblefordevelopinginternationalstandardsforpowersystemdatacommunicationsprotocols.Itsscopeis“ToprepareinternationalstandardsforpowersystemscontrolequipmentandsystemsincludingEMS(EnergyManagementSystems),SCADA(SupervisoryControlAndDataAcquisition),distributionautomation,teleprotection,andassociatedinformationexchangeforreal-timeandnon-real-timeinformation,usedintheplanning,operationandmaintenanceofpowersystems.Powersystemsmanagementcomprisescontrolwithincontrolcentres,substations,andindividualpiecesofprimaryequipmentincludingtelecontrolandinterfacestoequipment,systems,anddatabases,whichmaybeoutsidethescopeofTC57.Thespecialconditionsinahighvoltageenvironmenthavetobetakenintoconsideration.”IECTC57hasdevelopedthreewidelyacceptedprotocols,andhasbeenthesourceofafourth.Theseprotocolsare:IEC60870-5whichiswidelyusedinEuropeandothernon-UScountriesforSCADAsystemtoRTUdatacommunications.Itisusedbothinseriallinks(Part101)andovernetworks(Part104).DNP3.0whichwasderivedfromIEC60870-5andisinuseintheUSandnowiswidelyusedinmanyothercountriesaswell,primarilyforSCADAsystemtoRTUdatacommunicationsIEC60870-6(alsoknownasTASE.2orICCP)whichisusedinternationallyforcommunicationsbetweencontrolcentersandoftenforcommunicationsbetweenSCADAsystemsandotherengineeringsystemswithincontrolcenters.IEC61850whichisusedforprotectiverelaying,substationautomation,distributionautomation,powerquality,distributedenergyresources,substationtocontrolcenter,andotherpowerindustryoperationalfunctions.Itincludesprofilestomeettheultrafastresponsetimesofprotectiverelayingandforthesamplingofmeasuredvalues,aswellasprofilesfocusedonthemonitoringandcontrolofsubstationandfieldequipment.IEC61334(DLMS)Alltogether,theseinternationalstandardsaccountforcloseto90%ofthedatacommunicationsprotocolsinnewlyimplementedandupgradedpowerindustrySCADAsystemsandsubstationautomation(Modbus,Fieldbus,andotherproprietaryprotocolsarestillusedinoldersystemsandinotherindustries).III.ApplyingSecuritytoPowerSystemOperationsA.UnderstandingtheSecurityRequirementsandImpactofSecurityMeasuresonPowerSystemOperationsPowersystemoperationsposemanysecuritychallengesthataredifferentfrommostotherindustries.Forinstance,mostsecuritymeasuresweredevelopedtocounterhackersontheInternet.TheInternetenvironmentisvastlydifferentfromthepowersystemoperationsenvironment.Therefore,inthesecurityindustrythereistypicallyalackofunderstandingofthesecurityrequirementsandthepotentialimpactofsecuritymeasuresonthecommunicationrequirementsofpowersystemoperations.Inparticular,thesecurityservicesandtechnologieshavebeendevelopedprimarilyforindustriesthatdonothavemanyofthestrictperformanceandreliabilityrequirementsthatareneededbypowersystemoperations.Forinstance:Preventinganauthorizeddispatcherfromaccessingpowersystemsubstationcontrolscouldhavemoreseriousconsequencesthanpreventinganauthorizedcustomerfromaccessinghisbankingaccount.Therefore,denial-of-serviceisfarmoreimportantthaninmanytypicalInternettransactions.Manycommunicationchannelsusedinthepowerindustryarenarrowband,thusnotpermittingsomeoftheoverheadneededforcertainsecuritymeasures,suchasencryptionandkeyexchanges.Mostsystemsandequipmentarelocatedinwide-spread,unmanned,remotesiteswithnoaccesstotheInternet.Thismakeskeymanagementandsomeothersecuritymeasuresdifficulttoimplement.Manysystemsareconnectedbymulti-dropcommunicationchannels,sonormalnetworksecuritymeasurescannotwork.Althoughwirelesscommunicationsarebecomingwidelyusedformanyapplications,utilitieswillneedtobeverycarefulwheretheyimplementthesewirelesstechnologies,partlybecauseofthenoisyelectricalenvironmentofsubstations,andpartlybecauseoftheveryrapidandextremelyreliableresponserequiredbysomeapplications.B.SecurityMeasuresImportanttoPowerSystemOperationsBecauseofthelargevarietyofcommunicationmethodsandperformancecharacteristics,aswellasbecausenosinglesecuritymeasurecancounteralltypesofthreats,itisexpectedthanmultiplelayersofsecuritymeasureswillbeimplemented.Forinstance,VPNsonlysecurethetransportlevelprotocols,butdonotsecuretheapplicationlevelprotocols,sothatadditionalsecuritymeasures,suchasIEC62351-4,providetheapplicationlevelsecurity,possiblyrunningoverVPNs.Inaddition,role-basedaccesspasswords,intrusiondetection,accesscontrollists,lockeddoors,andothersecuritymeasuresarenecessarytoprovideadditionallevelsofsecurity.ItisclearfromFigures5-9thatauthenticationplaysalargeroleinmanysecuritymeasures.Infact,formostpowersystemoperations,authenticationofcontrolactionsisfarmoreimportantthat“hiding”thedatathroughencryption.AlsobecauseconnectiontotheInternetis(shouldnotbe)afactor,sincepowersystemoperationsshouldbewell-protectedbyisolationand/orfirewalls,someofthecommonthreatsarelesscritical,whileothersaremorecritical.Althoughimportanceofspecificthreatscanvarygreatlydependingupontheassetsbeingsecured,someofthemorecriticalthreatsare:Indiscretionsbypersonnelemployeessticktheirpasswordsontheircomputermonitorsorleavedoorsunlocked.Bypasscontrolsemployeesturnoffsecuritymeasures,donotchangedefaultpasswords,oreveryoneusesthesamepasswordtoaccessallsubstationequipment.Orasoftwareapplicationisassumedtobeinasecureenvironment,sodoesnotauthenticateitsactions.Authorizationviolationsomeoneundertakesactionsforwhichtheyarenotauthorized,sometimesbecauseofcarelessenforcementofauthorizationrules,orduetomasquerade,theft,orotherillegalmeans.Man-in-the-middleagateway,dataserver,communicationschannel,orothernon-endequipmentiscompromised,sothedatawhichissupposedtoflowthroughthismiddleequipmentisreadormodifiedbeforeitissentonitsway.Resourceexhaustionequipmentisinadvertently(ordeliberately)overloadedandcannotthereforeperformitsfunctions.Oracertificateexpiresandpreventsaccesstoequipment.Thisdenialofservicecanseriouslyimpactapowersystemoperatortryingtocontrolthepowersystem.IV.IECTC57ResponsetoSecurityRequirementsBy1997,IECTC57recognizedthatsecuritywouldbenecessaryfortheseprotocols.Itthereforefirstestablishedatemporarygroup(AdHocWG06)tostudytheissuesofsecurity.ThisgrouppublishedaTechnicalReportIEC62210onthesecurityrequirements.OneoftherecommendationsofthisTechnicalReportwastoformaWorkingGrouptodevelopsecuritystandardsfortheIECTC57protocolsandtheirderivatives(i.e.DNP).Therefore,IECTC57WG15wasformedin1999,andhasundertakenthiswork.TheWG15titleis“Powersystemcontrolandassociatedcommunications-Dataandcommunicationsecurity”anditsscopeandpurposeareto“UndertakethedevelopmentofstandardsforsecurityofthecommunicationprotocolsdefinedbytheIECTC57,specificallytheIEC60870-5series,theIEC60870-6series,theIEC61850series,theIEC61970series,andtheIEC61968series.Undertakethedevelopmentofstandardsand/ortechnicalreportsonend-to-endsecurityissues.”ThescopeoftheworkofWG15istodevelopstandardsthatincreasetheinformationalsecurityassuranceaspectsoftheprotocolsspecifiedwithinTC57.Aspartofthiswork,concreteandimplementable,standardsareintendedtobedeveloped.Thesestandardsareintendedtobespecified,asneeded,byutilitiesandimplementedbyrespondingvendors.WG15iscommittedtodeveloprelevantstandardsthatincreasetheoverallinformationalsecurityassuranceaspectsofutilityinfrastructures.Thejustificationwasthatsafety,security,andreliabilityhavealwaysbeenimportantissuesinthedesignandoperationofsystemsinthepowerindustry,andcybersecurityisbecomingincreasinglyimportantinthisindustryasitreliesmoreandmoreonaninformationinfrastructure.Thederegulatedmarkethasimposednewthreatsasknowledgeofassetsofacompetitorandtheoperationofhissystemcanbebeneficialandacquisitionofsuchinformationisapossiblereality.Since9/11theadditionalthreatofterrorismhasbecomemorevisible.Thefinalsentenceinthescope/purposestatementisveryimportant:itwasrecognizedthattheadditionofjustsimpleencryptionoftheprotocols,forinstancebyadding“bump-in-the-wire”encryptionboxesorevenvirtualprivatenetwork(VPN)technologieswouldnotbeadequateformanysituations.Securitytrulyisan“end-to-end”requirementtoensureauthenticatedaccesstosensitivepowersystemequipment,reliableandtimelyinformationonequipmentfunctioningandfailures,backupofcriticalsystems,andauditcapabilitiesthatpermitreconstructionofcrucialevents.ThisworkistobepublishedbytheIECasIEC62351,Parts1-7,titled:IEC62351-1:DataandCommunicationSecurityIntroductionIEC62351-2:DataandCommunicationSecurityGlossaryofTermsIEC62351-3:DataandCommunicationSecurityProfilesIncludingTCP/IPIEC62351-4:DataandCommunicationSecurityProfilesIncludingMMSIEC62351-5:DataandCommunicationSecuritySecurityforIEC60870-5andDerivatives(i.e.DNP3.0)IEC62351-6:DataandCommunicationSecuritySecurityforIEC61850ProfilesIEC62351-7:DataandCommunicationSecuritySecurityThroughNetworkandSystemManagementV.IEC62351-1:IntroductionThisfirstpartofthestandardcoversthebackgroundonsecurityforpowersystemoperations,andintroductoryinformationontheseriesofIEC62351securitystandards.VI.IEC62351-2:GlossaryofTermsThispartincludesthedefinitionoftermsandacronymsusedintheIEC62351standards.Thesedefinitionsarebasedonexistingsecurityandcommunicationsindustrystandarddefinitionsasmuchaspossible,giventhatsecuritytermsarewidelyusedinotherindustriesaswellasinthepowersystemindustry.VII.IEC62351Parts3-6SecurityStandardsforIECTC57ProtocolsA.OverviewSinceitwasformed,WG15hasundertakenthedevelopmentofsecuritystandardsforthefourcommunicationprotocolslistedabove:IEC60870-5,itsderivativeDNP,IEC60870-6(ICCP),andIEC61850.Thesesecuritystandardsmustmeetdifferentsecurityobjectivesforthedifferentprotocols,whichvarydependinguponhowtheyareused.Someofthesecuritystandardscanbeusedacrossafewoftheprotocols,whileothersareveryspecifictoaparticularprofile.Thedifferentsecurityobjectivesincludeauthenticationofentitiesthroughdigitalsignatures,ensuringonlyauthorizedaccess,preventionofeavesdropping,preventionofplaybackandspoofing,andsomedegreeofintrusiondetection.Forsomeprofiles,alloftheseobjectivesareimportant;forothers,onlysomearefeasiblegiventhecomputationconstraintsofcertainfielddevices,themediaspeedconstraints,therapidresponserequirementsforprotectiverelaying,andtheneedtoallowbothsecureandnon-secureddevicesonthesamenetwork.ThisworkwillbepublishedbytheIECasIEC62351,Parts3-6,titled:IEC62351-3:DataandCommunicationSecurityProfilesIncludingTCP/IP(thesesecuritystandardscoverthoseprofilesusedbyICCP,IEC60870-5Part104,DNP3.0overTCP/IP,andIEC61850overTCP/IP)IEC62351-4:DataandCommunicationSecurityProfilesIncludingMMS(thesesecuritystandardscoverthoseprofilesusedbyICCPandIEC61850)IEC62351-5:DataandCommunicationSecuritySecurityforIEC60870-5andDerivatives(i.e.DNP3.0)(thesesecuritystandardscoverbothserialandnetworkedprofilesusedbyIEC60870-5andDNP)IEC62351-6:DataandCommunicationSecuritySecurityforIEC61850Peer-to-PeerProfiles(thesesecuritystandardscoverthoseprofilesinIEC61850thatarenotbasedonTCP/IPGOOSE,GSSE,andSMV)TheinterrelationshipofthesesecuritystandardsandtheprotocolsareillustratedinFigure3.IEC62351Part1:IntroductionIEC62351SecurityStandards:CorrelationstoTC57StandardsIEC62351Part2:GlossaryIEC62351Part3:ProfilesIncludingTCP/IPIEC62351Part4:ProfilesIncludingMMSIEC62351Part5:IEC60870-5andDerivativesIEC62351Part6:IEC61850IEC60870-6TASE.2IEC60870-5-104TCP/IPIEC60870-5-101,102,&103IEC61850-8-1GOOSEProfileIEC61850-8-1MMSProfileIEC62351Part7:MIBsforNetworkManagementIEC61850-9-2SMVProfileIEC62351Part7:MIBsforNetworkManagementIEC62351Part7:MIBsforNetworkManagementFigure3:InterrelationshipofIEC62351SecurityStandardsandtheTC57ProtocolsB.IEC62351-3:SecurityforProfilesThatIncludeTCP/IPIEC62351-3providessecurityforanyprofilethatincludesTCP/IP,includingIEC60870-6TASE.2,IEC61850ACSIoverTCP/IP,andIEC60870-5-104.Ratherthanre-inventingthewheel,itspecifiestheuseofTLSwhichiscommonlyusedovertheInternetforsecureinteractions,coveringauthentication,confidentiality,andintegrity.ThispartdescribestheparametersandsettingsforTLSthatshouldbeusedforutilityoperations.Specifically,IEC62351-3protectsagainsteavesdroppingthroughTLSencryption,man-in-the-middlesecurityriskthroughmessageauthentication,spoofingthroughSecurityCertificates(NodeAuthentication),andreplay,againthroughTLSencryption.However,TLSdoesnotprotectagainstdenialofservice.Thissecurityattackshouldbeguardedagainstthroughimplementation-specificmeasures.C.IEC62351-4:SecurityforProfilesThatIncludeMMSIEC62351-4providessecurityforprofilesthatincludetheManufacturingMessageSpecification(MMS)(ISO9506),includingTASE.2(ICCP)andIEC61850.ItprimarilyworkswithTLStoconfigureandmakeuseofitssecuritymeasures,inparticular,authentication:thetwoentitiesinteractingwitheachotherarewhotheysaytheyare.ItrequiresadditionalsecuritymeasuresinACSE.Italsoallowsbothsecureandnon-secureprofilestobeusedsimultaneously,sothatnotallsystemsneedtobeupgradedwiththesecuritymeasuresatthesametime.D.IEC62351-5:SecurityforIEC60870-5andDerivatives(i.e.DNP3)IEC62351-5providesdifferentsolutionsfortheserialversion(primarilyIEC60870-5-101,aswellasparts102and103)andforthenetworkedversions(IEC60870-5-104
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 环保行业技术专家的求职与面试技巧
- 数据科学家在AI领域的高级研究方案与部署
- 单基站毫米波雷达的人体运动方向识别研究
- 中国交通系统职位详解与面试指导手册
- 新材料研发领域的质量控制与管理方法
- 授信部年度工作总结与展望
- 银行信贷业务二部经理面试要点分析
- 电信行业:中国移动网络规划工程师面试全攻略
- 4%灰土施工方案(3篇)
- 元旦公司策划活动方案(3篇)
- GB/T 15849-2025密封放射源的泄漏检验方法
- 《大数据金融》高等院校经济类专业全套教学课件
- 一年级下册书法教案 (四)
- 火力发电建设项目安全验收评价标准
- 酒店客房服务礼仪培训教材
- 律师执业技能课件
- 个人述职报告:对岗位的认知
- 2024年黑龙江省公安机关人民警察专项录用考试《行测》真题(含答案)
- 银企合作意向协议书范本
- 2023民用建筑钢结构检测技术规程
- 压力管道竣工资料范本
评论
0/150
提交评论