Skip to main content

Security Data Extraction from IEC 61850 ACSI Models for Network and System Management

  • Conference paper
Information Security Applications (WISA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7115))

Included in the following conference series:

Abstract

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, but also inadvertent actions, such as operator carelessness and equipment failure. And it consists of three main parts, communication health, end system health, and intrusion detection, respectively However, the description of the abstract data object in the standard is so obscure that it is not enough to implement a complete system. Furthermore, to interact between devices and gather information for NSM in power systems, additional network protocols and devices (e.g. SNMP, IDS) should be needed, which makes the implementation more difficult. Nevertheless, mapping of three parts of NSM into detailed structure is indispensable for designing secure smart grid controls. This paper presents efficient NSM attributes extraction from data objects and logical nodes defined in IEC 61850 part 7-3 and 7-4, respectively by using Abstract Communication Service Interface (ACSI) in part 7-2. The proposed method extracts 21% of NSM from conventional protocol (IEC 61850) without any other network protocol or devices attachment. The 2nd edition was referenced for data extraction in IEC 61850 part 7-2 to 7-4.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NERC, North American Reliability Corporation, Standards, Critical Infrastructure Protection (CIP), http://www.nerc.com/page.phpcid=2I20

  2. NISTIR 7628, Guidelines for Smart Grid Cyber Security. Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirement, vol. 1 (August 2010)

    Google Scholar 

  3. NISTIR 7628, Guidelines for Smart Grid Cyber Security. Privacy and the Smart Grid, vol. 2 (August 2010)

    Google Scholar 

  4. NISTIR 7628, Guidelines for Smart Grid Cyber Security. Supportive Analyses and References, vol. 3 (August 2010)

    Google Scholar 

  5. Cleveland, F.M.: IEC 62351-7: Communications and Information Management Technologies – Network and System Management in Power System Operations. In: Transmission and Distribution Conference and Exposition (2008)

    Google Scholar 

  6. International Electrotechnical Commission, Technical Specification, IEC/TS 62351-7 (July 2010)

    Google Scholar 

  7. Brunner, C.: IEC 61850 for Power System Communication, Transmission and Distribution Conference and Exposition (2008)

    Google Scholar 

  8. International Electrotechnical Commission, Technical Specification, IEC 61850-7-3 (December 2010)

    Google Scholar 

  9. International Electrotechnical Commission, Technical Specification, IEC 61850-7-4 (March 2010)

    Google Scholar 

  10. International Electrotechnical Commission, Technical Specification, IEC 61850-7-2 (October 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, CH., Choi, MS., Ju, SH., Lim, YH., Baek, JM. (2012). Security Data Extraction from IEC 61850 ACSI Models for Network and System Management. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27890-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27889-1

  • Online ISBN: 978-3-642-27890-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics