Evaluating Security Algorithms in the Substation Communication Architecture

Security becomes the major concern in a modernized electricity network. The IEC 61850 standard has been developed for substation automation, providing more enhancing communication functionalities. The standard defines several kinds of messages for data exchange between nodes in the substation. Among...

Full description

Saved in:
Bibliographic Details
Published in2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing pp. 314 - 318
Main Authors Sugwon Hong, Dae-Yong Shin, Myongho Lee
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2009
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Security becomes the major concern in a modernized electricity network. The IEC 61850 standard has been developed for substation automation, providing more enhancing communication functionalities. The standard defines several kinds of messages for data exchange between nodes in the substation. Among them, two critical messages have very stringent performance requirement for secure substation operation and protection. In this paper we design a security protocol for guaranteeing message authentication and integrity. In order to show whether the protocol can achieve the performance criteria imposed by the standard, we conduct some experiments on a desktop PC and an embedded device. Our study shows that the desktop PC is capable of satisfying performance criteria. However, the result shows that the embedded device has some limitation of handling incoming messages and processing cryptographic computation depending on the number of packets.
ISBN:0769538258
9780769538259
DOI:10.1109/EmbeddedCom-ScalCom.2009.63