IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption

Communication protocols are one of the most critical parts of power system operations, responsible for retrieving information from field equipment and, vice versa, for sending control commands. Despite their key function, to-date these communication protocols have rarely incorporated any security me...

Full description

Saved in:
Bibliographic Details
Published inProceedings of the ... IEEE Power Engineering Society Transmission and Distribution Conference pp. 1079 - 1087
Main Author Cleveland, F.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2006
Subjects
Online AccessGet full text
ISBN0780391942
9780780391949
ISSN2160-8555
DOI10.1109/TDC.2006.1668652

Cover

Loading…
Abstract Communication protocols are one of the most critical parts of power system operations, responsible for retrieving information from field equipment and, vice versa, for sending control commands. Despite their key function, to-date these communication protocols have rarely incorporated any security measures, including security against inadvertent errors, power system equipment malfunctions, communications equipment failures, or deliberate sabotage. Since these protocols were very specialized, "security by obscurity" has been the primary approach. However, security by obscurity is no longer a valid concept. In particular, the electricity market is pressuring market participants to gain any edge they can. A tiny amount of information can turn a losing bid into a winning bid - or withholding that information from your competitor can make their winning bid into a losing bid. And the desire to disrupt power system operations can stem from simple teenager bravado to competitive gameplaying in the electrical marketplace to actual terrorism. This paper describes what the International Electrotechnical Council (IEC) is undertaking in TC57 WG15 on providing security for power system operations
AbstractList Communication protocols are one of the most critical parts of power system operations, responsible for retrieving information from field equipment and, vice versa, for sending control commands. Despite their key function, to-date these communication protocols have rarely incorporated any security measures, including security against inadvertent errors, power system equipment malfunctions, communications equipment failures, or deliberate sabotage. Since these protocols were very specialized, "security by obscurity" has been the primary approach. However, security by obscurity is no longer a valid concept. In particular, the electricity market is pressuring market participants to gain any edge they can. A tiny amount of information can turn a losing bid into a winning bid - or withholding that information from your competitor can make their winning bid into a losing bid. And the desire to disrupt power system operations can stem from simple teenager bravado to competitive gameplaying in the electrical marketplace to actual terrorism. This paper describes what the International Electrotechnical Council (IEC) is undertaking in TC57 WG15 on providing security for power system operations
Author Cleveland, F.
Author_xml – sequence: 1
  givenname: F.
  surname: Cleveland
  fullname: Cleveland, F.
BookMark eNotkE1LAzEURQNWsK3dC26yczX1JWm-ljpWLRQUpq5LTN7QkU6mZFJk_r0tdnUvnMtZ3AkZxS4iIXcM5oyBfdy8lHMOoOZMKaMkvyIT0AaEZXbBR2TMmYLCSClvyKzvfwCASaNBmDHZrZYl3ZRS0wr9MTV5oFV2MbgUelp3ieYd0s_uFxOthj5j-9DTVTyB1uWmi-eeXJ_T0edjQlrQZxy6GGjVtIc90mX0aTicl7fkunb7HmeXnJKv1-WmfC_WH2-r8mldNEzLXBihv6VnzAbJEFDDwqDhXnpwIK1TTjjtjXaOL7gQtQq1td4qEwIDBIZiSu7_vQ0ibg-paV0atpdjxB9IrFiH
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/TDC.2006.1668652
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 1087
ExternalDocumentID 1668652
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i175t-837b5c119d51e0e7048e82c5c0a059a6a3a7c87aa24233f6df99c968dd10e01e3
IEDL.DBID RIE
ISBN 0780391942
9780780391949
ISSN 2160-8555
IngestDate Wed Aug 27 01:53:12 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-837b5c119d51e0e7048e82c5c0a059a6a3a7c87aa24233f6df99c968dd10e01e3
PageCount 9
ParticipantIDs ieee_primary_1668652
PublicationCentury 2000
PublicationDate 20060000
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 20060000
PublicationDecade 2000
PublicationTitle Proceedings of the ... IEEE Power Engineering Society Transmission and Distribution Conference
PublicationTitleAbbrev TDC
PublicationYear 2006
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001587038
Score 1.4494147
Snippet Communication protocols are one of the most critical parts of power system operations, responsible for retrieving information from field equipment and, vice...
SourceID ieee
SourceType Publisher
StartPage 1079
SubjectTerms Communication system security
Cryptography
IEC standards
Information retrieval
Information security
Power system control
Power system measurements
Power system security
Power systems
Protocols
Title IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption
URI https://ieeexplore.ieee.org/document/1668652
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-Qk178AON3ejDxYmHd2q49TwiaYEiAhBtpu7dITAbh46B_ve02QI0Hb92ybGvX9f3ee_39HkL3wLT0Ih9EWwWEpUoSyaUlzjRnjFkaA_h4R_9V9MbsZcInNfS448IAQLH5DFq-WeTy07nd-FBZmwohBXcL7oFz3Equ1j6ewt3MKwpXh1QE7oGcF1669BLoioWV2M72WG1TloFqj56SMitR3f9HoZXCznSPUX_7huX2kvfWZm1a9vOXeON_u3CCmntGHx7sbNUpqkF-ho6-iRE20NtzJ8GjhMd4WNW0w8MqzrDCDtpiBxXxwBdVw6XM-cMKV2Qm_3F9e6lLOdrNEjDBJTkGD2degBh3crv8KNanJhp3O6OkR6o6DGTmwMWaOB_WcEupSjmFAGL304MMLbeBduBMCx3p2MpYa4_NokykmVJWCZmmNICAQnSO6vk8hwuEjTVGaud1a02ZcdeEaRZZYVimDKNWXqKGH7PpopTamFbDdfX36Wt0uI-I3KC66yLcOoywNnfF5PgCzxu2GA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG8IHtSLH2D8tgcTLw7W0XbteUJAgZAACTfSdm-RmAzDx0H_etttgBoP3rplSdeu6_u93-v7PYTugSrhRD48ZSR4NJbCE0wYz5rmhFJDQgDHd_T6vD2mzxM2KaHHbS4MAGSHz6DmmlksP56btaPK6oRzwZndcPes3Wckz9baMSrMrr2sdHVAuG-7ZCzz04UTQZc0KOR2NtdyE7T0ZX30FOVxiaKHH6VWMkvTOkK9zTvmB0zeauuVrpnPX_KN_x3EMarucvrwYGutTlAJ0lN0-E2OsIJeO80IjyIW4mFR1Q4PC6ZhiS24xRYs4oErq4ZzofOHJS7Smdznde2FygVp1wvAHs7TY_Bw5iSIcTM1i49sh6qicas5itpeUYnBm1l4sfKsF6uZIUTGjIAPof3tQQSGGV9ZeKa4aqjQiFAph84aCY8TKY3kIo6JDz6Bxhkqp_MUzhHWRmuhrN-tFKHaPhPEScNwTROpKTHiAlXcnE3fc7GNaTFdl3_fvkP77VGvO-12-i9X6GDHj1yjsh0u3FjEsNK32UL5AoLuuWE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+of+the+...+IEEE+Power+Engineering+Society+Transmission+and+Distribution+Conference&rft.atitle=IEC+TC57+Security+Standards+for+the+Power+System%27s+Information+Infrastructure+-+Beyond+Simple+Encryption&rft.au=Cleveland%2C+F.&rft.date=2006-01-01&rft.pub=IEEE&rft.isbn=0780391942&rft.issn=2160-8555&rft.spage=1079&rft.epage=1087&rft_id=info:doi/10.1109%2FTDC.2006.1668652&rft.externalDocID=1668652
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2160-8555&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2160-8555&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2160-8555&client=summon