Research on the Application of IBE in IEC61850 Substation Automation System

Article Preview

Abstract:

In order to reap the benefits promised by the Smart Grid, communications between the IEDs in IEC 61850 Substation Automation System (SAS) will need to be made much more secure.Traditional security solutions based on Public Key Infrastructure (PKI) are calculation intensive and introduces latency that will be difficult to meet substation environmental and electrical requirements, so they are not well suited for IEC 61850 SAS. Identity based encryption (IBE) schemes, introduced by Shamir in 1984 [5] are based on the idea to use participant’s unique identities as public key and public key directories are unnecessary. Thus, utilizing IBE in IEC 61850 SAS is a reasonable choice. This paper briefly introduces the features of IEC 61850 SAS communication security and IBE and then propose an IBE-based Self Private Key Generated (SPKG) encryption scheme to establish encryption system in IEC 61850 SAS. Advantages of this SPKG Scheme are also discussed in the paper.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2805-2808

Citation:

Online since:

October 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Draft IEC 61850-7-1 Communication networks and systems in substations, (2002).

Google Scholar

[2] Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security The Smart Grid Interoperability Panel Cyber Security Working Group September (2010).

DOI: 10.6028/nist.ir.7628

Google Scholar

[3] IEC 62351-6: Data and Communication Security, Security for IEC 61850 Profile, (2005).

Google Scholar

[4] IEC/ISO, IT Security techniques - Key management, IEC/ISO11770, International Standard.

Google Scholar

[5] Shamir, A., Identity based cryptosystems and signature schemes, Advances in Cryptology Crypto'84, LNCS 196, Springer-Verlag, pp.47-53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[6] Boneh, D., and Franklin, F., Identity-based encryption from the Weil pairing', Advances in Cryptology Crypto'2001, LNCS 2139, Springer-Verlag, pp.213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[7] Burnett , A. , Winters ,K., and Dowling, T. A Java Implementation of an Elliptic Curve Crypto system Recent advances in Java Technology , Computer Science press, TrinityCollege, (2002).

Google Scholar