Security Authentication for Smart Substation Communication Based on IEC 62351

Article Preview

Abstract:

An important feature of smart substation system is the communication of the various smart devices IED (Intelligent Electronic Digital), the network security issues become increasingly prominent with networked and standardized of the communication protocols, especially when IEC 61850 becoming development direction. In this paper, considered data and security communications standard of the power system IEC 62351’s safety authentication requirements, as well as limited storage and computing power of IED, a protocol used between IED safety authentication-Secure Remote Password SRP protocol is proposed . The research result help improve data security transmission and authentication of smart substation. It is provide with reference value to the implementation of IEC 62351 in smart substation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

91-96

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] GAO Zhuo, LUO Yi, TU Guangyu, WU Tong. Computer network security analysis of substation[J]. automation of power system, 2002, vol. 26(1): 53-57.

Google Scholar

[2] IEC 61850. Communication Networks and Systems in Substation[S] . (2004).

Google Scholar

[3] IEC 62351. Data and Communication Security. (2005).

Google Scholar

[4] IEC TC57 security standards for the power system's information infrastructure: beyond simple encryption[EB/OL]. [2006-08-10]. http: /www. pcsforum. org/library/files/1129579575White_Paper_on_Security_Standards_in_IEC_TC57_ver_5. pdf.

DOI: 10.1109/tdc.2006.1668652

Google Scholar

[5] IEC62351-5. Power Systems Management and Associated Information Exchange-Data and Communication Security-Part 5: Security for IEC 60870-5 and Derivatives[S], (2007).

DOI: 10.3403/30400482

Google Scholar

[6] QUE Xirong, SUN Rui, GONG Xiangyang, et al. Information security theory and application. Beijing: Tsinghua UniversityPress, (2002).

Google Scholar

[7] YU Yong,LIN Weimin,HE Jun. Design and application of power digital certificate service system. Automation of Electric Power Systems, 2005, 29(10): 64-68.

Google Scholar

[8] DUAN Bin, LIU Nian, WANG Jian, et al. Access security management of substation automation systems based on PKI/PMI. Automation of Electric Power Systems, 2005, 29(23): 58-63.

DOI: 10.1109/pes.2006.1709324

Google Scholar

[9] Taylord, Perrint et al. Using SRP for TLS Authentication[EB/OL]. [2006-08-20], htttp: /www. ietf. org/internet-drafts/draft-ietf-tls-srp-12. txt. (2006).

Google Scholar

[10] GAO Liangtao, DU Jie. Secure remote protocol and its security improvements. Computer Engineering and Design, 2003, 24(5): 65-67.

Google Scholar