ABSTRACT
In order to solve the contradiction between the security and real-time of GOOSE message from the IEC 61850, the paper proposes a communication security model, which is based on the AES_CBC_MAC algorithm and key information encryption, and the communication security implementation process of GOOSE message based on the model, after analyzing the structure of the GOOSE message, comparing the requirements of the security and the comparison of the experiment. By analyzing of confidentiality and integrity, exampling of the star network intelligent substation as the model, using Modelsim and OPNET as simulation software for different lengths of GOOSE messages to carryout security line processing and communication delay, we obtain the total delay of the communication security model. Experiments show that the intelligent substation GOOSE message communication security processing program has both good security and real-time.
- Abdullah A, Kemal A, Mehmet H. Software Defined Networking for Resilient Communications in Smart Grid Active Distribution Networks{C}. USA: IEEE ICC 2016 SAC Communications for the Smart Grid, 2016: 978--1001.Google Scholar
- Communication networks and systems in substations: Part 9 specific communication service mapping: IEC 61850-90{S}. 2008.Google Scholar
- Damiano B, Rafał L, Michał R. Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics{C}.San Francisco, USA: Proceedings of the Federated Conference on Computer Science and Information Systems, 2016: 743--749.Google Scholar
- Fanny C, Eric S, Philippe A. A network simulator for IEC61850 architecture{C}.France: Copyright Material PCIC Europe, 2013: 1--8.Google Scholar
- Guo Shize. Password bypass analysis principle and method{M}. Beijing: Science Press, 2014: 35--42.Google Scholar
- He Lei. Getting Started with IEC 61850{M}. Beijing: China Electric Power Press, 2014: 260--313.Google Scholar
- Li Chao. Attack Methods and Examples of Block Ciphers{M}. Beijing: Science Press, 2010: 158--160.Google Scholar
- LI Fanxing, Qiao Wei, Sun Hongbin. Smart transmission grid: vision and framework{J}. IEEE Trans on Smart Grid, 2010, 1(2): 168--177.Google ScholarCross Ref
- Li Peng, Dou Pengchong, Li Yuwei, etc. Application of Microgrid Technology in Active Distribution Network{J}. Power automation equipment,2015,35(4): 8--16.Google Scholar
- Luo Zhao, Yan Tong, Xie Jihua, etc. Application of SM2 Encryption System in Telecontrol Communication of Smart Substation{J}. Automation of Electric Power Systems, 2016, 40(19): 127--132.Google Scholar
- Li Xiaohang. Certification Theory and Application{M}. Beijing: Tsinghua University Press, 2009: 19--33.Google Scholar
- NYRDA P T, TAFT J, DONNER P. Recommended approach to a NASPI net architecture{C}. Maui, USA: 45th Hawaii International Conference on System Science (HICSS) Press, 2012: 2072--2081. Google ScholarDigital Library
- Reza R F, Bahram R, Sayed M S. FPGA based fast and high-throughput 2-slow retiming 128-bit AES encryption algorithm{J}. Microelectronics Journal, 2014: 1014--1022. Google ScholarDigital Library
- Shay B, Amin K, Joseph S. Building Resilient Integrated Grids{J}. IEEE Electrification Magazine, 2015, 3: 48--55.Google ScholarCross Ref
- Tong Xiaoyang, Wang Xiaoru. Thoughts on Network Attacks and Grid Information Security Prevention Caused by U.S. Power Outages{J}. Automation of Electric Power Systems, 2016, 40(7): 144--148.Google Scholar
- WANG Fangfang, WANG Huazhong, Chen Dongqing. Substation Communication security Research Based on Hybrid Encryption of DES and RSA{C}. Beijing, China: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013: 437--441. Google ScholarDigital Library
- Wang Min'an. Research on Digital Substation Communication Security Method{D}. Beijing: North China Electric Power University, 2011: 9--12.Google Scholar
- Wang Zhidong. Research on Key Technologies of IEC 61850 Message Security{D}. Guangzhou: South China University of Technology, 2015. 24--36.Google Scholar
- Wang Zhidong, Wang Gang, Li Yongcang, etc. IEC 61850-9-2LE encryption method based on micro-encryption algorithm{J}. Automation of Electric Power Systems, 2016, 40(4): 121--127.Google Scholar
- Wen J, Hammond C, Udren E. Wide-area Ethernet net work configuration for system protection messaging{C}. USA: 65th Annual Conference for Protection Relay Engineers, 2012: 52--72.Google Scholar
- Yang Yang, Huang Xiaoqing, Cao Jia, etc. Substation Communication Message Security Authentication and Real-time Simulation{J}. Automation of Electric Power Systems, 2011, 35(13): 77--82.Google Scholar
Index Terms
- Research and Implementation on Key Information Security Algorithm Based on GOOSE Message
Recommendations
Design and Realization of FTU Message Transmission Process Based on GOOSE Communication Mechanism
IHMSC '11: Proceedings of the 2011 Third International Conference on Intelligent Human-Machine Systems and Cybernetics - Volume 01Feeder Automation is an important link of Distribution System Automation (DSA). As a key competent in a DSA, the improvement of the communication and data processing performance of a Feeder Terminal Unit (FTU) is especially important. This paper designs ...
IED Information Modeling for SF6 Circuit Breaker Status Monitoring in Smart Substation Based on IEC 61850
MACE '12: Proceedings of the 2012 Third International Conference on Mechanic Automation and Control EngineeringIn order to promote the practical application of IEC61850 in status monitoring (SM) system of smart substation, combined with the function requirement of smart substation SM and the characteristics of SF6 circuit breaker state on-line monitoring, the ...
Investigation on the Application of IEC61850 in Smart Distribution Grid with Micro-grid
ICCECT '12: Proceedings of the 2012 International Conference on Control Engineering and Communication TechnologyNew organizational unit of grid the micro-grid is an integral part of smart distribution network, with the advantages of flexible and efficient use of new energy, IEC61850 communication makes the electrical equipment of different manufacturers ...
Comments