Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ISO/IEC 61850 protocol for substation automation is a key component for the safe and efficient operation of smart grids, whilst offering a substantial range of functions. While extension standards, particularly ISO/IEC 62351 provide further security controls, the baseline protocol offers the assurances of access control and availability. In this paper a systematic study of selected aspects of the basic ISO/IEC 61850 protocol demonstrates that protocol-level vulnerabilities exist. The main finding is the development of a credential interception attack allowing an adversary, without credentials, to hijack a session during an initial association; the feasibility of this attack is proven using a formal language representation. A second attack based on a workflow amplification attack which relies on the assumptions in the protocol’s substation event model, which is independent of layered security controls and only relies on the protocol’s communication patterns is shown.

Cite

CITATION STYLE

APA

Wright, J. G., & Wolthusen, S. D. (2017). Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10242 LNCS, pp. 239–251). Springer Verlag. https://doi.org/10.1007/978-3-319-71368-7_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free