Cargando…

Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid

IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protoco...

Descripción completa

Detalles Bibliográficos
Autores principales: Reda, Haftu Tasew, Ray, Biplob, Peidaee, Pejman, Anwar, Adnan, Mahmood, Abdun, Kalam, Akhtar, Islam, Nahina
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7926645/
https://www.ncbi.nlm.nih.gov/pubmed/33672360
http://dx.doi.org/10.3390/s21041554
_version_ 1783659508925464576
author Reda, Haftu Tasew
Ray, Biplob
Peidaee, Pejman
Anwar, Adnan
Mahmood, Abdun
Kalam, Akhtar
Islam, Nahina
author_facet Reda, Haftu Tasew
Ray, Biplob
Peidaee, Pejman
Anwar, Adnan
Mahmood, Abdun
Kalam, Akhtar
Islam, Nahina
author_sort Reda, Haftu Tasew
collection PubMed
description IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders.
format Online
Article
Text
id pubmed-7926645
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-79266452021-03-04 Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid Reda, Haftu Tasew Ray, Biplob Peidaee, Pejman Anwar, Adnan Mahmood, Abdun Kalam, Akhtar Islam, Nahina Sensors (Basel) Article IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders. MDPI 2021-02-23 /pmc/articles/PMC7926645/ /pubmed/33672360 http://dx.doi.org/10.3390/s21041554 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Reda, Haftu Tasew
Ray, Biplob
Peidaee, Pejman
Anwar, Adnan
Mahmood, Abdun
Kalam, Akhtar
Islam, Nahina
Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
title Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
title_full Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
title_fullStr Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
title_full_unstemmed Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
title_short Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
title_sort vulnerability and impact analysis of the iec 61850 goose protocol in the smart grid
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7926645/
https://www.ncbi.nlm.nih.gov/pubmed/33672360
http://dx.doi.org/10.3390/s21041554
work_keys_str_mv AT redahaftutasew vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid
AT raybiplob vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid
AT peidaeepejman vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid
AT anwaradnan vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid
AT mahmoodabdun vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid
AT kalamakhtar vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid
AT islamnahina vulnerabilityandimpactanalysisoftheiec61850gooseprotocolinthesmartgrid