ArticlePDF Available

Abstract

IEC 62351 is an industry standard aimed at improving security in automation systems in the power system domain. It contains provisions to ensure the integrity, authenticity and confidentiality for different protocols used in power systems. In this article we look at the different parts of IEC 62351 and assess to what extent the standard manages to improve security in automation systems. We also point out some incongruities in the algorithms or parameters chosen in parts of the standard. Overall, we conclude that the standard can significantly improve security in power systems if applied comprehensively, but we also note that the need to preserve (partial) backwards-compatibility has led to some design choices that provide less security than could have been achieved with a more ambitious approach.
DOI: http://dx.doi.org/10.14236/ewic/ICS2015.2
Assessing the Security of IEC 62351
Roman Schlegel
ABB Corporate Research
Segelhofstr. 1K, Baden
Switzerland
roman.schlegel@ch.abb.com
Sebastian Obermeier
ABB Corporate Research
Segelhofstr. 1K, Baden
Switzerland
sebastian.obermeier@ch.abb.com
Johannes Schneider
ABB Corporate Research
Segelhofstr. 1K, Baden
Switzerland
johannes.schneider@ch.abb.com
IEC 62351 is an industry standard aimed at improving security in automation systems in the power system
domain. It contains provisions to ensure the integrity, authenticity and confidentiality for different protocols
used in power systems. In this paper we look at the different parts of IEC 62351 and assess to what extent
the standard manages to improve security in automation systems. We also point out some incongruities in
the algorithms or parameters chosen in parts of the standard. Overall, we conclude that the standard can
significantly improve security in power systems if applied comprehensively, but we also note that the need
to preserve (partial) backwards-compatibility has led to some design choices that provide less security than
could have been achieved with a more ambitious approach.
Keywords: cyber security, IEC 62351, cyber security standard
1. INTRODUCTION
Automation systems are an important part of
everyday life. They manage the distribution of
energy (e.g., electricity, gas, etc.) and water, control
transportation systems, run power stations and
factories, and manage environmental aspects of
large office buildings (e.g., heating/cooling, lighting,
etc.), among many other things. A failure of
critical infrastructure can cause significant economic
damage within a short period of time (Anderson
and Fuloria (2010); Guthrie and Konaris (2012)),
and even endanger the lives and safety of a
population. Failures of critical infrastructure can
be caused by different events, such as natural
catastrophes (e.g., flooding), equipment malfunction
or also human error. However, another cause that
has become more important in recent years are
targeted attacks by hackers on the systems running
critical infrastructure (Miller and Rowe (2012)).
Because of society’s dependence on automation
systems it is therefore paramount to not only
improve the resilience of such systems against
equipment malfunction and human error, but also
improve the security against targeted and malicious
attacks of hackers. Unfortunately, many of these
systems have been designed and built at a time
when defending against malicious attackers was
not a priority, because such attacks were rare and
systems were much less interconnected than they
are today. Furthermore, because of the typically
long lifetime of automation systems of up to
several decades, improvements can only be made
gradually and over time. Nevertheless, in recent
years efforts have been made to address these
issues, for example by creating new standards
that describe how to augment decades-old systems
and protocols so that they can offer better
protection against malicious attacks. There are
a number of standards for automation systems
in general, however, IEC 62351 (International
Electrotechnical Commission (IEC) (2010b)) in
particular addresses security in systems and
protocols that are predominantly used in automation
systems in the electricity distribution domain. Like
many of these standards, it is not a revolution, but a
careful evolution, to address security issues without
completely breaking backwards-compatibility and
interoperability with legacy systems. In this paper, we
evaluate how IEC 62351 addresses security issues
in existing systems, to what extent it can mitigate
these issues, and whether there are remaining
issues that are not mitigated by the standard.
This paper is organized as follows: In Section 2
we give an overview of IEC 62351 and its ten
parts, followed by an evaluation of the standard in
Section 3. Section 4 provides an overview of related
work and standards, and Section 5 finally concludes.
2. IEC 62351 OVERVIEW
While the first parts of IEC 62351 (International
Electrotechnical Commission (IEC) (2010b)) were
c
Schlegel et al. Published by
BCS Learning & Development Ltd.
11
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
published as early as 2007, more recent parts
have been published in 2010, with some parts still
being a work in progress and an expected stability
date of around 2015. The standard addresses
information security for power systems control
operations, and the overall objective is to preserve
the properties of confidentiality, integrity, availability
and non-repudiation in a system, mainly through the
introduction of authentication mechanisms.
The standard is split into ten different parts that
address different areas, although at least one of the
parts has not yet been released (part 9). In the
following we give a brief overview of the different
parts of the standard.
IEC 62351-1: The first part contains a general
overview of the IEC 62351 standard, outlining
the aim of the standard, as well as briefly
introducing the different chapters. It also provides
general information on security, an enumeration of
security threats (both inadvertent and deliberate,
e.g., equipment failures, cyber hackers, etc.),
as well as a general overview of possible
security countermeasures. The part also briefly
describes concepts such as risk assessments, key
management and security processes, among other
things.
IEC 62351-2: The second part of the IEC 62351
standard is a glossary of terms, explaining terms
such as Access Control, Data Security, etc.
IEC 62351-3: The third part of IEC 62351
addresses the security of protocols based on
TCP/IP (Postel (1081a,b)) that are used for
automation systems in the electricity distribution
domain. Specifically, it prescribes the use of
Transport Layer Security (TLS) (Dierks and Rescorla
(2008)) with X.509 certificates (Cooper et al. (2008))
for TCP/IP-based protocols. The purpose is to
ensure authenticity and integrity of data on the
transport layer, and optionally also confidentiality by
using the encryption mechanisms of TLS. The use
of TLS also counters threats such as man-in-the-
middle-attacks and replay attacks. This part of the
standard also requires mutual authentication through
certificates (i.e., client and server each present a
certificate), and prescribes the algorithms and some
minimum key lengths to be used, as well as how to
handle certificate revocation.
IEC 62351-4: This part of the IEC 62351 standard
addresses security for profiles such as Manufactur-
ing Message Specification (MMS) (International Or-
ganization for Standardization (ISO) (2014)), which
is used in other IEC standards (e.g., IEC 61850-8-
1 and IEC 60870-6). Specifically, the part provides
recommendations for the A-Profile as well as the
the T-Profile based on TCP/IP. For the A-Profile,
IEC 62351-4 describes the use of X.509 certifi-
cates to authenticate applications, while for the TCP
T-Profile the standard describes how to use TLS as
a layer between TCP and the ISO Transport Service
(Rose and Cass (1987)) using a different TCP port
for secure connections. Further defined are the TLS
cipher suites that must (or should) be supported.
IEC 62351-5: The fifth part of the IEC 62351
standard describes security for protocols related to
IEC 60870-5 and derivatives such as DNP-3 (IEEE
Standards Association (2012)). These protocols are
message-based, and authentication therefore needs
to be done on a per-message basis. In addition,
any security mechanisms need to take into account
the often limited processing power available in the
affected devices. As keys used for authentication and
/ or encryption should be changed regularly, this part
also proposes mechanisms that allow to update the
keys in a device remotely.
IEC 62351-6: Part 6 of the IEC 62351 standard
addresses security for protocols described in the re-
lated standard IEC 61850 (International Electrotech-
nical Commission (IEC) (2010a)). For protocols
in IEC 61850 making use of TCP/IP and MMS,
the provisions described in IEC 62351-4 shall be
applied. Furthermore, this part proposes an exten-
sion to the IEC 61850 GOOSE and SMV PDUs
(protocol data unit), adding a field to the PDU con-
taining security-relevant information. The extension
is intended to authenticate a PDU by containing a
signed hash of the PDU. This part of the standard
also adds extensions to the Substation Configura-
tion Language (SCL) (International Electrotechnical
Commission (IEC) (2010a)) that permit to include
certificate definitions in the configuration.
IEC 62351-7: Power systems infrastructure makes
heavy use of interconnected information systems
to manage operations. This information systems
infrastructure also needs to be securely managed,
which is done using the Simple Network Manage-
ment Protocol (SNMP) (Case et al. (1990, 1996);
Harrington et al. (2002)). Part 7 of the IEC 62351
standard describes the data object models to be
used that are specific to power systems.
IEC 62351-8: Part 8 of the IEC 62351 standard
defines system-wide role-based access control for
power systems infrastructure. It addresses different
modes of access, such as direct and remote
access, as well as access by human users and
automated access by computer agents. To transport
roles, this part proposes three different formats for
access tokens, namely, X.509 ID certificates with
extensions, X.509 attribute certificates and software
12
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
tokens. Furthermore, the standard defines certain
mandatory rights and roles.
IEC 62351-9: This part of the standard has not been
released yet, but is intended to address certificate
and / or key management.
IEC 62351-10: Part 10 of the IEC 62351 standard
provides general guidelines for the security architec-
ture of power systems. This includes an overview
of security controls that can be applied in power
systems, as well as system architecture advice on
how to structure the communication infrastructure of
power systems.
In the next section we will evaluate the different
parts to determine to which extent they can address
security issues in power systems.
3. ASSESSING IEC 62351
3.1. IEC 62351-1: Introduction to Security
Issues
The information contained in this part of the
standard provides an overview of security in power
systems, listing the different threats to a system
and the corresponding security requirements that
can mitigate these threats. The enumeration is
quite complete, ranging from inadvertent threats
such as natural disasters to deliberate threats such
as disgruntled employees, industrial espionage and
hackers. The security requirements are also quite
comprehensive, and the standard cross-references
them with the appropriate security countermeasures
(although not all countermeasures are part of
the actual standard). Also mentioned are activities
such as risk assessments, or security policies,
as well as the challenges of security in power
system operations, where availability is much more
important than for example confidentiality.
Assessment. Overall, this section provides a
comprehensive overview of the security issues that
are relevant in a power system. However, the
remaining parts of the standard do not address
all of the issues mentioned in this part, but focus
on the countermeasures that can realistically be
implemented in an evolutionary manner.
3.2. IEC 62351-2: Glossary of Terms
The list of terms and abbreviations listed in this
part of the standard is quite extensive, providing a
short description of each term listed. The description
is usually concise and accurate. The glossary is
not entirely complete, there are some abbreviations
or terms that are not contained, e.g., “MAC” for
Message Authentication Code or the related “HMAC”
(Hash-based Message Authentication Code).
Assessment. This part provides an extensive list of
terms, together with a relatively detailed description
for each item.
3.3. IEC 62351-3: Profiles including TCP/IP
Part 3 of the IEC 62351 standard is targeting power
system automation protocols based on TCP/IP and
aims to achieve the following security objectives:
Message integrity protection, i.e., messages
cannot be modified or inserted. This counter-
acts the threat of a man-in-the-middle attack.
Confidentiality of messages (i.e., through
encryption), although this is optional. This
counteracts the threat of eavesdropping.
In addition, other mechanisms described in this part
also counteract the threat of replay attacks, where a
message is intercepted by an attacker and replayed
at a later point in time.
The key part of IEC 62351-3 is to use TLS (Transport
Layer Security, (Dierks and Rescorla (2008)) as the
underlying protocol to provide end-to-end transport
security for power system automation protocols,
together with X.509 certificates for the authentication
of devices. Because of the different requirements
of OT (operational technology) compared to IT
(information technology), the standard also provides
information on how to address these differences. For
example:
Session Duration. In power systems, connections
are often much more long-lived than in regular com-
puter networks. The standard therefore describes
mechanisms how TLS connections should be rene-
gotiated in regular intervals (e.g., depending on
time or number of bytes transferred) to ensure the
freshness of sessions. Furthermore, renegotiation
provides an opportunity to re-check certificates, in
case a certificate has been revoked in the meantime.
Certificate Handling. The standard supports the
use of multiple certificate authorities (CAs) in a
single IED, using a TLS extension (Eastlake (2011)).
This can be useful where IEDs are accessed from
different administrative domains. Also handled are
certificate revocation and certificate expiry.
Cipher Suite. IEC 62351-3 does not provide a
concrete list of TLS cipher suites that need to be
supported. Instead, it mandates the support of RSA
and DSS as the signature algorithms, while ECDSA
or ECGDSA are optional signature algorithms.
Furthermore, the use of RSA requires a key size of
13
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
2048 bit, with optional (albeit discouraged) support
for 1024 bit keys. For key exchange, support for
regular and ephemeral Diffie-Hellman key exchange
are mandated, with a mandatory key length of
2048 bit, and an optional, backwards-compatible key
length of 1024 bit.
General Requirements Additional requirements
foresee the co-existence of secure and insecure
communication by having TLS connections run
through a different port of a device. An optional
requirement is furthermore the use of certificate
pinning / whitelisting.
Assessment. The proposed use of TLS for power
system automation protocols based on TCP/IP
is a suitable choice that makes use of a well-
known and widely used protocol instead of trying to
implement proprietary security protocols. However,
the standard leaves the selection of acceptable
cipher suites for TLS to other standards, risking
incompatible implementations and the use of cipher
suites that do not offer sufficient security (e.g.,
cipher suites using RC4, AlFardan et al. (2013)).
Furthermore, the standard allows the use of NULL
ciphers, e.g., TLS RSA WITH NULL SHA1,within
an administrative domain, i.e., ciphers that do not
use encryption, although integrity and authenticity
is still guaranteed. However, it can be argued that
there are benefits of using encryption even within
an administrative domain. If an attacker gets access
to the local network, the use of encryption between
devices in the local network will make it more difficult
for the attacker to collect further information and
continue his attack.
One attack that IEC 62351-3 does not defend
against are IEDs that have been compromised by
an attacker, as the compromised IEDs will still
be recognized as legitimate by other devices in
the system. The use of TLS and certificates, can,
however, defend against the introduction of rogue
devices within a power system, as such a rogue
device would not have access to a valid X.509
certificate required for the secure communication
with other devices.
An additional issue with IEC 62351-3 for secure
communication within power systems that needs
to be kept in mind is that backwards compatibility
could be used by attackers to circumvent certain
security features. If an IED offers both secure and
insecure communication, an attacker could choose
to make use of the insecure communication channel
to get around authentication requirements. Likewise,
offering backwards-compatibility (e.g., 1024 bit keys)
1This seems to be mistakenly designated as TLS RSA NULL -
WITH NULL SHA in the IEC 62351-3 standards document.
will also reduce the security provided by the
standard, although it is clear that backwards-
compatibility is an important concern. However, this
compatibility will always have an impact on security.
3.4. IEC 62351-4: Profiles Including MMS
Part 4 of the IEC 62351 standard describes mea-
sures for securing MMS (Manufacturing Message
Specification, (International Organization for Stan-
dardization (ISO) (2014)). The standard proposes
security for the A-Profile (i.e., application-level se-
curity) as well as for the TCP/IP-based T-Profile.
The T-Profile based on OSI (i.e., ISO TP4 and ISO
CLNP) is not covered by this standard. Depending
on whether encryption is used, the mechanisms
described in this part will achieve different security
goals. If no encryption is used, only unauthorized ac-
cess to information is prevented. If encryption is used
(i.e., IEC 62351-3 is employed), then authentication,
integrity and confidentiality can be achieved.
A-Profile Security. Security for the A-Profile (the
application level) is achieved through certificate-
based peer entity authentication during association
setup. Specifically, a device will include an X.509
certificate, together with a timestamp and a signature
on the timestamp using the given certificate in the
association request. A receiving device will verify the
timestamp, and accept it, if the timestamp does not
differ by more than 10 minutes from the local time. In
addition, a device will not accept a message with a
timestamp that has already been seen within the last
10 minutes.
T-Profile Security. For TCP T-Profiles, the standard
recommends the use of TLS between TCP and RFC
1006 (ISO Transport Service on top of TCP, Rose
and Cass (1987)) on a separate port (3782). The
standard also recommends a list of cipher suites
for TLS, with one mandatory cipher prescribed
(TLS DH DSS WITH AES 256 SHA).2However,
TLS cannot be used for the T-Profile based on the
OSI stack, as TCP is not part of the network stack.
IEC 62351-4 therefore considers the T-Profile based
on OSI as out of scope.
Assessment. The main issue of IEC 62351-4
security for the A-Profile is that it does not cover
message integrity or confidentiality. It only covers
the initial authentication, but the authentication does
not extend to the subsequent messages within the
session. Furthermore, the authentication only covers
a timestamp included in the initial message, and
the timestamp only has to be accurate to within
2While the text of the IEC 62351-4 standard mentions TLS DH -
DSS WITH AES 256 SHA, a table of cipher suite combinations
within the same document mentions TLS DH WITH AES 256 -
SHA (i.e., without a signing algorithm). Presumably, TLS DH -
DSS WITH AES 256 SHA is the correct cipher suite designation.
14
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
10 minutes of the local clock of a device. This leaves
the A-Profile open to at least three different attacks:
an initial PDU can be modified (except the
timestamp) without invalidating the signature
the timestamp and authentication value can be
extracted from a PDU and re-used in a forged
PDU to a different device within 10 minutes of
the original PDU being sent
because intermediate messages are not
authenticated or protected, after the initial
authentication, an attacker can forge or modify
PDUs exchanged between two devices
Therefore, unless transport-level security (i.e., TLS
for the T-Profile) is also used, the security provided
by A-Profile security mechanism is minimal, as it
can neither guarantee integrity of messages, nor the
authenticity of any intermediate messages.
Regarding the T-Profile security, the mandatory
cipher defined in the standard does not use
ephemeral Diffie-Hellman (* DHE *or*EDH *),
but only uses regular Diffie-Hellman (* DH *), and
hence does not support perfect forward secrecy
(PFS). If perfect forward secrecy is a concern,
then the standard should also prescribe cipher
suites that support PFS. Among the optional cipher
suites are also combinations that include RC4,
the use of which has been discouraged (i.e.,
see RFC 7465, Popov (2015), based on results
by AlFardan et al. (2013)), and 3DES, which has
been estimated to be only secure until approximately
2030 by the National Institute of Standards and
Technology (NIST) (2007). The standard also
does not include recommendations for any cipher
suites making use of elliptic curves, for example
for the key exchange (i.e., ephemeral elliptic curve
Diffie-Hellman). Cipher suites that support PFS
using elliptic curve Diffie-Hellman instead of regular
Diffie-Hellman are considerably faster, and only
slightly more expensive than cipher suites without
PFS (Vincent Bernat (2011)).
Furthermore, the same caveats apply for IEC 62351-
4 as for IEC 62351-3, namely that systems will still
support both secure and insecure communication
(e.g., through different ports for the T-Profiles using
TCP/IP), allowing an attacker to gain access by
accessing the insecure mode. In addition, having the
option of disabling TLS is also explicitly permitted by
the standard.
Other concerns are that IEC 62351-4 permits
1024 bit RSA keys, which can no longer be
considered secure (Lenstra (2004)). All cipher
suites recommended in the IEC 62351-4 also
make use of SHA-1, which has shown signifi-
cant weaknesses, affording less than 80 bits of
security (Stevens (2013)).
3.5. IEC 62351-5: Security for IEC 60870-5 and
Derivatives
The core of this part of the standard is a challenge-
response authentication mechanism using HMAC
with pre-shared secret keys for integrity protection
of data. Messages (ASDUs) that are critical can
be protected by a challenge-response authentication
mechanism, where the sending station has to reply
to a challenge sent by the receiving station before
processing the ASDU. Alternatively, the sending
device can anticipate the challenge and include a
response with the initial ASDU to eliminate one
round-trip of data. There are also provisions for
updating keys remotely, using both symmetric or
asymmetric keys.
Assessment. The algorithms described in
IEC 62351-5 address authentication and the
integrity of critical messages, although they do not
provide any confidentiality of messages (except key
update messages). A detailed security analysis of
all the mechanisms described in IEC 62351-5 is
out of the scope of this paper, but the described
mechanisms seem to achieve the stated goals.
However, there appears to be some potential for
Denial-of-Service (DoS) attacks, as a device can be
tricked into taking certain actions (e.g., invalidating
session keys) if an attacker sends invalid messages.
The state space of all possible interactions between
devices (e.g., remotely updating keys, keeping track
of counters, etc.) appears sufficiently large that
there might be some concerns for a system to
reach a “dead-end” state, for example, a state
where controlling and controlled device are de-
synchronized such that no mutually agreed keys
can be established anymore. However, a conclusive
evaluation of the possible state-space is outside of
the scope of this paper.
There are also some constraints on choosing the
initialization vector (IV) for the AES-GMAC message
authentication code, and ensuring that these are met
might not be trivial.
3.6. IEC 62351-6: Security for IEC 61850
Part 6 of the IEC 62351 standard defines
security for protocols in IEC 61850 International
Electrotechnical Commission (IEC) (2010a)),
such as GOOSE (Generic Object Oriented
Substation Events) and SV (Sampled Values).
Some applications within IEC 61850 require
response times of 4 ms, and IEC 62351-6 does
not recommend encryption for these applications,
15
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
as the cryptographic overhead might already incur
delays of more than 4 ms. The standard does
include recommendations for confidentiality in case
of relaxed real-time requirements (i.e., more than
4 ms). For installations using IEC 61850 over MMS,
the use of IEC 62351-4 is recommended to provide
security. For installations using IEC 61850 with VLAN
technologies, IEC 62351-6 provides an extension to
the GOOSE and SV PDUs, adding an RSA-based
signature to ensure the integrity of the PDU.3
IEC 62351-6 also defines how to extend the
substation configuration language (SCL) to add
information about certificates to the configuration
of a substation, so that separate certificates for
GOOSE and SV can be defined.
Assessment. The proposed extensions in
IEC 62351-6 address some of the threats, for
example the integrity of messages, and some
protection against replay of messages. For MMS
messages making use of IEC 62351-4 with TLS,
authentication, confidentiality and integrity can
be achieved. For protocols like GOOSE or SV,
the extended PDU containing a signature should
guarantee authenticity and integrity. No provisions
are foreseen for traffic that requires a 4 ms response
time.
The standard suggests the use of RSA signatures
for providing authenticity and integrity of extended
PDUs, which makes it unsuitable for applications
where a 4 ms response time is required, as RSA
signatures are relatively expensive in terms of
computation power required. An HMAC (hash-based
message authentication code) on the other hand
can be implemented in hardware, requiring only
around 10µs for generating an HMAC for a typical IP
packet (Deepakumara et al. (2003)) in 2003. This is
likely to have improved significantly nowadays. Even
in software the calculation of an HMAC takes only
around 30µs, which should be short enough to still
allow a 4 ms overall response time.
The standard also does not define any details about
the certificates related to the RSA keys used for
signing extended PDUs.
3.7. IEC 62351-7: Network and System
Management (NSM) Data Object Models
Parts 3 to 6 of the IEC 62351 standard try to address
the security of communications and applications
within a substation and also between substations.
3The standard refers to this mechanism as a MAC (message
authentication code). However, in cryptography, MAC has a
specific meaning that is different from the mechanism described
in this standard, i.e., a MAC combines hashing with a secret key,
which is different from the signature-based mechanism described
in the standard.
These considerations are mostly localized, but it
is all part of larger communication and information
infrastructure of a power system operator that
needs to be monitored. Part 7 therefore defines
network and system management (NSM) data
objects that can be used together with the simple
network management protocol (SNMP) to monitor
and configure such an infrastructure. The scope is
to monitor and control not only the communication
networks, but also end devices (e.g., IEDs, RTUs,
gateways, data concentrators, etc.).
Assessment. The impact of this part of the standard
is mostly to provide a common framework to allow
for managing and controlling a communication and
information infrastructure as found in power systems.
The list of possible objects is quite complete,
covering a wide range from alarms, to status data,
to measurements, etc.
The standard does not define how these objects
are mapped to an underlying protocol (e.g., SNMP),
leaving this to other standards. It also does not
define in detail how access to these objects should
be controlled.
3.8. IEC 62351-8: Role-based Access Control
Part 8 of the IEC 62351 standard defines the
use of role-based access control (RBAC) in power
systems. This is not a new concept, it is in fact
part of best practices in many IT systems. The
use of RBAC in power systems makes it possible
to reduce the number of permissions that have to
be assigned to certain users such that they only
have the permissions they need to perform their
duties. This reduces the risk to the power system
as permissions are only assigned when they are
actually needed, according to the principle of least
privileges. The standard also defines a list of pre-
defined roles (e.g., VIEWER, OPERATOR, etc.),
and of pre-defined rights (e.g., View, Read, Control,
etc.). In addition, the standard also defines two
different models (i.e., push and pull) for authorization
mechanisms, and provides more information on how
to handle sessions.
Assessment. While the role-based access aspects
of this part are similar to current best-practices
in IT systems, some of the choices for the
access token profiles are unusual. In particular,
X.509 attribute certificates do not seem to be
widely used nowadays, and are an unnecessarily
complex choice for a token, potentially requiring an
additional and separate certificate hierarchy. Even
using X.509 ID certificates for carrying authorization
information is not an obvious choice, as any
changes in role affiliation require issuing a new
certificate, making it quite inflexible. Because issuing
16
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
certificates is typically an expensive operation
(in terms of management overhead), certificates are
better suited for providing authentication of subjects,
with a relatively long life-time of such certificates.
Authorization information should then be carried in
software tokens to allow for flexibility in assigning and
changing roles.
Part 8 also seems to define its own protocol for
secure session establishment. This is in general not
recommended, as devising cryptographic protocols
that are correct is extremely hard. Instead, peer-
reviewed and well-tested algorithms should be used.
3.9. IEC 62351-9: Certificate Management
This part of the standard has not been published yet,
but is expected to handle certificate management
for the certificates needed in the other parts of this
standard.
Assessment. As IEC 62351-9 has not been
published yet at the time of writing this article, no
assessment can be made.
3.10. IEC 62351-10: Security Architecture
Guidelines
Part 10 of the IEC 62351 standard provides
general guidance on power systems architecture
with respect to security. It enumerates possible
security controls (e.g., access control, firewalls, but
also processes like incident response, etc.), and
contains information on how to determine which
security controls should be used. Furthermore, it
illustrates the differences between security for power
systems and regular IT security. It also provides
several specific example architectures (e.g., an
advanced metering infrastructure, or a substation
automation system), with advice on the appropriate
security controls that should be used to secure a
system.
Assessment. This part of the standard gives a
comprehensive overview over how the different
standards address security in power and automation
systems at different levels. There is also a
detailed overview of possible security controls
ranging from the technological security controls
(e.g., authentication, access control, firewalls, etc.)
to the procedural (e.g., incident response, coding
guidelines, etc.), as well as regulatory and physical
security controls. Together with the concrete
architecture examples, this part of the standard
provides detailed and applicable information on the
security of power and automation systems.
4. RELATED WORK
There are a number of standards for security in
industrial automation systems apart from IEC 62351.
There is the ISA/IEC 62443 (The International
Society of Automation (ISA) / International Elec-
trotechnical Commission (IEC) (2014)) standard
(formerly ISA-99) concerned with security for in-
dustrial automation and control systems. This stan-
dard seems to be more broadly applicable than
IEC 62351, which focuses on power systems. In
addition, ISA/IEC 62443 concerns itself more with
procedures and management of security in ICS, and
less with the actual technical implementation details.
IEC 62351 on the other hand describes detailed and
specific changes to protocols to improve security.
Also a rather broad standard is NIST SP 800-82
(Stouffer et al. (2011)), which targets automation
systems in general. Another standard that is relevant
for the energy domain is NERC CIP (North American
Electric Reliability Corporation (2015)), although it
focuses rather on the operators of power systems,
instead of on the engineering companies.
In terms of research papers related to IEC 62351,
there are some papers examining IEC 62351 or
aspects of it. The paper by Fuloria et al. (2010)
examines in particular part 6 of the standard, which
deals with security for IEC 61850. In the paper, they
examine the impact of using RSA-based signatures
for authenticating PDUs within IEC 61850. Their
conclusion is that even hardware-based solutions will
not be sufficiently fast to achieve 4 ms response time
for reasonable RSA key sizes. They also show that
elliptic curve cryptography achieves lower response
times (e.g., below 1 ms), but it is not yet widely
used in substation automation. In summary, the
paper makes some valid points about IEC 62351-
6, but does not really go into the other parts of the
standard.
Two other papers examining IEC 62351 are papers
by Fries et al. (2010, 2011). Fries et al.
(2010) investigates IEC 62351 in the context of
smart grid environments, and gives an overview of
the standard as it existed in 2010. In particular, it
examines part 4 of the standard, and how it applies
to situations where connections are established over
multiple hops. It also provides suggestions on how
to improve the standard to allow for application-level
end-to-end encryption using different technologies
(e.g., H.235, XML security, etc.). Fries et al.
(2011) examines similar situations, focusing on end-
to-end security in new use-cases. However, both
papers only focus on specific parts of IEC 62351,
and do not give an overall assessment of IEC 62351.
17
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
5. CONCLUSIONS
The IEC 62351 standard addresses security con-
cerns in power systems, providing in part authen-
tication, integrity and confidentiality of data. The
standard proposes both standardized technologies
(e.g., TLS), and proprietary extensions to industrial
protocols.
The standard contains some inaccuracies (e.g.,
cipher suite designations), and unconventional
choices (e.g., RSA signatures for IEC 61850). It also
does not consider newer cryptographic algorithms
that could provide the same security guarantees
at a lower performance cost (e.g., elliptic curve
cryptography).
Nevertheless, the standard does provide a signifi-
cant improvement in security, providing authenticity,
integrity and at times confidentiality of data. How-
ever, it is clear that the standard is to some extent
constrained by requirements related to backwards-
compatibility, and hence does not always provide as
much security as could be provided if backwards-
compatibility was sacrificed. Overall, the standard
provides a balanced approach that can be imple-
mented with reasonable effort and that provides a
reasonable amount of security if implemented com-
prehensively.
REFERENCES
AlFardan, N. et al. (2013)
On the security of
RC4 in TLS. In: Presented as Part of the 22nd
USENIX Security Symposium (USENIX Security
13)
. Washington, D.C., 305–320.
Anderson, R. and Fuloria, S. (2010) security
Economics and critical national infrastructure. In:
Economics of Information Security and Privacy
.
T. Moore, D. Pym, and C. Ioannidis, Eds. Berlin,
Germany: Springer. 55–66.
Case, J. et al. (1990, May)
Simple network manage-
ment protocol (SNMP)
. RFC 1157 (Historic).
Case, J. et al. (1996, Jan.)
Introduction to
community-based SNMPv2
. RFC 1901 (Historic).
Cooper, D. et al. (2008, May)
Internet X.509
public key infrastructure certificate and certificate
revocation list (CRL) profile
. RFC 5280 (Proposed
Standard). Updated by RFC 6818.
Deepakumara, J., Heys, H. M., and Venkatesan,
R., (2003). Performance comparison of message
authentication code (MAC) algorithms for Internet
protocol security (IPSEC). In:
Proc. Newfoundland
Electrical and Computer Engineering Conf.
Dierks, T. and Rescorla, E., (2008, Aug.).
The
transport layer security (TLS) protocol version 1.2.
RFC 5246 (proposed standard)
. Updated by RFCs
5746, 5878, 6176, 7465.
Eastlake, D., (2011, Jan.)
Transport layer Security
(TLS) Extensions: Extension Definitions
.RFC
6066 (Proposed Standard).
Fries, S., Hof, H., and Seewald, M., (2010, May)
Enhancing IEC 62351 to Improve security for
energy automation in smart grid environments. In:
Fifth International Conference Internet and Web
Applications and Services (ICIW)
, 135–142.
Fries, S. et al. (2011, Apr.) Security for the smart
grid - enhancing IEC 62351 to improve security in
energy automation control.
Int. J. Adv. Security
,3,
169–183.
Fuloria, S. et al. (2010) The protection of substation
communications. In:
Proceedings of SCADA
Security Scientific Symposium
.
Guthrie, P. and Konaris, T. (2012).
Infrastructure and
resilience
. Government Office for Science. Tech.
Rep.
Harrington, D., Presuhn, R., and Wijnen, B.
(2002, Dec.) An
architecture for describing
simple network management protocol (SNMP)
management frameworks
. RFC 3411 (INTERNET
STANDARD). Updated by RFCs 5343, 5590.
IEEE Standards Association 1815-2012 (2012) -
IEEE standard for electric power systems
communications-distributed network protocol
(DNP3)
. Available from http://standards.ieee.org/
findstds/standard/1815-2012.html
International Electrotechnical Commission IEC
61850 (2010a)
Power utility automation
. Available
from http://www.iec.ch/smartgrid/standards/
International Electrotechnical Commission
IEC 62351 (2010b) Security. Availbale from
http://www.iec.ch/smartgrid/standards/
International Organization for Standardization ISO
9506 (2014)
Industrial automation systems -
manufacturing message specification
. Available
from http://www.iso.org/iso/catalogue detail. htm?
csnumber=37079
Lenstra, A. K. (2004) Key length. In:
Contribution to
The Handbook of Information Security
.
Miller, B. and Rowe D. (2012). A survey of
SCADA and critical infrastructure incidents. In:
Proceedings of the 1st Annual Conference on
Research in Information Technology, RIIT ’12
.New
York, NY, USA, 51–56.
18
Assessing the Security of IEC 62351
Schlegel
Obermeier
Schneider
National Institute of Standards and Technology
(NIST) (2007, Mar.) Recommendation for key
management - Part 1: general (revised). Available
from http://csrc.nist.gov/publications/nistpubs/
800-57/sp800-57-Part1-revised2 Mar08-2007.pdf
CIP (Critical Infrastructure Protection) Standards
(2015) North American Electric Reliability Cor-
poration Available from http://www.nerc.com/pa/
Stand/Pages/CIPStandards.aspx
Popov, A. (2015, Feb.)
Prohibiting RC4 cipher suites
.
RFC 7465 (Proposed Standard).
Postel, J. (1981a, Sept.)
Internet protocol. RFC
791 (INTERNET STANDARD)
. Updated by RFCs
1349, 2474, 6864.
Postel, J. (1981b, Sept.)
Transmission control
protocol. RFC 793 (INTERNET STANDARD)
.
Updated by RFCs 1122, 3168, 6093, 6528.
Rose, M. and Cass, D. (1987, May)
ISO transport
service on top of the TCP version: 3. RFC 1006
(INTERNET STANDARD)
. Updated by RFC 2126.
Stevens, M. (2013). New collision attacks on SHA-
1 based on optimal joint local-collision analysis.
In:
Advances in Cryptology–EUROCRYPT
.New
York: Springer, 245–261.
Stouffer, K. A., Falco, J. A., and Scarfone, K. A.
(2011) SP 800-82.
Guide to Industrial control sys-
tems (ICS) security: Supervisory control and data
acquisition (SCADA) systems, distributed control
systems (DCS), and other control system config-
urations such as programmable logic controllers
(PLC)
. Gaithersburg, MD, USA. Tech. Rep.
ISA/IEC 62443 (2014) The International Soci-
ety of Automation (ISA) / International Elec-
trotechnical Commission (IEC). Available from
http://isa99.isa.org/ISA99%20Wiki/Home.aspx
Bernat, V. (2011)
SSL/TLS & perfect forward
secrecy.
Available from http://vincent.bernat.im/
en/blog/2011-ssl-perfect-forward-secrecy.html
19
... To complement IEC 61850, the IEC 62351-6 standard is released [118], which specifies both authentication and encryption methods for communication with no impact on the protocols' performance. In contrast to secure DNP3, IEC 61850 with IEC 62351 is a SG communication protocol that combines two distinct security levels for various message types in order to manage the tradeoff between time-criticality and security [119]. ...
Article
Full-text available
Traditional power grids are transforming into Smart Grids (SGs) to address challenges such as unidirectional information flow, increasing energy demand, energy waste, and issues related to availability and security. This evolution is facilitated by the Internet of Things (IoT), and its integration with existing power grids is expected to yield future SGs that are more efficient and reliable. However, the reliable and continuous operation of SGs is threatened by cyberattacks due to the added advancements and IoT technologies. These threats pose a significant risk to the entire grid, making security a paramount concern in adopting SG technology. This paper provides a comprehensive survey of the cybersecurity challenges IoT devices face in SGs. It begins by outlining the architecture of SGs and the applications of IoT in the SGS. Then, the security challenges, objectives, and requirements of the SGs are discussed. Subsequently, the paper classifies and evaluates cyber-attacks based on the principles of Confidentiality, Integrity, and Availability (CIA) and the emerging sophisticated attacks. The paper then presents current security solutions, secure protocols and standards that counter each type of cyber-attack. It also discusses emerging solutions and modern technologies, such as artificial intelligence, blockchain, and Software-Defined Networking (SDN), that can tackle emerging cyber-attacks and enhance the robustness of SGs. Finally, the paper provides recommendations for further research based on the current literature and the findings of this research.
... This analysis should look into the effectiveness of its security advice, coverage, and alignment with current cyber threats. Tools such as gap analysis frameworks and threat modelling can help discover potential flaws and areas for development 1 . Key implementation suggestions should be prepared, providing practical assistance on how to efficiently apply the standard and customize it to unique industry needs. ...
Article
Full-text available
The paper explores the cyber security challenges faced by Operational Technology (OT) systems in the power sector, emphasising the need for a holistic approach that includes employee training, contingency planning, attack detection, and resilient protection schemes. It aims to contribute to a deeper understanding of the unique cyber security challenges and requirements of OT systems in power transmission utilities, enabling stakeholders to develop informed strategies, policies, and investments to mitigate cyber risks and enhance the resilience of electrical grids. Moreover, it also highlights the importance of training employees to identify and mitigate cyber threats, fostering a culture of security awareness. It also states how simulation and modelling can facilitate proactive identification and mitigation of potential cyberattacks on critical infrastructure while exploring robust security solutions for Intelligent Electronic Devices (IEDs) and proposes solutions for mitigating these threats. The importance of evaluating adherence to the IEC 62351 standard through dedicated tools and procedures is also emphasized.
... However, the update to IEC 27019 is still forthcoming; during the study, a mapping table between the standards was published (Bundesnetzagentur 2022). Further research could also examine other standards and guidelines (Schlegel et al. 2017, CEN et al. 2014, ENISA 2012, European Commission 2024, Leszczyna 2018). This could be used to investigate whether the results are transferable to other domains. ...
Conference Paper
Full-text available
The integration of information and communication technology (ICT) into the energy grid, making it the smart grid, necessitates enhanced security measures due to the potential impact of component failures on critical infrastruc-tures. To ensure comprehensive security coverage, organizations should establish information security measures. There are various guidelines available that describe information security measures. It is important to compare the various information security guidelines in this area to ensure comprehensive information security. This paper compares NISTIR 7628 with the ISO/IEC 27000 family and the German IT Grundschutz Compendium. A security recommendation table is created to systematically identify variations in security requirements across these standards. The discrepancies between ISO/IEC 27002 edition 2013 and 2022 are also considered. The identified differences are highlighted and emphasized, and it is demonstrated that a uniform language for the different documents would be beneficial.
... In general, several cybersecurity measures can be implemented, such as anti-malware, power system segmentation and firewall between segmentations, hardening access points, multi-step authentication, and security mechanism provided by IEC62351 standard series. However, some practical limitations in adapting these mechanisms and the evolving capabilities of cyber-attackers continue to render the smart grid vulnerable to these threats [6]. Attackers actively seek out system weaknesses to execute successful attacks. ...
Article
The advancement and proliferation of digitalization and communication infrastructure have facilitated the rise of real-time bidding markets in smart grids. In these dynamic markets, energy distribution companies and power-generating companies interact to establish energy exchange contracts based on offered prices. However, the fluctuation in power flow resulting from contract changes within the real-time bidding market introduces a potential vulnerability that malicious attackers can exploit to launch successful stealthy attacks. To enhance the smart grid resiliency against cyber-attack in the power market bidding environment, a new barrier-function adaptive finite-time trajectory tracking control is proposed in this paper. The developed controller is utilized to actively counteract and mitigate potential cyber-attacks to ensure their rejection and prevention. The stability analysis convincingly demonstrates the rapid convergence of system states within a finite time frame, empowering the system to effectively reject cyber-attacks in real-time. Test results of an IEEE test systems considering governor dead bound nonlinearity and communication time delay are presented and compared with those obtained from other methods to ensure and demonstrate the performance of proposed method. The Speedgoat real-time target machine, along with Simulink real-time, validates the effectiveness of the proposed method.
... The standard covers cybersecurity topics such as encryption and authentication for TCP/IP and 61850-based protocols, RBAC, cryptographic key management, and XML security. A comprehensive analysis of the different parts of IEC 62351 can be found in literature [7]. ...
Preprint
Full-text available
This article explores how syslog contributes to IEC 62351 compliance, particularly in incident response scenarios. Additionally, it outlines the extended benefits of incorporating syslog into OT environments, beyond the confines of the IEC 62351 standard.
... However, it does not guarantee that the system will not be subject to cyber attacks [106]- [109], especially since the multi-protocol and multi-process information interaction within IECPS power and heating cyber systems increases the vulnerability of the system. (b) The power system or other energy system's need to preserve (partial) backward-compatibility has led to some design choices that provide less security than could have been achieved with a more ambitious approach [110]. Compared with the power system, the ICT of the heating system trail behind the power system, making the cyber layer of IES more vulnerable based on the "barrel principle" in the case of energy system coupling. ...
Article
Full-text available
The integrated energy system leverages advanced information, communication, and control technology to integrate various energy subsystems, including electricity, heat, and gas, to achieve efficient and coordinated operation of the entire energy system. The integrated energy system further forms an integrated energy cyber physical system (IECPS) through resonant coupling between cyber and physical systems. However, integrating multiple energy subsystems and the deep coupling of cyber and physical procedures in the IECPS increases the risk of cyberattacks, necessitating enhanced cybersecurity measures. This paper provides a comprehensive overview of the cyber‐physical coupling modelling, security performance evaluation, attack and defence methods, and operation and recovery strategies of IECPS in response to cybersecurity threats. The coupling modelling of cyber and physical systems is discussed, followed by an evaluation of security performance of IECPS. Next, a range of attack and defence methods and effective IECPS operation and recovery strategies are presented. At last, the future research direction of IECPS cybersecurity is pointed out.
... ii. IEC 62351 The IEC 62351 protocol is an international industry standard developed by the International Electrotechnical Commission (IEC) whose first parts were published in 2007 and are constantly being updated [148]. IEC 62351 consists of cybersecurity standards that aim to improve security in smart power system devices and preserve the confidentiality, authenticity, and integrity of information [150]. This standard specifically addresses the cybersecurity of protocols and can be applied to all components of a smart grid architecture [92,148]. ...
Article
Full-text available
The current energy transition combined with the modernization of power systems has provided meaningful transformations in the transmission, distribution, operation, planning, monitoring, and control of power systems. These advancements are heavily dependent on the employment of new computing and communications technologies, which, combined with traditional physical systems, lead to the emergence of cyber–physical systems (CPSs). In this sense, besides the traditional challenges of keeping a reliable, affordable, and safe power grid, one must now deal with the new vulnerabilities to cyberattacks that emerge with the advancement of CPSs. Aware of this perspective and the severity of the ongoing challenges faced by the industry due to cyberattacks, this paper aims to provide a comprehensive survey of the literature on cybersecurity in cyber–physical power systems. For this, clear definitions, historical timelines, and classifications of the main types of cyberattacks, including the concepts, architectures, and basic components that make up, as well as the vulnerabilities in managing, controlling, and protecting, a CPS are presented. Furthermore, this paper presents defense strategies and future trends for cybersecurity. To conduct this study, a careful search was made in relevant academic and industrial databases, leading to a detailed reporting of key works focused on mitigating cyberattacks and ensuring the cybersecurity of modern CPSs. Finally, the paper presents some standards and regulations that technical and international institutions on cybersecurity in smart grids have created.
Article
Full-text available
Information security has gained tremendous importance for energy distribution and energy automation systems over the last years. Security for the smart grid is crucial to ensure reliability and continuous operation of the smart grid. However, the smart grid comes along with new use cases that impose new challenges on existing standards like IEC61850. IEC61850 offers standardized communication services and standardized data models for communication in energy automation, hence it is beneficial for the realization of the smart grid. IEC 61850 is flanked by the standard IEC 62351 that addresses security and specifies technical requirements, which have to be met by vendors. This paper provides an overview about the different aspects of security necessary to build and operate smart grid systems by describing current and new use cases. The focus lies on the current state of the standardization of IEC 62351 and its applicability to the described use cases. Moreover, this work discusses potential enhancements of the standard to address potential shortcomings through changed business and operation models leading to changed trust relations in new use cases like decentralized energy generation and load control. These shortcomings are addressed by describing potential enhancements for part 4 of IEC 62351 allowing multiple parallel distinguishable sessions based on the Manufacturing Message Specification and proper end-to-end authentication as well as authorization.
Conference Paper
Full-text available
Industrial control systems are an important part of critical infrastructures and their uninterrupted operation is important for many aspects of society. In recent years these systems have come under more scrutiny, as reports about attacks on them have become more frequent. There is therefore a need to better secure them, and the first step to achieve this is to identify the threat landscape for such systems. This is typically done by creating a threat model of a system, enumerating the potential threats, and then devising mitigation options based on the discovered threats. However, many of the available threat modeling methods and tools target very specific systems (e.g., software components), and do not lend themselves well to evaluating diverse systems or abstract reference architectures of systems. In this paper we present a methodology for system threat modeling that addresses this gap, by enabling the modeling of a diverse range of systems and reference architectures of systems. Furthermore, the methodology provides additional functionality, such as guiding the user in the completion of a threat model and automatically detecting unmitigated threats in a system. In addition, our methodology also takes mitigation into account by modeling the security components in a system. We have implemented the methodology in a web-based tool, and also evaluated the tool on a reference architecture of a complex automation system, validating both the approach and the tool.
Article
Full-text available
Industrial Automation systems are considered critical infrastructure as part of process and power plants. In view of the increased attacks on energy utilities, it has become a norm for the customers to be comprehended by the security requirements. Industrial Automation and Power System standards have evolved to address these requirements. An approach aligned to these standards and well integrated into the automation architecture can play a significant role in helping customer to protect the critical infrastructure from various cyber security issues. For that it really requires multi-agent based approach which protect industrial automation infrastructure at different layer. This paper proposes new solution based on multi-agent concept for the latest plant automation systems to protect customer investments through integrating security standards into the automation solutions as well as approaching more defenses in depth approaches aligning to IEC 62351 and ISA 99 standards for Industrial Control System Security.
Article
Full-text available
The pervasive adoption of traditional information and communication technologies hardware and software in industrial control systems (ICS) has given birth to a unique technological ecosystem encapsulating a variety of objects ranging from sensors and actuators to video surveillance cameras and generic PCs. Despite their invaluable advantages, these advanced ICS create new design challenges, which expose them to significant cyber threats. To address these challenges, an innovative ICS network design technique is proposed in this paper to harmonize the traditional ICS design requirements pertaining to strong architectural determinism and real-time data transfer with security recommendations outlined in the ISA-62443.03.02 standard. The proposed technique accommodates security requirements by partitioning the network into security zones and by provisioning critical communication channels, known as security conduits, between two or more security zones. The ICS network design is formulated as an integer linear programming (ILP) problem that minimizes the cost of the installation. Real-time data transfer limitations and security requirements are included as constraints imposing the selection of specific traffic paths, the selection of routing nodes, and the provisioning of security zones and conduits. The security requirements of cyber assets denoted by traffic and communication endpoints are determined by a cyber attack impact assessment technique proposed in this paper. The sensitivity of the proposed techniques to different parameters is evaluated in a first scenario involving the IEEE 14-bus model and in a second scenario involving a large network topology based on generated data. Experimental results demonstrate the efficiency and scalability of the ILP model.
Conference Paper
Full-text available
This paper discusses mainly the requirements of enhanced IEC 61850 security parameters for smart grid. Since IEC 61850 has been specified in 2003, smart grid was developed rapidly. This modern grid requires reliable, flexible, efficient and secured communication standards. Recent researches confirm that IEC 61850 meets the first three requirements, yet its security is still an issue due to certain factors, such as threats from the internet because of the mapping to TCP/IP stack and the duration of handshake process. First section of the research states a literature of IEC 61850 and its performance in smart grid. Second section outlines an overview of IEC61850 security issues as well as the current smart grid security requirements. Third section outlines possible solutions to increase IEC 61850's security in order to meet these requirements based on laboratory tests and results. fourth section handles a discussion of the innovated security standard IEC 62351 that will be the future solution for IEC 61850 security issues.
Book
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL's research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.
Article
Waterborne siliconated polyurethane (SiPU) was synthesized via solution polymerization using isophorone diisocyanate (IPDI), polypropylene glycol (PPG) and hydroxypropyl terminated polydimethyl sioxane (PDMS), dimethylol propionic acid (DMPA) and 1, 4-butanediol (BDO) as main materials. Further, a new type of polyurethane-acrylate hybrid emulsion containing siloxane and fluorine (FSiPUA) was synthesized via a seeded emulsion polymerization, in which the core phase consisting of butyl acrylate (BA), methyl methacrylate (MMA) and dodecafluoroheptyl methacrylate (DFMA), and the shell phase SiPU. The influence of the amounts of PDMS and DFMA on emulsion polymerization process and the surface properties of the latex was discussed. The structure and properties of the hybrid emulsion were characterized by FT-IR, CA, TEM, DSC and TG analysis. The results indicate that the resultant particles have the core-shell structure owing to the synergistic effect of PDMS and DFMA. The surface free energy is as low as 21.67 mN/m and deionized water contact angle for film-air interface is 102.3° when the amount of PDMS and DFMA is m(PDMS)/m(PU)=5.5/100 and m(DFMA)/m(AA)=15/100, respectively. And the thermal stability of the latex films is improved slightly.
Conference Paper
Critical Infrastructure represents the basic facilities, services and installations necessary for functioning of a community, such as water, power lines, transportation, or communication systems. Any act or practice that causes a real-time Critical Infrastructure System to impair its normal function and performance will have debilitating impact on security and economy, with direct implication on the society. SCADA (Supervisory Control and Data Acquisition) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously. As SCADA architecture relies on computers, networks, applications and programmable controllers, it is more vulnerable to security threats/attacks. Traditional SCADA communication protocols such as IEC 60870, DNP3, IEC 61850, or Modbus did not provide any security services. Newer standards such as IEC 62351 and AGA-12 offer security features to handle the attacks on SCADA system. However there are performance issues with the cryptographic solutions of these specifications when applied to SCADA systems. This research is aimed at improving the performance of SCADA security standards by employing NTRU, a faster and light-weight NTRU public key algorithm for providing end-to-end security.
Conference Paper
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the cryptanalysis of the cryptographic hash function SHA-1. Our work builds on previous cryptanalytic efforts on SHA-1 based on combinations of local collisions. Due to dependencies, previous approaches used heuristic corrections when combining the success probabilities and message conditions of the individual local collisions. Although this leads to success probabilities that are seemingly sufficient for feasible collision attacks, this approach most often does not lead to the maximum success probability possible as desired. We introduce novel techniques that enable us to determine the theoretical maximum success probability for a given set of (dependent) local collisions, as well as the smallest set of message conditions that attains this probability. We apply our new techniques and present an implemented open-source near-collision attack on SHA-1 with a complexity equivalent to 257.5 SHA-1 compressions. Secondly, we present an identical-prefix collision attack and a chosen-prefix collision attack on SHA-1 with complexities equivalent to approximately 261 and 277.1 SHA-1 compressions, respectively.