File(s) stored somewhere else
Please note: Linked content is NOT stored on CQUniversity and we can't guarantee its availability, quality, security or accept any liability.
Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid
journal contribution
posted on 2021-06-07, 00:31 authored by Haftu Tasew Reda, Biplob RayBiplob Ray, Pejman Peidaee, Adnan Anwar, Abdun Mahmood, Akhtar Kalam, Nahina IslamNahina IslamIEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard hardware-in-the-loop emulation. An in-depth experimental analysis is performed to demonstrate and verify the security weakness of the GOOSE publish-subscribe protocol towards the substation protection within the smart grid setup. It is observed that an adversary who might have familiarity with the substation network architecture can create falsified attack scenarios that can affect the physical operation of the power system. Extensive experiments using the real-time testbed validate the theoretical analysis, and the obtained experimental results prove that the GOOSE-based IEC 61850 compliant substation system is vulnerable to attacks from malicious intruders.
History
Volume
21Issue
4Start Page
1End Page
20Number of Pages
20eISSN
1424-8220ISSN
1424-8239Location
SwitzerlandPublisher
MDPI AGPublisher License
CC BYPublisher DOI
Full Text URL
Additional Rights
CC BY 4.0Language
enPeer Reviewed
- Yes
Open Access
- Yes
Acceptance Date
2021-02-17External Author Affiliations
Deakin University; La Trobe UniversityAuthor Research Institute
- Centre for Intelligent Systems
Era Eligible
- Yes