3,175
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      13
      0
      6
      0
      Smart Citations
      13
      0
      6
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Authentication of GOOSE Messages under Timing Constraints in IEC 61850 Substations

      Published
      proceedings-article
      , ,
      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)
      Cyber Security Research
      10th-12th September 2019
      Cyber-physical security, authentication, RSA, HMAC, electrical substations, IEC 61850, IEC 62351, GOOSE
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 137-143
            Affiliations
            [0001]Institute of Automation and Applied Informatics (IAI)

            Karlsruhe Institute of Technology (KIT)

            Hermann-von-Helmholtz-Platz 1,

            76344 Eggenstein-Leopoldshafen

            Germany
            Article
            10.14236/ewic/icscsr19.17
            8b6cea67-1e6f-421b-9c6b-0416c194dcd1
            © Ghada Elbez et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/icscsr19.17
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            IEC 61850,IEC 62351,GOOSE,electrical substations,HMAC,RSA,authentication,Cyber-physical security

            REFERENCES

            1. OpenSSL library 1998 URL https://www.openssl.org/

            2. NIST Special Publication 800-57, Part 3: Application-Specific Key Management Guidance 2015

            3. The exact security of digital signatures-how to sign with rsa and rabin International Conference on the Theory and Applications of Cryptographic Techniques 399 416 Springer 1996

            4. RSA-PSS–Provable secure RSA Signatures and their Implementation Jan 31 2019 2011

            5. A Cost-efficient Software Testbed for Cyber-Physical Security in IEC 61850-based Substations 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 1 6 Oct 2018 [10.1109/SmartGridComm.2018.8587456]

            6. Application research of hmac in intelligent substation communication security DEStech Transactions on Engineering and Technology Research 2018

            7. Performance evaluation and analysis of IEC 62351-6 probabilistic signature scheme for securing GOOSE messages IEEE Access 7 32343 32351 2019

            8. Cyber Security Practical considerations for implementing IEC 62351 PAC World Conference 2010

            9. Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure Globecom Workshops (GC Wkshps), 2012 IEEE 1508 1513 IEEE 2012

            10. International Electrotechnical Commission (IEC) IEC 61850: Power Utility Automation (TC57) 2007

            11. International Electrotechnical Commission (IEC) IEC 62351: Power systems management and associated information exchange - data and communications security - part 6: Security for IEC 62351 2010

            12. International Electrotechnical Commission (IEC) IEC 61850: Communication networks and systems for power utility automation in substation - part 8.1 2011

            13. Secure communication of intelligent electronic devices in digital substations 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D) 1 5 IEEE 2018

            14. HMAC: Keyed-hashing for message authentication 1997

            15. Poisoned GOOSE: exploiting the GOOSE protocol Proceedings of the Twelfth Australasian Information Security Conference-Volume 149 17 22 Australian Computer Society, Inc 2014

            16. A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 120 126 1978

            Comments

            Comment on this article