Abstract
IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized semantics of the communication protocols to launch different types of attacks such as false data injection (FDI) attacks. Hence, there is a need to develop a cybersecurity testbed and novel mitigation strategies to study the impact of attacks and mitigate them. This paper presents a testbed and methodology to simulate FDI attacks on IEC 61850 standard compliant Generic Object-Oriented Substation Events (GOOSE) protocol using real time digital simulator (RTDS) together with open-source tools such as Snort and Wireshark. Furthermore, a novel hybrid cybersecurity solution by the name of sequence content resolver is proposed to counter such attacks on the GOOSE protocol in smart grids. Utilizing the developed testbed FDI attacks in the form of replay and masquerade attacks on are launched and the impact of attacks on electrical side is studied. Finally, the proposed hybrid cybersecurity solution is implemented with the developed testbed and its effectiveness is demonstrated.
Similar content being viewed by others
Introduction
With the amalgamation of information and communication technologies (ICT) in power grids, the traditional power systems are rapidly evolving as smart grids. ICT enables remote monitoring, control, and automation of power systems1. For interoperable operation of smart grids many communication protocols and standards are proposed. Among them IEC 61850 has emerged as one the most popular and widely accepted standard for power utility systems2.
Standardized communication and protocols in smart grids present an increased vulnerability to cyber-attacks. The attackers may exploit the standardized semantics to launch different types of attacks on standardized communication. IEC 61850 communication protocols are vulnerable to cyber-attacks. In literature, many attacks on generic object-oriented substation event (GOOSE) and sampled value (SV) messages are widely reported3,4. Previous studies in literature showed that GOOSE messages are most vulnerable, a single contaminated GOOSE message can result in successful maloperation of circuit breakers and result in severe consequences5,6. IEC 61850 standard does not present any considerations or strategies for GOOSE messages against cyberattacks. IEC 62351 standard series compliments IEC 61850 standard by providing cybersecurity considerations for different IEC 61850 messages7.
In literature, researchers focused on developing information technology (IT) or operational technology (OT) based solutions for securing GOOSE messages against different attacks. For instance, in8,9 authors proposed use of Rivest–Shamir–Adleman (RSA), elliptic curve digital signature algorithm (ECDSA) and rainbow signature scheme (RSS) based digital signatures for securing GOOSE messages. However, in8,10 it was proved that the digital signatures result in high computational delays and hence not suitable for time critical GOOSE messages with stringent 3 ms timing requirements. Recently published IEC 62351-6 standard proposed light weight message authentication code (MAC) algorithms to secure the GOOSE messages11,12,13. Authors in14 introduced caching-based MAC and less-online/more-offline MAC signatures which further reduces computational delays. Although the MAC algorithms have very less computational delays, they are symmetric algorithms which require a pre-shared key. Safe distribution and update of pre-shared keys is a quite challenging and in turn requires robust key distribution mechanism.
On the other hand, OT based solutions (generally outside the IT domain) for securing GOOSE message against cyber-attacks were developed. In such solutions, the contents of the communication messages are verified before they are processed further. This verification can be carried out by various methods, such as confirming the message contents received by the neighboring IEDs15, or using machine learning tools to detect abnormal GOOSE messages16. In17, authors presented a sliding window-based sequential classification mechanism to detect abnormalities. Similarly, in18, discrete wavelet transform (DWT) and Long Short-Term Memory (LSTM)-based autoencoder network is proposed to detect anomalies in GOOSE messages.
In literature, the available solutions for securing GOOSE messages are either IT based, or OT based. However, there is a need for developing holistic solutions which involve both IT and OT domains. In this regard, this paper proposes a holistic solution for securing GOOSE messages using a sequence content resolver which combines both IT and OT based solutions. On IT side, MAC value is checked to confirm the integrity of the received message, then a strategy based on transmission sequence counter sqNum and event update counter stNum is devised to introspect the sequence and content of GOOSE packets. On OT side, once it is confirmed that there is change in data content, confirmation is acquired from the neighboring IEDs and the counterfeit messages are segregated from the real ones based on a rule based applied security. Table 1 presents the qualitative feature comparison of the proposed holistic solution with the existing solutions to secure GOOSE messages. The effectiveness of the proposed holistic solution is demonstrated by conducting performance evaluation tests on the real-time cyber-physical test bed of a standard microgrid. The main research problem is to simulate cyberattacks (FDI attacks, mainly masquerade and replay attacks) on GOOSE protocol using real time digital simulator on a standard microgrid and later deploy mitigation technique to counter these attacks. Hence, the main contributions of this work are as follows:
-
1.
Developed real time test bed for studying cyberattack (FDI) on GOOSE protocol using RTDS and Snort.
-
2.
Proposed a novel IT + OT security scheme for securing GOOSE protocol. Snort is used to inject FDI attacks and Wireshark is used to monitor the GOOSE packets. An anti-Snort is proposed by the name of sequence content resolver (SCR) which nullifies the impact of Snort. SCR comprises of two modules i.e. COMM and ELEC, the former is the communication module which deals with the replay attacks (sequence of GOOSE packets) and the latter is the electrical module which deals with the masquerade attacks (content of GOOSE packets). Both modules together constitute SCR and mitigate the FDI attacks.
-
3.
Demonstration of cyberattacks and proposed mitigation strategy on a real time digital platform. The result of masquerade attack is presented to create a system fault alike situation on power system. The exploited GOOSE packets effect the protection and control (P&C) IEDs which trip the breakers or generate islanding scenario in case of microgrid, this impact is evaluated, discussed and presented.
The rest of the paper is organized as follows. “IEC 61850 protocols and control authority” presents the background of IEC 61850 standard and control authority. “Methodology to validate cyberattacks” discusses the development of testbed and demonstration impact of cyberattacks. “Implementation of hybrid solution” discusses the design and implementation of the proposed holistic sequence content resolver for mitigation of cyberattacks on GOOSE messages. Finally, conclusions are presented in “Conclusions”.
IEC 61850 protocols and control authority
The first edition of IEC 61850 was initially developed for substation automation systems. In the later editions of IEC 61850 standard, it was extended to entire power utility automation systems. The IEC 61850 standard defines four protocols namely GOOSE, SV, MMS and SNTP:
-
GOOSE for switching signals from IEDs to circuit breakers (CBs);
-
SV for measurement values from merging units (MU) to IEDs;
-
Manufacturing message specification (MMS) to exchange measurement readings and control commands between human–machine interface (HMI) and IEDs;
-
Simple network time protocols (SNTP) for time synchronization of IEDs with GPS master clock.
An operator can trip circuit breakers via GOOSE messages during fault or maintenance. To grant access to operators at different locations and to avoid conflicts between them, a concept called control authority is used, which designates an operator’s right to switch a specific circuit breaker22. This implementation is based on an entity called a switch object (SO), which is a combination of three logical node (LN) instances, XCBR (or XSWI), CSWI and CILO as shown in Table 2 and Fig. 1. A SO takes the control parameters and an interlock logic as inputs. A particular SO can be mapped to the desired circuit switch in the simulation for control operations. A remote client can access the SO for control purposes using the MMS protocol as shown in Table 3. The binding of external trip signals (published as GOOSE messages) to the corresponding circuit breaker is achieved using a generic input (GGIO LN instance), and done independently from the SO.
Circuit breaker control based on switch object22.
Methodology to validate cyberattacks
A testbed is developed to create cyberattacks or false data injection (FDI) attacks on power systems using real time digital simulator (RTDS). It can be further utilized to investigate the attacks on IEC 61850 communication protocols and to analyse its impact on power systems.
Testbed for implementation and modification of IEC 61850 communication
The time stringent communication protocols in IEC 61850 are GOOSE and SV. The GOOSE is responsible to send control commands from P&C IEDs to circuit breakers (CBs) IEDs, while the SV provides sampled and digitalized values of current and voltage measurements to the same P&C IEDs from merging units (MU). Hence, both these control commands and measurements data being transferred by GOOSE and SV protocol respectively fall under the protection scheme of substations where timely measures are necessary. An attacker who can exploit the vulnerabilities of these protocols can do great damage both to power equipment and supply being fed to consumers. The modification in SV packets leads P&C IEDs to receive fake data and based on this fake data they directly or on the approval of operator can issue wrong commands to associated CBs. In addition to this indirect attack via SV to change the status of the CB, the attacker can also directly control GOOSE packets to trip/reclose CBs of his choice to demonstrate a picture of fear, havoc and economic turmoil among the working personnel and connected customers. The explained attack is conducted in following two steps:
-
1.
Real time simulation of GOOSE packets between IEDs,
-
2.
We feed fake data to IEDs through the GOOSE protocol, simulating a compromised IED accessed and controlled by an attacker.
The implementation is carried out using an interconnection system of RTDS23, Wireshark24 and Snort25 as shown in Fig. 2. The first system provides real time simulation features for any power system to be studied. Its recent network interface card GTNETx2 is the communication interface for simulation of communication packets coming out and going into the simulated power system. Each GTNETx2 card has two modules, and each can simulate one protocol at a time such as GOOSE, SV, MMS, DNP3 etc. The setup to test and modify the simulation of communication packets is through a publisher-subscriber setup where transmission is broadcasted in multicast fashion by the publisher and different subscribers can subscribe to the data being transmitted. Due to multicast nature of GOOSE packets, an attacker who gets access to the substation’s network can view the GOOSE packets and also inject counterfeit GOOSE messages with faulty information. This action may lead to tripping or holding the circuit breakers which damages the equipment causing harm to the stable operation of power system. The GOOSE messages being published and later being subscribed by particular IEDs are monitored by an open-source tool Wireshark.
Testbed with RTDS, Snort, and Wireshark6.
For modifying the packets, Snort, another open source tool, with some changes is being utilized to capture the packets from publisher, modify them and later inject them in to the network. Snort basically captures the GOOSE packets published by P&C IEDs and modifies them by changing the value of stNum field to high number and value of data field as selected by the user. These modified packets are then re-published by Snort which are received by the CB IEDs. The testbed has the advantage that it is based on open-source tools. It is capable of simulating and modifying the communication packets of various protocols such as GOOSE, SV etc. which constitute an attack and is later supporting in evaluating the impact of modification in communication packets over the automated power system.
Simulation and modification of GOOSE packets
GOOSE protection is the most critical protocol as it is used in protection schemes to trip/reclose CBs in response time matching within 3 ms. In order to simulate the GOOSE packets between publisher–subscriber setup, we have engaged both modules of a GTNETx2 card; one acting as sender or publisher while the other is behaving as receiver or subscriber. The communication packets in between them are of 4 different data types (integer, binary, two-bits and floating point) out of which the tripping/reclosing command is usually sent with Boolean type of data. As shown in Fig. 3, IED 1 is sending the 4 types of data [3 0 1 60] and same is subscribed by IED 2 while IED 2’s broadcasted data [5 1 3 100] is being subscribed by IED 1. The attack is simulated in Fig. 4 when IED 1 is acting as publisher with data [3 0 1 60] which is being lost and modified because IED 2 is receiving counterfeit data [9 1 3 22.22]. This modification is conducted by capturing the publisher packets using Snort with GOOSE packets important parameters i.e. control block (gocbRef) and data set (datSet). The packets are monitored on Wireshark and this experiment validates the direct FDI attack on GOOSE communication between IEDs and its impact on electrical side is very harmful. For instance, an attacker can corrupt the Boolean value in order to open circuit breakers for cascaded tripping affecting consumers or he can also keep the breakers in closed position during actual system fault to damage the equipment.
RTDS runtime for GOOSE communication between IED 1 and IED 2 before the manipulation of packets by the attacker6.
RTDS runtime for GOOSE communication between IED 1 and IED 2 after the manipulation of packets by the attacker6.
The original GOOSE packet and the corresponding modified packet as observed in Wireshark is shown in Fig. 5. The modification is done by the attacker in all 4 data types and IED 2 is receiving the counterfeit message [9 1 3 22.22] instead of originally broadcasted message [3 0 1 60] by IED 1 as publisher. The packets are focused on the integer and Boolean data types only as the Boolean data is normally used to change the status of the breaker. The two counters i.e. status (stNum) and sequence (sqNum) in GOOSE packets are to be carefully observed from security perspective because the first status counter increments on every new event or status change while the latter sequence counter increments on periodic transmission of repetitive packets. sqNum keeps on increasing its value by 1 until its maximum value is reached while stNum will stay as it is and will only change once there is any new event meaning once there is any change in the data items of GOOSE packets. The original and counterfeit messages can be compared in parallel using their timestamps as the genuine packet originated from GTNETx2 card has older timestamp of year 2004 which can be synchronized to present date and time but for identification purposes of original GOOSE packets, we did not synchronize the time and date. The timestamp of fake packet is aligned with the time of experiment i.e. year 2020 as per the workstation’s clock with Snort installation used for modification of packets.
Original and counterfeit GOOSE packets for IED 1 on LAN port6.
The GOOSE protocol is the critical one among others in IEC-61850 power system automation standard due to its role in protection schemes of electrical network, hence suitable countermeasures should be devised based on the concepts of cyber and physical domains to secure power system communication26.
Impact of FDI attacks on simple and complex electrical systems
In a doubly fed system with 3 buses as shown in Fig. 6; bus 1 and 2 has a circuit breaker CB1 in the middle and there is resistive load connected to bus 2 while bus 3 is connected directly to bus 2 with line impedance. The bus 1 and 3 are source buses. The GOOSE packets can send tripping/reclosing command to CB1 and its impact is evaluated on electrical side. Normally, the circuit breaker is closed but to disturb the system, a GOOSE tripping command can be sent as discussed before by changing the data item of the Boolean type to TRUE. This will cut off Source 1 on the left side and Source 2 on the right side will be the only one remaining now feeding the resistive load at bus 2. The redundancy of dual source has been compromised, the breaker current will drop to near zero while the condition of bus voltages before and after tripping is given in Table 4.
3-phase doubly fed system in RSCAD Draft with 3 buses, circuit breaker, isolators and load6.
This impact on a simple electrical system creates disturbance and stability issue once the circuit breakers are controlled by counterfeit GOOSE commands. The effect becomes manifold as the circuit becomes large and complex. We have simulated and modified the GOOSE packets and now we will discuss its impact on a standard electrical system known as Banshee microgrid as shown in Fig. 727.
Banshee microgrid, a commonly used system in real time simulation studies, includes three radial feeders connected to the grid that feed three independent areas. The independent areas can work autonomously in islanding mode but can also be inter-connected through normally opened (N.O.) tie switches. Switching between grid-connected and islanding mode simply requires to trip the main breaker of the area. This can be achieved for example by sending a simple GOOSE packet with Boolean data set to 1 that triggers the islanding mode. When entering islanding mode, the frequency drops. If the generation in the independent area, now isolated from the grid, is insufficient to satisfy the load demand in isolated area, further tripping or load shedding may follow. Isolating power components by tripping specific breakers in different areas, eventually leads to disturbances in the overall system.
Regarding the generation assets, the Banshee microgrid includes6:
-
In the first area, a 4 MVA diesel that implements the governor, exciter and synchronous generator model.
-
In the second area, a 5 MVA photovoltaic (PV) with 2.5 MVA battery energy storage system (BESS) based on the average value model for converter.
-
In the last area, a 3.5 MVA natural gas fired combined heat and power (CHP) that implements the same governor, exciter and synchronous generator model used in area 1. The system further includes the following components:
-
Transformers: with primary voltage level of 13.8 kV stepping down to 4.16 kV, 480 V and 208 V secondary voltage levels.
-
Loads: dynamic aggregated ones (categorized into critical, priority and interruptible) and motor loads (induction motor driving 200 horsepower (hp) chiller compressor).
-
Cables: modelled with series resistance-inductance (RL) impedances.
-
Circuit breakers: including synchro-check capability for main incomers (3 areas) used to connect each area to the grid. All these breakers including in each area can be controlled by external trip/reclose signals or manual push buttons in Runtime of RSCAD.
Due to its design, the Banshee microgrid is a great fit to investigate islanding scenarios. In such scenario, an area is islanded to make sure that its frequency would remain stable, and that generation can keep up with the demand in the area at least. In case of the frequency drops, each area has controls in place to prioritize some loads and shed them if needed. Islanding also modifies the generation assets operating points; for instance, BESS in area 2 shifts from PQ to VF mode. Figure 8 shows the difference in steps 1 to 5 observed after islanding between areas with renewable generation (area 2) and areas with conventional generation (areas 1 and 3). After islanding an area by tripping the main incomer breaker, the frequency drops below the nominal frequency and the area has not enough generation capacity to reach nominal frequency back. Thus interruptible loads are shed, such as I2 in area 1. Furthermore, the sources change to new operating points and finally the rotating phasors at the top of each diagram indicate the discrepancy of voltage frequency between the grid and the area. In area 2, the situation is more favourable as the battery provides power to the area allowing it to avoid tripping interruptible loads such as I3 in area 2.
Islanding Area 1 or Area 3 vs. Area 26.
Beyond real time islanding scenarios, the Banshee microgrid provides the opportunity for power system studies for many electrical systems cyberattacks. For instance, an attacker injecting false data between the Aggregator (an equipment responsible for communication with distributed energy resources (DERs) and optimization to provide economical energy from them) and DERs could prioritize specific DERs thus creating monopoly for selling electricity or corrupt load shedding controls. Denial of Service (DoS) attack can also efficiently target one of the Aggregator to block available power information from DERs, resulting in generation assets to overload for long time, leading to their damage or failure.
Implementation of hybrid solution
In this work, we proposed a hybrid solution that functions on knowledge of cyber and physical domains of the power system. ICT-based solutions may present a high false negative/positive ratio and cannot do much protection once the attacker breaches the electronic boundary of substations. Hence, holistic countermeasures based upon communication and power fields provide enhance security towards the cyberattacks. The communication packets and protocols as defined in IEC-61850 for power system communication consists of header and payload. An attacker tries to exploit either or both in order to launch replay and masquerade attacks. Hence, the proposed solution tackles both sequence and content of the packets and handles them to rule out traces of exploitation in terms of false data injection.
The sequence will be checked by the first module based on communication concepts, and the content will then be investigated by the second module based on electrical concepts. For GOOSE communication packets, the sequence can be checked by analyzing the status and sequence counters (stNum and sqNum). The replay attacks can be detected and mitigated if these counters contain older values compared to the previously stored packet. In addition, timestamps can be additionally used to check in the case if the attacker has replayed an older packet instead of creating a new one with new values of the counters. For content exploitation, we have to address the electrical understanding of the data items in GOOSE packets. As the data items contain mostly binary values representing the tripping/reclosing status of circuit breakers, hence we have to devise or adopt a method to get a valid confirmation of such requests coming from protection and control (P&C) IEDs to the CB IEDs.
In15, authors proposed a scheme to check changes in relay settings and sensor measurements and controlling directly CB IEDs by electrical based mathematical equations and calculations. Based on these calculations, they check the behavior of other IEDs in the vicinity compared to the target IED and await their approval to honor or dismiss such requests, resulting in changing the breaker status. The block diagram of the mitigation strategy is shown in Fig. 9. In addition to this strategy and to make our solution effective, the use of MAC algorithms on communication level is also applied to authenticate the data and source of communication packets21. The publisher IED appends the GOOSE message with MAC value generated using the secret pre-shared key and sends it to the subscriber. The subscriber IED receives both the GOOSE message and MAC value. Then subscriber recalculates the MAC value for the received GOOSE message using the secret pre-shared key and compares this calculated MAC value with the received MAC value. If the MAC values do not match, the packet is rejected.
The sequence module in the sequence content resolver will check stNum and sqNum to decide whether it is a replay attack or not, while the content module will rule out masquerade attack by cross-validating the commands with neighboring IEDs. The try to falsely open or close circuit breakers can be via different paths as described in an attack tree as shown in Fig. 1015. The access to the substation network can be from inside the substation (process bus) or remotely from outside (station bus). Afterward, an attacker would try to access HMI, relays settings, control commands, and sensor measurements either individually or in combination, all of this in an attempt to trip or reclose circuit breakers. The intended impact is to trip circuit breakers, transmission lines, bus bars, transformers, and other critical infrastructure providing either supply to consumers or protection to the infrastructure. The objective is to create a havoc in the working personnel and the connected consumers in order to create an economic turmoil.
Attack tree showing the paths for potential cyberattacks15.
Mainly, three types of exploitations are attempted by an attacker15 to disrupt the operations of circuit breakers. The first one is to change the configuration settings of relays. The second is to inject false data into measurement sensors. The third is to directly control the circuit breakers to affect the connected consumers for malicious objectives. The first two exploitations are indirect and lead to tripping/reclosing of circuit breakers, while the third one is the direct attempt to change breaker status by issuing counterfeit messages. In15, they have successfully developed the method to counter-check the control commands with surrounding IEDs. Only after their approval will allow or block tripping/reclosing signals be put through. Our content module has adopted the physical or power domain-based mitigation methods from5. The content of GOOSE packets is verified by those techniques, resulting in passing the genuine commands and blocking the ones originating from an attacker. The difference in our work compared to5 is that we have provided a holistic cyber-physical solution at the subscriber IED level. The cyberattack will be fought on both levels of communication and power domains by the proposed novel sequence content resolver.
Figure 11 shows the functional diagram of the novel sequence content resolver. The publisher or P&C IED can be accessed directly from the substation network by process or station bus in order to change the status of circuit breakers. The indirect access would be to again open/close the circuit breakers by changing the settings of relays or sensor measurements such as current/voltage transformers and merging units. The control commands are sent by P&C IEDs to CB IEDs and the previous packets (Z) are stored in order to communicate privately in case of attack on channel between the publisher and subscriber IED and later they help too to diagnose the attack on publisher IED. Once the packets are received by subscriber IED over LAN, their previous counterparts (Y) are stored, and the present packets (X) are submitted to the communication module (COMM), which will check the sequence of packets based on stNum and sqNum counters. The function of this module is to look out for replay attacks by issuing a proper alert. For replay attacks, the stNum and sqNum of present packets are compared with that of their previous counterparts, if they are older, then the packet is discarded with an alarm of replay attack. Otherwise, the packets are passed to the electrical module (ELEC) for investigation of masquerade attacks or content exploitation. The increment in stNum is analyzed with the help of neighboring IEDs in order to differentiate between real and fake commands. After getting approval from surrounding IEDs, the real commands are passed while fake commands are alarmed as masquerade attacks. Afterward, only the data items of the packets with their past counterparts both in publisher and subscriber IEDs are checked step by step to find and declare attacks on sender and channel, respectively. Further description on the working of both modules is given below:
Sequence or communication module (COMM)
This module checks for the exploitation in the sequence in the form of replay attacks. First, the MAC value is calculated for the received message using the pre-shared secret key and compared with the received MAC value. If the MAC value does not match the packet, it is discarded, otherwise the packet is processed further. If the value of sqNum is lesser than that of the previous packet or the timestamp is two minutes older21, it means that the attacker is replaying an old packet, and it should be discarded. The same thing is done for a packet with older stNum but if the value of stNum is greater than that of its previous packet, it can be either a genuine status change or a masquerade attack by the attacker. It also signals that the data items of the GOOSE packet are now different than that of the previous packet, and hence it should be analyzed by the content module.
Content or electrical module (ELEC)
In this module, the packets are investigated for masquerade attacks where the contents of the packets are definitely changed by the attacker. The change is signified by increased stNum, but now the module will take surrounding IEDs into confidence for confirmation of this command signal. The IEDs are approached by calculating different parameters depending upon the case of exploitation, as explained in15, and the same is adopted in this work. For a change in relay settings or sensor measurements, they indirectly impact the associated control commands of circuit breakers and hence should be verified by the neighboring IEDs before executing it. The direct attack on circuit breaker control via the GOOSE command is also possible and can be carried out by the attacker. The following parameters and calculations in time less than operational protection scheme is investigated for target IED by communicating the neighboring IEDs15:
-
1.
For a change in relay settings, if there is no loss of protection coordination scheme, the adjacent IEDs will permit control command; otherwise, it will be blocked.
-
2.
For a change in sensor measurements, the fault transients of neighboring nodes will be compared, and the decision to permit or block the control command by the target IED will be taken.
-
3.
For direct circuit breaker control attack on IED, the security gateway will respond if there is an impact with respect to line overloading and bus voltage conditions. If the impact is potential cascaded tripping of lines or voltage stability issue, then the blocking signal will be sent by the security gateway to the IED under consideration.
After the installation of sequence content resolver at subscriber IED level, the genuine packets are streamlined in contrast to "Simulation and modification of GOOSE packets" and Fig. 5. The counterfeit messages which were sent by the attacker with incremented stNum and changed data items are discarded while the real and genuine packets are passed with the same stNum and incremented sqNum as shown in Fig. 12. Further from the comparison of fixed timestamps, it is also clear that both packets are originated from the network interface card of RTDS. Therefore, both timestamps are the same representing the same fact, and are set so for easy identification of genuine packets, while fake messages contain the timestamps of the workstation from where they are originated. Moreover, the stNum will be incremented in case of any new event or status change in case of fault or maintenance and that will be passed with the approval of neighboring IEDs. Otherwise, the stNum will remain the same (1–1), and sqNum will be only incremented (0–1) to show the transmission sequence of packets. Any modification in the contents of packets in the name of a new event (incremented stNum) will be flagged and discarded or blocked on the spot.
Conclusion
This work deals with a methodology to validate cyberattacks on GOOSE protocol and later evaluate their impact on power systems. This is achieved by developing a testbed focusing on GOOSE in which GOOSE messages are implemented, modified and later sent to a simulated electrical system. The impact of these modified messages are evaluated to devise a novel rule based cybersecurity solution by the name of Sequence Content Resolver. Future work will cover other protocols such as SV and MMS and we will investigate the application of artificial intelligence and machine learning techniques to develop cybersecurity solutions using and enhancing the same developed testbed.
Data availability
All data generated or analyzed during this study are included in this published article.
Abbreviations
- BESS:
-
Battery energy storage system
- CB:
-
Circuit breaker
- CHP:
-
Combined heat and power
- CT:
-
Current transformer
- DER:
-
Distributed energy resources
- DoS:
-
Denial of service
- ECDSA:
-
Elliptic curve digital signature algorithm
- FDI:
-
False data injection
- GOOSE:
-
Generic object-oriented substation events
- HMI:
-
Human–machine interface
- hp:
-
Horsepower
- ICT:
-
Information and communication technologies
- IEDs:
-
Intelligent electronic devices
- IT:
-
Information technology
- LN:
-
Logical node
- MAC:
-
Message authentication code
- MMS:
-
Manufacturing message specification
- MU:
-
Merging unit
- N. O.:
-
Normally opened
- OT:
-
Operational technology
- P&C:
-
Protection and control
- PV:
-
Photovoltaic
- RL:
-
Resistance–inductance
- RTDS:
-
Real time digital simulator
- RSA:
-
Rivest–Shamir–Adleman
- RSS:
-
Rainbow signature scheme
- SNTP:
-
Simple network time protocol
- SO:
-
Switch object
- SV:
-
Sampled value
- VT:
-
Voltage transformer
References
Mazur, D. C., Entzminger, R. A. & Kay, J. A. Enhancing traditional process SCADA and historians for industrial and commercial power systems with energy (Via IEC 61850). IEEE Trans. Ind. Appl. 52(1), 76–82 (2016).
Aftab, M. A., Hussain, S. S., Ali, I. & Ustun, T. S. IEC 61850 based substation automation system: A survey. Int. J. Electr. Power Energy Syst. 120, 106008 (2020).
Chattopadhyay, A., Ukil, A., Jap, D. & Bhasin, S. Toward threat of implementation attacks on substation security: Case study on fault detection and isolation. IEEE Trans. Ind. Inf. 14, 2442–2451 (2017).
El Hariri, M. et al. The iec 61850 sampled measured values protocol: Analysis, threat identification, and feasibility of using nn forecasters to detect spoofed packets. Energies 12, 3731 (2019).
Kush, N. S., Ahmed, E., Branagan, M. & Foo, E. Poisoned GOOSE: Exploiting the GOOSE protocol. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014)[Conferences in Research and Practice in Information Technology, Volume 149], 2014, pp. 17–22.
Hussain, S. et al. A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation. IEEE Texas Power Energy Conf. 2021, 1–6 (2021).
Hussain, S. S., Ustun, T. S. & Kalam, A. A review of IEC 62351 security mechanisms for IEC 61850 message exchanges. IEEE Trans. Ind. Inf. 16, 5643–5654 (2019).
Reshikeshan, S. S. M., Koh, M. B. & Illindala, M. S. Rainbow signature scheme to secure GOOSE communications from quantum computer attacks. IEEE Trans. Ind. Appl. 57, 4579–4586 (2021).
Tesfay, T. T. & Le Boudec, J.-Y. Experimental comparison of multicast authentication for wide area monitoring systems. IEEE Trans. Smart Grid 9, 4394–4404 (2017).
Farooq, S. M., Hussain, S. S. & Ustun, T. S. Performance evaluation and analysis of IEC 62351-6 probabilistic signature scheme for securing GOOSE messages. IEEE Access 7, 32343–32351 (2019).
Power systems management and associated information exchange—Data and communications security—Part 6: Security for IEC 61850. 1.0. IEC 62351-6:2020, IEC (2020).
Hussain, S. S., Farooq, S. M. & Ustun, T. S. Analysis and implementation of message authentication code (MAC) algorithms for GOOSE message security. IEEE Access 7, 80980–80984 (2019).
Tefek, U., Esiner, E., Mashima, D., Chen, B. & Hu, Y.-C. Caching-based multicast message authentication in time-critical industrial control systems. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications (2022), pp. 1039–1048.
Esiner, E. et al. LoMoS: Less-online/more-offline signatures for extremely time-critical systems. IEEE Trans. Smart Grid 13, 3214–3226 (2022).
Hong, J., Nuqui, R. F., Kondabathini, A., Ishchenko, D. & Martin, A. Cyber attack resilient distance protection and circuit breaker control for digital substations. IEEE Trans. Ind. Inf. 15, 4332–4341 (2018).
Ustun, T. S. et al. Machine learning-based intrusion detection for achieving cybersecurity in smart grids using IEC 61850 GOOSE messages. Symmetry 13, 826 (2021).
Wang, X. et al. Anomaly detection for insider attacks from untrusted intelligent electronic devices in substation automation systems. IEEE Access 20, 22 (2022).
Yang, L. et al. A new methodology for anomaly detection of attacks in IEC 61850-based substation system. J. Inf. Secur. Appl. 68, 103262 (2022).
Hussain, S. S., Ustun, T. S. & Kalam, A. A review of IEC 62351 security mechanisms for IEC 61850 message exchanges. IEEE Trans. Ind. Inform. 20, 25 (2019).
Ustun, T. S., Hussain, S. S., Yavuz, L. & Onen, A. Artificial intelligence based intrusion detection system for IEC 61850 sampled values under symmetric and asymmetric faults. IEEE Access 9, 56486–56495 (2021).
Rodríguez, M., Lázaro, J., Bidarte, U., Jiménez, J. & Astarloa, A. A fixed-latency architecture to secure GOOSE and sampled value messages in substation systems. IEEE Access 9, 51646–51658 (2021).
Gurusinghe, D. R., Kariyawasam, S. & Ouellette, D. S. Testing of switchgear operation in an IEC 61850 based SAS using a real-time simulator. In PAC World Conference (2018).
Kuffel, R., Giesbrecht, J., Maguire, T., Wierckx, R. & McLaren, P. RTDS-a fully digital power system simulator operating in real time. In Proceedings 1995 International Conference on Energy Management and Power Delivery EMPD'95, 1995, pp. 498–503.
Ndatinya, V., Xiao, Z., Manepalli, V. R., Meng, K. & Xiao, Y. Network forensics analysis using Wireshark. Int. J. Secure. Netw. 10, 91–106 (2015).
Devanarayana, C. Inline packet modifier using snort, RTDS technologies. https://github.com/chamara84/snort-2.9_RTDS. Accessed 11 2020.
Gunduz, M. Z. & Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 169, 107094 (2020).
Jegues, C. Banshee Microgrid Sample Case (RTDS Technologies, 2019).
Author information
Authors and Affiliations
Contributions
Shahbaz Hussain, S. M. Suhail Hussain and Abdullatif Shikfa wrote the parts of the main manuscript text, prepared tables and figures. All remaining authors reviewed and revised the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Hussain, S., Iqbal, A., Hussain, S.M.S. et al. A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids. Sci Rep 13, 1857 (2023). https://doi.org/10.1038/s41598-022-27157-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-022-27157-z