Safeguarding Ieds, Substations, and Scada Systems against Electronic Intrusions
نویسندگان
چکیده
United States agencies involved with national security are concerned about the vulnerability of the North American electric power grid to electronic intrusions, commonly known as cyber attacks. Several studies have identified changing socio-economic conditions that increase the probability of an electronic, computer-based attack being launched against a utility or substation, causing regional and possibly even widespread power outage. Increased domestic and international terrorism throughout North America, industry deregulation causing instability in the electric power utility job market, the shift to open protocols and interconnected computer networks, and the growing population of computer literate people with abundant and widely available hacker tools are factors contributing to this rising threat. The problem is compounded by industry’s shift from discrete, manual substation control to increased reliance on automated, integrated networks of IEDs, controllers, and SCADA systems. In this paper we identify and discuss technologies and procedures for safeguarding IEDs, PLCs, substation controllers, and networked SCADA systems against electronic intrusions. We show how technologies for access restrictions, audit logs, authentication, encryption, nonrepudiation, modem and network security, and network topologies can reduce vulnerability and increase survivability of integrated solutions for protection, metering, and SCADA. We discuss mitigating actions to reduce legal liability and outline training needs for increased awareness in the electric power industry. By creating the means to prevent, or at least to detect and survive, electronic attacks, we can ensure the continued safety and reliability of the electric power infrastructure.
منابع مشابه
Connecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux
Substation networks have traditionally been isolated from corporate Information Technology (IT) networks. Hence, the security of substation networks has depended heavily upon limited access points and the use of point-to-point Supervisory Control and Data Acquisition (SCADA) specific protocols. With the introduction of Ethernet into substations, pressure to reduce expenses and provide Internet ...
متن کاملIntegrating Remotely Located Substations Into SCADA Systems: A Case Study Using Commercially Available Satellite Internet Service Providers for SCADA Communications
This paper presents observations and analysis experienced by a utility end user. As SCADA systems become a crucial part of daily operations for utilities, finding low-cost, reliable communications for substations in remote geographic locations often presents a challenge. Current SCADA communications methods, including framerelay, T1, and fiber are often unreasonably expensive, in terms of insta...
متن کاملSoftware for Enhanced Monitoring in Integrated Substations
-Substation data integration is facilitated by existence and appropriate connection of Intelligent Electronic Devices (IEDs). Collecting data from IEDs and its processing facilitates performing data consistency checks, filtering out erroneous measurements, monitoring of switching sequences and substation topology transitions etc. Processed data may be used locally and/or communicated to remote ...
متن کاملSubstation Automation system
Green and sustainable power is the need of the day. With widening supply and demand gap, power management has become one of the most critical areas of concern all over the world. India’s energy consumption is increasing at one of the fastest rates in the world. Hence, we require Substation Automation Systems in the present day substations to efficiently control and deliver power. The main objec...
متن کاملToward Survivable Intrusion-Tolerant Open-Source SCADA
As vital components of critical infrastructure, SCADA systems must continue to operate correctly and at their expected level of performance at all times. However, current SCADA systems are vulnerable to intrusions, and even a single compromise can cause catastrophic consequences. We present the architecture of and initial steps toward the first intrusion-tolerant open-source SCADA system that i...
متن کامل