• DocumentCode
    87412
  • Title

    Intrusion Evaluation of Communication Network Architectures for Power Substations

  • Author

    Bulbul, Rashiduzzaman ; Sapkota, Pingal ; Chee-Wooi Ten ; Lingfeng Wang ; Ginter, Andrew

  • Author_Institution
    Electr. & Comput. Eng. Dept., Michigan Technol. Univ., Houghton, MI, USA
  • Volume
    30
  • Issue
    3
  • fYear
    2015
  • fDate
    Jun-15
  • Firstpage
    1372
  • Lastpage
    1382
  • Abstract
    Electronic elements of a substation control system have been recognized as critical cyberassets due to the increased complexity of the automation system that is further integrated with physical facilities. Since this can be executed by unauthorized users, the security investment of cybersystems remains one of the most important factors for substation planning and maintenance. As a result of these integrated systems, intrusion attacks can impact operations. This work systematically investigates the intrusion resilience of the ten architectures between a substation network and others. In this paper, two network architectures comparing computer-based boundary protection and firewall-dedicated virtual local-area networks are detailed, that is, architectures one and ten. A comparison on the remaining eight architecture models was performed. Mean time to compromise is used to determine the system operational period. Simulation cases have been set up with the metrics based on different levels of attackers´ strength. These results as well as sensitivity analysis show that implementing certain architectures would enhance substation network security.
  • Keywords
    firewalls; investment; local area networks; maintenance engineering; power system planning; safety systems; substation automation; substation protection; automation system; communication network architectures; computer-based boundary protection; cybersystems; electronic elements; firewall-dedicated virtual local-area networks; intrusion attacks; intrusion evaluation; intrusion resilience; power substations; security investment; sensitivity analysis; substation control system; substation maintenance; substation network security; substation planning; unauthorized users; Computer architecture; Modems; Protocols; Security; Servers; Substations; Tin; Cyberinfrastructure; electronic intrusion; network security planning; power substation;
  • fLanguage
    English
  • Journal_Title
    Power Delivery, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0885-8977
  • Type

    jour

  • DOI
    10.1109/TPWRD.2015.2409887
  • Filename
    7054545