Visible to the public Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service

TitleStealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Publication TypeConference Paper
Year of Publication2018
AuthorsWright, James G., Wolthusen, Stephen D.
Conference Name2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe)
Date Publishedoct
Keywordscommand injection attacks, communications channels, composability, generic object oriented substation events messaging service, IEC standards, IEC61850s GOOSE messaging service, Message service, Metrics, power engineering computing, power system security, Protocols, pubcrawl, QoS requirements, quality of service, Queueing analysis, Resiliency, SAS, security, security of data, security technologies, stealthy injection attacks, substation automation, substation automation system, Substations, Time factors
AbstractIEC61850 and IEC62351 combined provide a set of security promises for the communications channels that are used to run a substation automation system (SAS), that use IEC61850 based technologies. However, one area that is largely untouched by these security promises is the generic object oriented substation events (GOOSE) messaging service. GOOSE is designed to multicast commands and data across a substation within hard real time quality of service (QoS) requirements. This means that GOOSE is unable to implement the required security technologies as the added latency to any message would violate the QoS.
DOI10.1109/ISGTEurope.2018.8571518
Citation Keywright_stealthy_2018