IEC 62351-4 Security Implementations For IEC 61850 MMS Messages
IEC 62351-4 Security Implementations For IEC 61850 MMS Messages
ABSTRACT With the deployment of advanced information and communication technologies (ICT) the
legacy power grid is being transformed as smart grid. However, the extensive use of ICT makes it vulnerable
to cyberattacks. Standardization of power system communication with interoperable protocols has many
benefits and at the same time the standardized semantics makes it much more vulnerable to cyberattacks. IEC
has published a new standard IEC 62351 which provides the security guidelines for securing power system
communication against cyber-attacks. In this paper, the cybersecurity considerations for IEC 61850 Manu-
facturing Message Specification (MMS) messages as per the IEC 62351-4 standard are discussed in detail.
Further, the implementation of IEC 62351-4 security specifications for MMS messages are demonstrated
through experiments in lab.
INDEX TERMS Power system communication, security and privacy protection, IEC 61850, IEC 62351-4.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 8, 2020 123979
T. S. Ustun, S. M. S. Hussain: IEC 62351-4 Security Implementations for IEC 61850 MMS Messages
TABLE 1. Recommended cipher suites for MMS messages. Hash values. Furthermore, either RSA or DH or DHE or
ECDHE are specified for secure key exchanges. SHA256 and
RSA/ECDSA algorithms are utilized to generate digital sig-
natures which are used for message authentication. Hence,
with the TLS security mechanism the transport profile of the
MMS messages is secured to provide confidentiality (AES
128/256 encryption), node authentication (X.509 certificates
during TLS) and message authentication (digital signatures
using SHA and RSA/ECDSA) to the MMS messages.
FIGURE 3. MMS message exchanges between IEC 61850 client and server without security features.
FIGURE 5. Certificate of IEC 61850 server in X.509 format. Figure 7 shows captured sequence of message exchanges
for TLS connection establishment. After the certificate
exchanges the server sends the cipher specifications. Here
Figure 5 shows encoded signed certificate ‘ENT-PC.pem’ the cipher used is ‘‘TLS_ECDHE_RSA_WITH_AES_256_
of IEC 61850 server generated by CA. It can be noticed GCM_SHA384’’.
that the certificate follows X.509 format and the algorithm The IEC 61850 client accepts the cipher suite by send-
used for generating signature is SHA256 with RSA. The ing an acknowledgement message. Once the chipper suite is
‘beast-X99-s01.pem’ certificate is similar to ‘ENT-PC.pem’ negotiated, it concludes the TLS process. Further message
certificate. exchanges are encrypted by AES 256_GCM encryption algo-
These generated certificates are configured in emulated rithm. And all the message exchanges during this TLS session
IEC 61850 client and server using the security module. as encrypted by AES 256_GCM and shown as application
Figure 6 (a) and (b) shows the configuration process of data in Fig. 7. From Fig. 7 it can be noticed that the port
certificates in emulated IEC 61850 client and server respec- no. 3782 is utilized for secure message exchanges as specified
tively. Once the certificates are configured in emulated IEC by the IEC 62351-4 standards.
61850 client and server, a TLS connection can be established. The MMS message exchanges between emulated IEC
Initially, client hello and server hello messages along with 61850 server and client during the TLS session are shown
certificates are exchanged. Both the client and server ver- as application data in Fig. 7. At the receiving side the
ify the respective certificates. If the certificates verification encrypted messages are decrypted as normal MMS messages.
process fails, the TLS connection is aborted. Table 3 presents The encryption of MMS messages provides confidentiality
the computation times required for verification of different security requirement. In [20] authors provided the delays
certificates signed by different RSA and ECDSA algorithms for establishing TLS session for different cipher suites listed
with different key sizes and curves on a test system. The test in Table 1. The time delay for establishing TLS session is
system is an Intel(R) Celeron (R) with 4GB RAM. the time elapsed from sending of ‘client hello’ message till
FIGURE 7. MMS message exchanges between IEC 61850 client and server with TLS security.
TABLE 4. Computational times for encryption and HASH algorithms in in different cipher suites specified for MMS messages well
different cipher suites.
within the accepted limits for MMS messages. However,
in legacy IEDs with computational powers the timing perfor-
mance of different algorithms becomes very vital for success-
ful implementation.
IV. CONCLUSIONS
This paper has implemented and demonstrated secure MMS
message exchanges by implementing TLS security as speci-
receiving ‘change cipher spec’ message. This time delay fied in IEC 62351-4 standards. For implementing TLS, signed
includes the time required for processing different crypto- X.509 certificates were developed for both IEC 61850 client
graphic algorithms listed in cipher suite and communication and server. The computational times for verifying digital
delays for exchanging TLS messages. In this paper, in order certificates using different digital signature algorithms is pre-
to obtain the computational performance of each algorithm sented. Secure IEC 61850 server and clients were emulated,
individually, these algorithms are implemented in C language and TLS connection based on IEC 62351-4 recommended
using OpenSSL libraries. Table 4 presents the computation security cipher suite was established successfully. The secure
times required for verification of different certificates signed encrypted messages were successfully exchanged over the
by different RSA and ECDSA algorithms with different key established TLS connection. This study provides insights on
sizes and curves on a test system. The test system is an implementing IEC 62351-4 security specifications for IEC
Intel(R) Celeron (R) with 4GB RAM. The computational 61850 MMS messages and their performance before actual
delays are obtained by sampling the CPU times at the start and deployment is planned in the field.
end of C program using the clock() functions. The procedure
REFERENCES
is repeated several times and average values computational
[1] I. Ali, S. M. S. Hussain, A. Tak, and T. S. Ustun, ‘‘Communication mod-
delays is reported. eling for differential protection in IEC-61850-based substations,’’ IEEE
Similarly, the computational times for implementing dif- Trans. Ind. Appl., vol. 54, no. 1, pp. 135–142, Jan. 2018.
ferent encryption and HASH algorithms specified in Table 1 [2] S. M. S. Hussain, T. S. Ustun, P. Nsonga, and I. Ali, ‘‘IEEE 1609 WAVE
and IEC 61850 standard communication based integrated EV charging
are shown in Table 4. From Table 3 and Table 4, it can be management in smart grids,’’ IEEE Trans. Veh. Technol., vol. 67, no. 8,
observed that computational times of different algorithms pp. 7690–7697, Aug. 2018.
[3] M. A. Aftab, S. M. S. Hussain, I. Ali, and T. S. Ustun, ‘‘IEC 61850 TAHA SELIM USTUN (Member, IEEE) received
and XMPP communication based energy management in microgrids the Ph.D. degree in electrical engineering from
considering electric vehicles,’’ IEEE Access, vol. 6, pp. 35657–35668, Victoria University, Melbourne, VIC, Australia.
2018. He is currently a Researcher with the Fukushima
[4] S. M. S. Hussain, A. Tak, T. S. Ustun, and I. Ali, ‘‘Communication Renewable Energy Institute, AIST (FREA),
modeling of solar home system and smart meter in smart grids,’’ IEEE National Institute of Advanced Industrial Science
Access, vol. 6, pp. 16985–16996, 2018. and Technology (AIST), and leads the Smart Grid
[5] S. M. Farooq, S. M. S. Hussain, and T. S. Ustun, ‘‘S-GoSV: Framework
Cybersecurity Lab. Prior to that, he was an Assis-
for generating secure IEC 61850 GOOSE and sample value messages,’’
tant Professor of electrical engineering with the
Energies, vol. 12, no. 13, p. 2536, Jul. 2019.
[6] Cyber-Attack Against Ukrainian Critical Infrastructure, document ICS School of Electrical and Computer Engineering,
Alert (IR-ALERT-H-16-056-01), Industrial Control Systems Cyber Emer- Carnegie Mellon University, Pittsburgh, PA, USA. His research interests
gency Response Team (ICSCERT), Feb. 2016. include power systems protection, communication in power networks, dis-
[7] Communication Networks and Systems for Power Utility Automation, 2.0, tributed generation, microgrids, electric vehicle integration, and cybersecu-
Standard IEC 61850, IEC, 2013. rity in smartgrids. He is a member of the IEEE 2004, the IEEE 2800 Working
[8] Power Systems Management and Associated Information Exchange— Groups, and IEC Renewable Energy Management Working Group 8. He has
Data and Communications Security—Part 4: Profiles Including MMS and been invited to run special courses in Africa, India, and China. He delivered
Derivatives, 1.0, Standard IEC 62351-4, IEC, 2018. talks for the Qatar Foundation, the World Energy Council, Waterloo Global
[9] S. M. S. Hussain, T. S. Ustun, and A. Kalam, ‘‘A review of IEC 62351 Science Initiative, and European Union Energy Initiative (EUEI). He has
security mechanisms for IEC 61850 message exchanges,’’ IEEE Trans. Ind. edited several books and special issues with international publishing houses.
Informat., doi: 10.1109/TII.2019.2956734. He is a Reviewer of reputable journals and has taken active roles in organizing
[10] R. Schlegel, S. Obermeier, and J. Schneider, ‘‘A security evaluation of IEC international conferences and chairing sessions. He is an Associate Editor of
62351,’’ J. Inf. Secur. Appl., vol. 34, no. 2, pp. 197–204, 2017. IEEE ACCESS and a Guest Editor of the IEEE TRANSACTIONS ON INDUSTRIAL
[11] Power Systems Management and Associated Information Exchange—Data
INFORMATICS.
and Communications Security—Part 6: Security for IEC 61850, 1.0. Stan-
dard IEC 62351-6, IEC, 2007.
[12] S. M. Farooq et al., ‘‘Performance evaluation and analysis of IEC 62351-
6 probabilistic signature scheme for securing GOOSE messages,’’ IEEE
Access, vol. 7, pp. 32343–32351, 2019.
[13] F. Hohlbaum, M. Braendle, and A. Fernando, ‘‘Cyber Security Practical
considerations for implementing IEC 62351,’’ in Proc. PAC World Conf.,
2010.
[14] D. Ishchenko and R. Nuqui, ‘‘Secure communication of intelligent elec-
tronic devices in digital substations,’’ in Proc. IEEE/PES Transmiss. Dis-
trib. Conf. Expo. (T D), 2018.
[15] S. M. S. Hussain et al., ‘‘Analysis and implementation of message authen-
tication code (MAC) algorithms for GOOSE message security,’’ IEEE
Access, vol. 7, pp. 80980–80984, 2019. S. M. SUHAIL HUSSAIN (Member, IEEE)
[16] S. M. S. Hussain, S. M. Farooq, and T. S. Ustun, ‘‘A method for achieving received the Ph.D. degree in electrical engineering
confidentiality and integrity in IEC 61850 GOOSE messages,’’ IEEE from Jamia Millia Islamia (A Central University),
Trans. Power Del., to be published, doi: 10.1109/TPWRD.2020.2990760. New Delhi, India, in 2018.
[17] T. S. Ustun and S. M. S. Hussain, ‘‘An improved security scheme for IEC He is currently a Postdoctoral Researcher with
61850 MMS Messages in intelligent substation communication networks,’’ the Fukushima Renewable Energy Institute, AIST
J. Modern Power Syst. Clean Energy, early access. (FREA), National Institute of Advanced Indus-
[18] J. Zhang, J. Li, X. Chen, M. Ni, T. Wang, and J. Luo, ‘‘A security scheme
trial Science and Technology (AIST), Koriyama,
for intelligent substation communications considering real-time perfor-
Japan. His research interests include power system
mance,’’ J. Mod. Power Syst. Clean Energy, vol. 7, no. 4, pp. 948–961,
Jul. 2019. communication, cybersecurity in power systems,
[19] O. Khaled, A. Marín, F. Almenares, P. Arias, and D. Díaz, ‘‘Analysis of substation automation systems, IEC 61850 standards, electric vehicle inte-
secure TCP/IP profile in 61850 based substation automation system for gration, and smart grids. He was a recipient of the IEEE Standards Education
smart grids,’’ Int. J. Distrib. Sensor Netw., 2016. Grant approved by the IEEE Standards Education Committee for implement-
[20] M. G. Todeschini, G. Dondossola, and R. Terruggia, ‘‘Impact evaluation of ing projects and submitting a student application paper, from 2014 to 2015.
IEC 62351 cybersecurity on IEC 61850 communications performance,’’ in He is a Guest Editor of the IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS.
Proc. 25th Int. Conf. Electr. Distrib. (CIRED), Jun. 2019.