A Cost-efficient Software Testbed for Cyber-Physical Security in IEC 61850-based Substations

Author(s):  
Ghada Elbez ◽  
Hubert B. Keller ◽  
Veit Hagenmeyer
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Juergen Herpel ◽  
Friedrich Schoen ◽  
Harald Selegrad

Abstract Software modularity and partial qualification capabilities are key enablers to produce cost efficient software in highly regulated domains. The modular concept (called spaceAPPS) described in this paper has been developed in the frame of the OPS-SAT project aiming at missions where flexibility is one of the success factors. spaceAPPS implements a novel software architecture for satellites inspired by the Apps concept of modern smartphones. In the European space domain the operation of a satellite is based on a set of 18 services. Accordingly, in spaceApps these services are mapped to individual Apps. This is not a one-to-one mapping which means that one App implements one or more services. During OPS-SAT ground testing it was demonstrated that functionality could be easily added through a new App or updated through replacing an existing App. Also during OPS-SAT ground testing it could be shown that a failing UserApp did not impact the basic apps to operate the satellite. Thus, it is possible to run applications of different criticality on the same platform. With operating systems supporting time and space separation the risk of failure propagation can be further reduced. The implementation of a partial validation approach, i. e. testing of third-party Apps in a representative environment and not running the validation on the target platform is feasible but was not demonstrated.


Energies ◽  
2020 ◽  
Vol 13 (19) ◽  
pp. 5176
Author(s):  
Ghada Elbez ◽  
Hubert B. Keller ◽  
Atul Bohara ◽  
Klara Nahrstedt ◽  
Veit Hagenmeyer

Integration of Information and Communication Technology (ICT) in modern smart grids (SGs) offers many advantages including the use of renewables and an effective way to protect, control and monitor the energy transmission and distribution. To reach an optimal operation of future energy systems, availability, integrity and confidentiality of data should be guaranteed. Research on the cyber-physical security of electrical substations based on IEC 61850 is still at an early stage. In the present work, we first model the network traffic data in electrical substations, then, we present a statistical Anomaly Detection (AD) method to detect Denial of Service (DoS) attacks against the Generic Object Oriented Substation Event (GOOSE) network communication. According to interpretations on the self-similarity and the Long-Range Dependency (LRD) of the data, an Auto-Regressive Fractionally Integrated Moving Average (ARFIMA) model was shown to describe well the GOOSE communication in the substation process network. Based on this ARFIMA-model and in view of cyber-physical security, an effective model-based AD method is developed and analyzed. Two variants of the statistical AD considering statistical hypothesis testing based on the Generalized Likelihood Ratio Test (GLRT) and the cumulative sum (CUSUM) are presented to detect flooding attacks that might affect the availability of the data. Our work presents a novel AD method, with two different variants, tailored to the specific features of the GOOSE traffic in IEC 61850 substations. The statistical AD is capable of detecting anomalies at unknown change times under the realistic assumption of unknown model parameters. The performance of both variants of the AD method is validated and assessed using data collected from a simulation case study. We perform several Monte-Carlo simulations under different noise variances. The detection delay is provided for each detector and it represents the number of discrete time samples after which an anomaly is detected. In fact, our statistical AD method with both variants (CUSUM and GLRT) has around half the false positive rate and a smaller detection delay when compared with two of the closest works found in the literature. Our AD approach based on the GLRT detector has the smallest false positive rate among all considered approaches. Whereas, our AD approach based on the CUSUM test has the lowest false negative rate thus the best detection rate. Depending on the requirements as well as the costs of false alarms or missed anomalies, both variants of our statistical detection method can be used and are further analyzed using composite detection metrics.


2021 ◽  
Vol 279 ◽  
pp. 01024
Author(s):  
Wisam Al-Tibbi

The features of configuring software and hardware of modern data acquisition systems as part of a digital substation to comply with the international standard IEC 61850 are considered. Given recommendations for energy efficient software and hardware configuration for 110 kV, 6-35 kV and 0.4 kV power consumption level which allow you to increase the reliability of the system by 1.5-2 times.


Author(s):  
Kerstin Fink ◽  
Christian Ploder

The discipline of knowledge management is no longer emerging in large organizations, but also small and medium-sized enterprises (SMEs) are focusing on finding the right process that will allow them to make advantages of their intellectual capital. Using survey data from 219 small and medium-sized enterprises in Austria and Switzerland, this article illustrates the four key knowledge processes (1) knowledge identification, (2) knowledge acquisition, (3) knowledge distribution, and (4) knowledge preservation for SMEs and also reports the findings of the empirical study designed to allocate cost-efficient software products to each of the four knowledge processes. As a result a knowledge toolkit for SMEs that integrates knowledge processes, methods and software tool for decision support making is given. Finally, the social view of knowledge management to SMEs is discussed, showing that the use of information technology is currently far more important than the integration of a social-cognitive perspective.


2009 ◽  
pp. 1136-1150
Author(s):  
Kerstin Fink ◽  
Christian Ploder

The discipline of knowledge management is no longer emerging in large organizations, but also small and medium-sized enterprises (SMEs) are focusing on finding the right process that will allow them to make advantages of their intellectual capital. Using survey data from 219 small and medium-sized enterprises in Austria and Switzerland, this chapter illustrates the four key knowledge processes (1) knowledge identification, (2) knowledge acquisition, (3) knowledge distribution, and (4) knowledge preservation for SMEs and also reports the findings of the empirical study designed to allocate cost-efficient software products to each of the four knowledge processes. As a result a knowledge toolkit for SMEs that integrates knowledge processes, methods and software tool for decision support making is given. Finally, the social view of knowledge management to SMEs is discussed, showing that the use of information technology is currently far more important than the integration of a social-cognitive perspective.


Sign in / Sign up

Export Citation Format

Share Document