TY - GEN
T1 - Cyber Threat Extenuation for Substation Data Communication
T2 - 8th International Conference on Information Technology and Multimedia, ICIMU 2020
AU - Jidin, Razali
AU - Jamil, Norziana
AU - Abdul Rahim, Azril Azam
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/8/24
Y1 - 2020/8/24
N2 - Data communicated at many existing secondary electrical substations is currently not encrypted. In order to improve their data security level, a low-cost cryptography prototype is proposed. Both lightweight and conventional crypto-algorithm types are chosen to encrypt, authenticate and encrypt-authenticate data packets of IEC 60870-5, the data protocol being used at most substations. Implementations of selected algorithms are on a programmable logic arrays (FPGA) to meet communication time sensitivity while employing an eight-bit processor. The FPGA implementations are optimized for speed rather than footprint. The processor is mainly to handle processing of data packets either coming from or going into substation devices. The performance in term of latency for both the conventional and lightweight cryptography is evaluated to meet different data transmission speeds. The lightweight encryption has lower latency compared to the conventional one, while both types of authentication algorithms yield similar latency as expected.
AB - Data communicated at many existing secondary electrical substations is currently not encrypted. In order to improve their data security level, a low-cost cryptography prototype is proposed. Both lightweight and conventional crypto-algorithm types are chosen to encrypt, authenticate and encrypt-authenticate data packets of IEC 60870-5, the data protocol being used at most substations. Implementations of selected algorithms are on a programmable logic arrays (FPGA) to meet communication time sensitivity while employing an eight-bit processor. The FPGA implementations are optimized for speed rather than footprint. The processor is mainly to handle processing of data packets either coming from or going into substation devices. The performance in term of latency for both the conventional and lightweight cryptography is evaluated to meet different data transmission speeds. The lightweight encryption has lower latency compared to the conventional one, while both types of authentication algorithms yield similar latency as expected.
KW - Authentication
KW - Cyber Threat
KW - Encryption
KW - Lightweight Cryptography
KW - Securing Data Communication for Secondary Substation
KW - Smart Grid
UR - http://www.scopus.com/inward/record.url?scp=85097645634&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85097645634&partnerID=8YFLogxK
U2 - 10.1109/ICIMU49871.2020.9243388
DO - 10.1109/ICIMU49871.2020.9243388
M3 - Conference contribution
AN - SCOPUS:85097645634
T3 - 2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020
SP - 150
EP - 155
BT - 2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 24 August 2020 through 25 August 2020
ER -