Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data

Razali Jidin, Norziana Jamil, Azril Azam Abdul Rahim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Data communicated at many existing secondary electrical substations is currently not encrypted. In order to improve their data security level, a low-cost cryptography prototype is proposed. Both lightweight and conventional crypto-algorithm types are chosen to encrypt, authenticate and encrypt-authenticate data packets of IEC 60870-5, the data protocol being used at most substations. Implementations of selected algorithms are on a programmable logic arrays (FPGA) to meet communication time sensitivity while employing an eight-bit processor. The FPGA implementations are optimized for speed rather than footprint. The processor is mainly to handle processing of data packets either coming from or going into substation devices. The performance in term of latency for both the conventional and lightweight cryptography is evaluated to meet different data transmission speeds. The lightweight encryption has lower latency compared to the conventional one, while both types of authentication algorithms yield similar latency as expected.

Original languageEnglish
Title of host publication2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages150-155
Number of pages6
ISBN (Electronic)9781728173108
DOIs
Publication statusPublished - Aug 24 2020
Externally publishedYes
Event8th International Conference on Information Technology and Multimedia, ICIMU 2020 - Selangor, Malaysia
Duration: Aug 24 2020Aug 25 2020

Publication series

Name2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020

Conference

Conference8th International Conference on Information Technology and Multimedia, ICIMU 2020
Country/TerritoryMalaysia
CitySelangor
Period8/24/208/25/20

Keywords

  • Authentication
  • Cyber Threat
  • Encryption
  • Lightweight Cryptography
  • Securing Data Communication for Secondary Substation
  • Smart Grid

ASJC Scopus subject areas

  • Information Systems
  • Software
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data'. Together they form a unique fingerprint.

Cite this