Skip to main content
Top
Published in: e & i Elektrotechnik und Informationstechnik 1/2017

27-01-2017 | Originalarbeiten

Smart grid security – an overview of standards and guidelines

Authors: Karl Christoph Ruland, Jochen Sassmannshausen, Karl Waedt, Natasa Zivic

Published in: e+i Elektrotechnik und Informationstechnik | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper gives a short overview about important guidelines and standards that set the focus on security in Smart Grids and industrial automation. The standards are described and compared regarding their scope of application within the Smart Grid and the focus of the standards. Beside the description of standards, some guidelines of major importance to the development of Smart Grids are described.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference IEC 62351-1: Power systems management and associated information exchange – Data and communications security – Part 1: Communication network and system security – introduction to security issues. IEC 62351-1: Power systems management and associated information exchange – Data and communications security – Part 1: Communication network and system security – introduction to security issues.
2.
go back to reference IEC 62351-2: Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms. IEC 62351-2: Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms.
3.
go back to reference IEC 62351-3: Power systems management and associated information exchange – Data and communications security – Part 3: Profiles including TCP/IP. IEC 62351-3: Power systems management and associated information exchange – Data and communications security – Part 3: Profiles including TCP/IP.
4.
go back to reference IEC 62351-4: Power systems management and associated information exchange – Data and communications security – Part 4: Profiles including MMS. IEC 62351-4: Power systems management and associated information exchange – Data and communications security – Part 4: Profiles including MMS.
5.
go back to reference Ruland, C., Sassmannshausen, J. (2015): Non-repudiation services for the MMS protocol of IEC 61850, security standardisation research. In L. Chen, S. Matsuo (Eds.) LNCS (Vol. 9497, pp. 70–85). Switzerland: Springer. Ruland, C., Sassmannshausen, J. (2015): Non-repudiation services for the MMS protocol of IEC 61850, security standardisation research. In L. Chen, S. Matsuo (Eds.) LNCS (Vol. 9497, pp. 70–85). Switzerland: Springer.
6.
go back to reference Ruland, C., Kang, N., Sassmannshausen, J. (2016): Rejuvenation of the IEC 61850 protocol stack for MMS. In IEEE international conference on smart grid communications (IEEE SmartGridComm 2016). Sydney, Australia, Nov 06–09. Ruland, C., Kang, N., Sassmannshausen, J. (2016): Rejuvenation of the IEC 61850 protocol stack for MMS. In IEEE international conference on smart grid communications (IEEE SmartGridComm 2016). Sydney, Australia, Nov 06–09.
7.
go back to reference IEC 62351-5: Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives. IEC 62351-5: Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives.
8.
go back to reference IEC 62351-6: Power systems management and associated information exchange – Part 6: Security for IEC 61850 profiles. IEC 62351-6: Power systems management and associated information exchange – Part 6: Security for IEC 61850 profiles.
9.
go back to reference IEC 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8. Role-based access control. IEC 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8. Role-based access control.
10.
go back to reference IEC 62351-10: Power systems management and associated information exchange – Data and communications security – Part 10: Security architecture guidelines. IEC 62351-10: Power systems management and associated information exchange – Data and communications security – Part 10: Security architecture guidelines.
11.
go back to reference IEC 62351-11: Power systems management and associated information exchange – Data and communications security – Part 11: Security for XML documents. IEC 62351-11: Power systems management and associated information exchange – Data and communications security – Part 11: Security for XML documents.
12.
go back to reference IEC 62443-1-1: Industrial communication networks – Network and system security – Part 1-1: Terminology concepts and models. IEC 62443-1-1: Industrial communication networks – Network and system security – Part 1-1: Terminology concepts and models.
13.
go back to reference IEC 62443-2-1: Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program. IEC 62443-2-1: Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program.
14.
go back to reference IEC 62443-2-4: Security for industrial automation and control systems – Part 2-4: Security program requirements for IACS service providers. IEC 62443-2-4: Security for industrial automation and control systems – Part 2-4: Security program requirements for IACS service providers.
15.
go back to reference IEC 62443-3-3: Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels. IEC 62443-3-3: Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels.
16.
go back to reference IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components. IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components.
17.
go back to reference ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements. ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements.
18.
go back to reference ISO/IEC 27002:2013 Information technology – Security techniques – Code of practice for information security controls. ISO/IEC 27002:2013 Information technology – Security techniques – Code of practice for information security controls.
20.
go back to reference ISO/IEC TR 27019:2013 Information technology – Security techniques – Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry. ISO/IEC TR 27019:2013 Information technology – Security techniques – Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry.
21.
go back to reference IEC/TR 62541-2:2010 OPC unified architecture – security model. IEC/TR 62541-2:2010 OPC unified architecture – security model.
22.
go back to reference ISO/IEC 27009:2016 Information technology – Security techniques – Sector-specific application of ISO/IEC 27001 – Requirements. ISO/IEC 27009:2016 Information technology – Security techniques – Sector-specific application of ISO/IEC 27001 – Requirements.
23.
go back to reference NIST special publication 1108r3: NIST framework and roadmap for smart grid interoperability standards, Release 3.0, 2014. NIST special publication 1108r3: NIST framework and roadmap for smart grid interoperability standards, Release 3.0, 2014.
24.
go back to reference ISO/IEC 27036-1:2014 Information technology – Security techniques – Information security for supplier relationships – Overview and concepts. ISO/IEC 27036-1:2014 Information technology – Security techniques – Information security for supplier relationships – Overview and concepts.
25.
go back to reference ISO/IEC 27036-2:2014 Information technology – Security techniques – Information security for supplier relationships – Requirements. ISO/IEC 27036-2:2014 Information technology – Security techniques – Information security for supplier relationships – Requirements.
26.
go back to reference ISO/IEC 27036-4:2016 Information technology – Security techniques – Information security for supplier relationships – Guidelines for security of cloud services. ISO/IEC 27036-4:2016 Information technology – Security techniques – Information security for supplier relationships – Guidelines for security of cloud services.
27.
go back to reference ISO/IEC 27034-2:2015 Information technology – Security techniques – Application security – Organization normative framework. ISO/IEC 27034-2:2015 Information technology – Security techniques – Application security – Organization normative framework.
28.
go back to reference ISO 55000-2:2014 Asset management – Management systems – Requirements. ISO 55000-2:2014 Asset management – Management systems – Requirements.
29.
go back to reference ISO/IEC 19770-1:2012 Information technology – Software asset management – Processes and tiered assessment of conformance. ISO/IEC 19770-1:2012 Information technology – Software asset management – Processes and tiered assessment of conformance.
30.
go back to reference Waedt K., Ding Y., Gao Y., Xie X.: I&C modeling for cybersecurity analyses, 1st TÜV Rheinland China Symposium, Functional safety in nuclear and industrial applications, Shanghai, October 2015. Waedt K., Ding Y., Gao Y., Xie X.: I&C modeling for cybersecurity analyses, 1st TÜV Rheinland China Symposium, Functional safety in nuclear and industrial applications, Shanghai, October 2015.
31.
go back to reference IEC 62714-1:2014, Engineering data exchange format for use in industrial automation systems engineering – Automation markup language architecture and general requirements. IEC 62714-1:2014, Engineering data exchange format for use in industrial automation systems engineering – Automation markup language architecture and general requirements.
32.
go back to reference HMG IA Standard No. 1:2009, technical risk assessment, issue No. 3.51. HMG IA Standard No. 1:2009, technical risk assessment, issue No. 3.51.
33.
go back to reference Bajramovic E., Waedt K., Gao Y., Parekh M.: Cybersecurity aspects in the I&C design of NPPs, INPPS, Istanbul, March 2016. Bajramovic E., Waedt K., Gao Y., Parekh M.: Cybersecurity aspects in the I&C design of NPPs, INPPS, Istanbul, March 2016.
34.
go back to reference Waedt K., Xie X., Gao Y., Ding Y.: Chipset level cybersecurity issues, 8th international workshop on application of FPGAs in NPPs, Shanghai, October 2015. Waedt K., Xie X., Gao Y., Ding Y.: Chipset level cybersecurity issues, 8th international workshop on application of FPGAs in NPPs, Shanghai, October 2015.
Metadata
Title
Smart grid security – an overview of standards and guidelines
Authors
Karl Christoph Ruland
Jochen Sassmannshausen
Karl Waedt
Natasa Zivic
Publication date
27-01-2017
Publisher
Springer Vienna
Published in
e+i Elektrotechnik und Informationstechnik / Issue 1/2017
Print ISSN: 0932-383X
Electronic ISSN: 1613-7620
DOI
https://doi.org/10.1007/s00502-017-0472-8

Other articles of this Issue 1/2017

e & i Elektrotechnik und Informationstechnik 1/2017 Go to the issue