Skip to main content
Erschienen in: e & i Elektrotechnik und Informationstechnik 1/2017

27.01.2017 | Originalarbeiten

Smart grid security – an overview of standards and guidelines

verfasst von: Karl Christoph Ruland, Jochen Sassmannshausen, Karl Waedt, Natasa Zivic

Erschienen in: e+i Elektrotechnik und Informationstechnik | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper gives a short overview about important guidelines and standards that set the focus on security in Smart Grids and industrial automation. The standards are described and compared regarding their scope of application within the Smart Grid and the focus of the standards. Beside the description of standards, some guidelines of major importance to the development of Smart Grids are described.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat IEC 62351-1: Power systems management and associated information exchange – Data and communications security – Part 1: Communication network and system security – introduction to security issues. IEC 62351-1: Power systems management and associated information exchange – Data and communications security – Part 1: Communication network and system security – introduction to security issues.
2.
Zurück zum Zitat IEC 62351-2: Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms. IEC 62351-2: Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms.
3.
Zurück zum Zitat IEC 62351-3: Power systems management and associated information exchange – Data and communications security – Part 3: Profiles including TCP/IP. IEC 62351-3: Power systems management and associated information exchange – Data and communications security – Part 3: Profiles including TCP/IP.
4.
Zurück zum Zitat IEC 62351-4: Power systems management and associated information exchange – Data and communications security – Part 4: Profiles including MMS. IEC 62351-4: Power systems management and associated information exchange – Data and communications security – Part 4: Profiles including MMS.
5.
Zurück zum Zitat Ruland, C., Sassmannshausen, J. (2015): Non-repudiation services for the MMS protocol of IEC 61850, security standardisation research. In L. Chen, S. Matsuo (Eds.) LNCS (Vol. 9497, pp. 70–85). Switzerland: Springer. Ruland, C., Sassmannshausen, J. (2015): Non-repudiation services for the MMS protocol of IEC 61850, security standardisation research. In L. Chen, S. Matsuo (Eds.) LNCS (Vol. 9497, pp. 70–85). Switzerland: Springer.
6.
Zurück zum Zitat Ruland, C., Kang, N., Sassmannshausen, J. (2016): Rejuvenation of the IEC 61850 protocol stack for MMS. In IEEE international conference on smart grid communications (IEEE SmartGridComm 2016). Sydney, Australia, Nov 06–09. Ruland, C., Kang, N., Sassmannshausen, J. (2016): Rejuvenation of the IEC 61850 protocol stack for MMS. In IEEE international conference on smart grid communications (IEEE SmartGridComm 2016). Sydney, Australia, Nov 06–09.
7.
Zurück zum Zitat IEC 62351-5: Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives. IEC 62351-5: Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives.
8.
Zurück zum Zitat IEC 62351-6: Power systems management and associated information exchange – Part 6: Security for IEC 61850 profiles. IEC 62351-6: Power systems management and associated information exchange – Part 6: Security for IEC 61850 profiles.
9.
Zurück zum Zitat IEC 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8. Role-based access control. IEC 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8. Role-based access control.
10.
Zurück zum Zitat IEC 62351-10: Power systems management and associated information exchange – Data and communications security – Part 10: Security architecture guidelines. IEC 62351-10: Power systems management and associated information exchange – Data and communications security – Part 10: Security architecture guidelines.
11.
Zurück zum Zitat IEC 62351-11: Power systems management and associated information exchange – Data and communications security – Part 11: Security for XML documents. IEC 62351-11: Power systems management and associated information exchange – Data and communications security – Part 11: Security for XML documents.
12.
Zurück zum Zitat IEC 62443-1-1: Industrial communication networks – Network and system security – Part 1-1: Terminology concepts and models. IEC 62443-1-1: Industrial communication networks – Network and system security – Part 1-1: Terminology concepts and models.
13.
Zurück zum Zitat IEC 62443-2-1: Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program. IEC 62443-2-1: Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program.
14.
Zurück zum Zitat IEC 62443-2-4: Security for industrial automation and control systems – Part 2-4: Security program requirements for IACS service providers. IEC 62443-2-4: Security for industrial automation and control systems – Part 2-4: Security program requirements for IACS service providers.
15.
Zurück zum Zitat IEC 62443-3-3: Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels. IEC 62443-3-3: Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels.
16.
Zurück zum Zitat IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components. IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components.
17.
Zurück zum Zitat ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements. ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements.
18.
Zurück zum Zitat ISO/IEC 27002:2013 Information technology – Security techniques – Code of practice for information security controls. ISO/IEC 27002:2013 Information technology – Security techniques – Code of practice for information security controls.
20.
Zurück zum Zitat ISO/IEC TR 27019:2013 Information technology – Security techniques – Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry. ISO/IEC TR 27019:2013 Information technology – Security techniques – Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry.
21.
Zurück zum Zitat IEC/TR 62541-2:2010 OPC unified architecture – security model. IEC/TR 62541-2:2010 OPC unified architecture – security model.
22.
Zurück zum Zitat ISO/IEC 27009:2016 Information technology – Security techniques – Sector-specific application of ISO/IEC 27001 – Requirements. ISO/IEC 27009:2016 Information technology – Security techniques – Sector-specific application of ISO/IEC 27001 – Requirements.
23.
Zurück zum Zitat NIST special publication 1108r3: NIST framework and roadmap for smart grid interoperability standards, Release 3.0, 2014. NIST special publication 1108r3: NIST framework and roadmap for smart grid interoperability standards, Release 3.0, 2014.
24.
Zurück zum Zitat ISO/IEC 27036-1:2014 Information technology – Security techniques – Information security for supplier relationships – Overview and concepts. ISO/IEC 27036-1:2014 Information technology – Security techniques – Information security for supplier relationships – Overview and concepts.
25.
Zurück zum Zitat ISO/IEC 27036-2:2014 Information technology – Security techniques – Information security for supplier relationships – Requirements. ISO/IEC 27036-2:2014 Information technology – Security techniques – Information security for supplier relationships – Requirements.
26.
Zurück zum Zitat ISO/IEC 27036-4:2016 Information technology – Security techniques – Information security for supplier relationships – Guidelines for security of cloud services. ISO/IEC 27036-4:2016 Information technology – Security techniques – Information security for supplier relationships – Guidelines for security of cloud services.
27.
Zurück zum Zitat ISO/IEC 27034-2:2015 Information technology – Security techniques – Application security – Organization normative framework. ISO/IEC 27034-2:2015 Information technology – Security techniques – Application security – Organization normative framework.
28.
Zurück zum Zitat ISO 55000-2:2014 Asset management – Management systems – Requirements. ISO 55000-2:2014 Asset management – Management systems – Requirements.
29.
Zurück zum Zitat ISO/IEC 19770-1:2012 Information technology – Software asset management – Processes and tiered assessment of conformance. ISO/IEC 19770-1:2012 Information technology – Software asset management – Processes and tiered assessment of conformance.
30.
Zurück zum Zitat Waedt K., Ding Y., Gao Y., Xie X.: I&C modeling for cybersecurity analyses, 1st TÜV Rheinland China Symposium, Functional safety in nuclear and industrial applications, Shanghai, October 2015. Waedt K., Ding Y., Gao Y., Xie X.: I&C modeling for cybersecurity analyses, 1st TÜV Rheinland China Symposium, Functional safety in nuclear and industrial applications, Shanghai, October 2015.
31.
Zurück zum Zitat IEC 62714-1:2014, Engineering data exchange format for use in industrial automation systems engineering – Automation markup language architecture and general requirements. IEC 62714-1:2014, Engineering data exchange format for use in industrial automation systems engineering – Automation markup language architecture and general requirements.
32.
Zurück zum Zitat HMG IA Standard No. 1:2009, technical risk assessment, issue No. 3.51. HMG IA Standard No. 1:2009, technical risk assessment, issue No. 3.51.
33.
Zurück zum Zitat Bajramovic E., Waedt K., Gao Y., Parekh M.: Cybersecurity aspects in the I&C design of NPPs, INPPS, Istanbul, March 2016. Bajramovic E., Waedt K., Gao Y., Parekh M.: Cybersecurity aspects in the I&C design of NPPs, INPPS, Istanbul, March 2016.
34.
Zurück zum Zitat Waedt K., Xie X., Gao Y., Ding Y.: Chipset level cybersecurity issues, 8th international workshop on application of FPGAs in NPPs, Shanghai, October 2015. Waedt K., Xie X., Gao Y., Ding Y.: Chipset level cybersecurity issues, 8th international workshop on application of FPGAs in NPPs, Shanghai, October 2015.
Metadaten
Titel
Smart grid security – an overview of standards and guidelines
verfasst von
Karl Christoph Ruland
Jochen Sassmannshausen
Karl Waedt
Natasa Zivic
Publikationsdatum
27.01.2017
Verlag
Springer Vienna
Erschienen in
e+i Elektrotechnik und Informationstechnik / Ausgabe 1/2017
Print ISSN: 0932-383X
Elektronische ISSN: 1613-7620
DOI
https://doi.org/10.1007/s00502-017-0472-8

Weitere Artikel der Ausgabe 1/2017

e & i Elektrotechnik und Informationstechnik 1/2017 Zur Ausgabe

Neuer Inhalt