Printer Friendly

Analysis and extension of safety mechanisms for standardized control networks in smart grid.

1. Introduction

The critical role of smart grid has already been recognized by worldwide governments and industrial organizations. Depending on the type and purpose of the smart grid, its components are distributed on a local, wide-area, or even global scale. In smart grid, control networks, which can perform communication links and facilities, are an important element of such supervisory control and data acquisition (SCADA) systems. Safety [1-7] is one of the key concerns for these standardized wired and wireless control networks in smart grid. Although many existing works studied security technologies of control networks, there are few works focusing on safety mechanism of them. However, safety and security are different topics. Safety is protection against random incidents which are unwanted, but security is protection against intended incidents which happen due to a result of deliberate and planned act.

There are a lot of control network standards for smart grid which have been developed in parallel by different organizations. Therefore, it is necessary to analyze and enhance the safety mechanisms of these standards. On one hand, there are many communication standards and their safety extension version for wired control networks for smart grid. Here we give the typical standards of wired control networks. (1) PROFIsafe is one of four safety protocols described in the IEC 61784-3 standard [8], which is an extension of the Profibus and PROFINET system. (2) The common industrial protocol (CIP) is an industrial protocol for industrial automation applications [9], which is used in EtherNet/IP, DeviceNet, CompoNet, and ControlNet. (3) CC-Link is the high-speed field network which is able to simultaneously handle both control and information data [10]. CC-Link Safety is compatible with standard CC-Link. (4) Ethernet Powerlink [11] is a deterministic real-time protocol for standard Ethernet and its safety version is Powerlink Safety. (6) EtherCAT is the open real-time Ethernet network originally developed by Beckhoff [12], based on EtherCAT; TwinSAFE [13] from Beckhoff provides a consistent hardware and software technology for achieving integrated and simplified utilization.

On the other hand, some wireless communication standards are proposed for smart grid. The process automation and manufacturing industries are now faced with two independent and competing standards specifically designed for wireless field instruments [14], which are (1) WirelessHART [15] proposed by Highway Addressable Remote Transducer (HART) Communication Foundation (HCF) and (2) ISA100.11a [16] developed by International Society of Automation (ISA). In April 2010, WirelessHART was approved by the International Electrotechnical Commission (IEC) unanimously, making it the first wireless international standard as IEC 62591 [17].

Although there are some safety versions of the wired standardized, it is very necessary to analyze and compare their underlying safety mechanisms to get the advantages and disadvantages of each standard from the view of safety. More importantly, there is no existing safety extension for wireless control networks, which is very important for protection wireless control networks against random incidents which are unwanted. In this paper, we analyze the safety technologies in the existing wired control networks and propose a novel safety extension scheme for wireless control networks in smart grid. To the best of our knowledge, this work is the first to focus deeply on the safety mechanisms for standardized control network in smart grid, especially for the safety extension scheme for wireless control networks.

The rest of this paper is organized as follows. Section 2 presents the safety vulnerabilities and requirements. The safety mechanisms of wired smart grid are analyzed and compared in Section 3. In Section 4, we propose a novel safety extension scheme, combined cyclic redundancy check, for wireless control networks. Section 5 discusses the key concerns and open issues of these safety mechanisms. Finally, the paper is concluded in Section 6.

2. Safety Vulnerabilities and Requirements

2.1. Vulnerabilities. In order to prevent any damage to persons and machines, it is paramount that data in safety-sensitive areas of machines and plants are transmitted in time and in their entirety. Failures can occur for various reasons; for example, packets are delayed at a gateway due to traffic overload. Adverse conditions may also lead to erroneous transfer sequences for the packets or cause incorrect data insertions. Lastly, electromagnetic interference also threatens the integrity of information transmissions. In bus-based safety systems, performance free from defects must be ensured by the protocol, which must enable cyclic checks of the network segments that are relevant for safety and checks of the devices involved. In case of an interruption in communication or an incomplete data transmission, it is important to initiate a safe shutdown of the machine or plant.

IEC SC65C/WG12 committee has developed IEC617843 Industrial communication networks-Profiles-Part 3 [18], which is a functional safety fieldbus. This standard defines the communication errors in smart grid. Related communication errors include corruption, unintended repetition, incorrect sequence, loss, unacceptable delay, insertion, masquerader, and addressing.

2.2. IEC 61508 and Safety Requirements. IEC 61508 [1-7] is an international standard of rules applied in industry. It is entitled Functional safety of electrical/electronic/programmable electronic safety-related systems (E/E/PE or E/E/PES).

IEC 61508 is intended to be a basic functional safety standard applicable to all kinds of industry. It defines functional safety as "part of the overall safety relating to the EUC (equipment under control) and the EUC control system which depends on the correct functioning of the E/E/PE safety-related systems, other technology safety-related systems, and external risk reduction facilities."

The safety integrity level allocated to the EUC control system shall be based on the failure rate that is claimed for the EUC control system in accordance with the target failure measures. In such cases, the requirements in this standard, relevant to the allocated safety integrity level, shall apply to the EUC control system.

3. Analysis of Safety Mechanisms of Wired Control Networks

In this section, we give the detailed analysis of the main standardized wired control networks and their safety extensions in smart grid.

3.1. Safety Mechanisms of Wired Networks. The basic framework of related standards is shown in Figure 1. On one hand, the wired communication standards can provide the basic security for smart grid, which is based on existing IT security protocols, such as MACsec, IPsec Transport Layer Security, and Secure Socket Layer (TLS/SSL) [19-21]. On the other hand, most of the safety standards can be regarded as the safety extensions of related communication standards in smart grid.

Basically, the existing security standards include three principal characteristics. (1) They use black channels which can provide upper-level safety configuration services based on standard transmission schemes. (2) They encapsulate data that is relevant to safety (i.e., cyclic redundancy check (CRC), time stamp, etc.) into a flexible telegram format in safety layer. (3) They complement each other with the security mechanisms of communication standards. These communication standards can be performed based on the underlying security infrastructure, such as MACsec, IPsec, and TLS/SSL. These security infrastructures use related security measures, such as AES encryption.

Safety mechanisms of safety standards in wired networks are shown in Table 1. In this paper, in order to explain the implementation principle of related security standards, we take PROFIsafe and CIP-Safety as typical examples for analysis in detail. Also, we analyze the basic principles of CC-Link Safety, Powerlink Safety, and TwinSAFE.

3.2. Principle of Safety Extensions for Wired Control Networks. Most of the safety standards can be regarded as the safety extensions of related communication standards in smart grid. The safety concepts of safety standards and the data security concepts of corresponding communication standards complement each other [22]. In other words, the security infrastructure of control buses/networks is based on data security foundation, which can provide the basic security for high level safety of safety standards.

Most safety standards of wired smart grid use the black channel principle for the transmission of safe data via a standardized network. The safe transmission function comprises all measures to discover faults and hazards that could be infiltrated by the black channel or to keep the residual error probability under a certain limit. Based on the black channel, safety-related schemes perform safe communication by using (1) a standard transmission system and (2) an additional safety transmission protocol on top of the standard transmission system. The black channel principle is shown in Figure 2.

3.3. Safety Extension Mechanisms in Wired Control Networks. This section analyzes the principle of encapsulated safety data at safety layer in wired control networks. Here we take the typical safety mechanisms as the examples for the analysis in detail.

3.3.1. Message Structure including Container. The safe data, consisting of the purely safety-related user data and the protocol overhead, are transmitted via standard control networks together with data that is not safety related. Here, we take CIP-Safety, for example, to do explanations. Figure 3 shows the telegram setup of a "Master Data Telegram (MDT) data field" within the scope of an Ethernet frame, which contains a configurable data container for real-time data of each device. The real-time data of a device are again divided into standard and safety data. The safety data are CIP-Safety telegrams either in the short format (2 bytes) or in the long format (up to 250 bytes).

Note that not all the devices in the smart grid include the safety data container. In other words, just some devices perform CIP-Safety communications, which depend on their security requirements. The devices without CIP-Safety capability only send/receive data based on standardized CIP connections.

3.3.2. Cyclic Redundancy Codes Checksum for Integrity Check. Cyclic redundancy codes (CRCs) are used in most safety standards for integrity check. For example, PROFIsafe uses several different CRCs to protect the integrity of safety-related messages. The safety-related IO data of a safe node are collected in the safety payload data unit (PDU), and the data type coding corresponds to PROFINET IO. One safety container corresponds to one subslot in PROFINET IO. When the safety parameters have been transferred to the safe device, the safe host and safe device/module produce a 2-byte CRC1 signature [23] over the safety parameters. The CRC1 signature, safe IO data, status or control byte, and the corresponding consecutive number are used to produce the CRC2 signature as illustrated in Figure 4. The CRC1 signature provides the initial value for CRC2 calculation that is transferred cyclically, thus limiting the CRC calculation for each cyclic PROFIsafe container to CRC2. In Figure 4, the symbol "F" is used throughout the PROFIsafe to identify the "fail-safe" function component introduced. The F-Parameters are containing information for the PROFIsafe layer to adjust its behavior to particular custome rneeds and to double-check the correctness of assignments. F-Input and F-Output denote the input and output data of a PROFIsafe device, respectively.

3.3.3. Consecutive Number for Delay Control. The consecutive number is used as a measure to deal with some of the possible communication errors. It is also used to monitor the propagation delay between transmission and reception. Each message is equipped with a consecutive number, which is used by the recipient for monitoring the life of the sender and the communication link. Both communication partners continuously check whether the other partner manages to update the consecutive number before a defined watchdog time has elapsed.

The consecutive number check was carried out on different versions of the PROFIsafe model, considering input and output slave configurations with different ranges of consecutive numbers. For example, a 24-bit counter is used in PROFIsafe for consecutive numbering; thus the consecutive number counts in a cyclic mode from 1 ... FF FF FF wrapping over to 1 at the end [23]. The consecutive number 0 is reserved for error conditions and synchronization. Here the consecutive number is called virtual consecutive number (VCN), because it is not visible in the safety PDU. The mechanism uses counters located in the safety host and safety device and the Toggle Bit within the status byte and the control byte increments the counters synchronously. The transmitted part of VCN is reduced to a Toggle Bit which indicates an increment of the local counter. The counter within the safe host and safe device is incremented at each edge of the Toggle Bits. Figure 5 illustrates the VCN mechanism. To verify the correctness and to synchronize the two independent counters, the consecutive number is included in the CRC2 calculation that is transmitted with each safety PDU.

4. Proposed Safety Extension of Wireless Control Networks

Based on aforementioned analysis, safety extensions are very necessary for industrial control networks with strong noise and interferences. For example, additive white Gaussian noise (AWGN) usually causes the error into WirelessHART and ISA100.11a [24]. However, to our best knowledge, most of the current standards of wireless industrial networks lace the consideration of safety. To address this, we propose in this section a safety extension scheme for the wireless control networks in smart grid. Here we modify and optimize the typical CRC to perform the safety extension of wireless industrial control networks.

A lot of error correcting schemes have been proposed. In particular, to realize message authentication, some error correcting methods are proposed especially for [25, 26]. AWGN is considered as the noisy channel model in the error correcting codes in [25, 26], which is a kind of usual noise in smart grid. In the proposed safety extension scheme, CRC, interweave technology, and the noise-tolerance message authentication method in [25, 26] are integrated seamlessly to realize the safety extension for wireless control networks.

4.1. CRC Combination Based Message Portion. Figure 6 shows the principle of message portion of the proposed scheme. At first, the scheme shuffles the message w times, so w submessages are generated. Then each submessage is divided into q blocks, each of which is input conventional CRC computation. Meanwhile a submessage of the original CRC of each block remains, which is called sub-CRC. Moreover, the original message is shuffled this step repeating m times with different "partition" into blocks. Note that a keyed pseudorandom number generator is used to perform the shuffle operation. Finally, the proposed scheme performs interweave operation for the sub-CRC for each partition and the outputs of interweave operation are then integrated together to produce a combined CRC, which is denoted as C-CRC.

4.2. Error Detection and Correcting Algorithm. Procedure 1 presents the error detection and correcting algorithm. Here we use bit flipping of the bits with the lowest absolute reliability values (also called the log likelihood ratios (LLRs)) to realize the error correcting. As a matter of fact, the LLRs are the reliability values of the bits in messages received over a noisy channel. An LLR is assigned by the demodulator to each outputted bit using the magnitude of the signal (sj) received from the channel. Thus, over an AWGN channel, these LLRs can be obtained as the following computation:

[LLR.sub.i] = 2 x [s'.sub.i]/[[sigma].sup.2], (1)

where [[sigma].sup.2] is the standard deviation and sj is the received signal.

4.3. Evaluation of the Error Control. To evaluate the error correcting capabilities of access request/response, we do a simulation for the message based on Matlab. The message is assumed to be shuffled two times. A keyed pseudorandom number generator is used to select the blocks which form the partition, and each portion is divided into four blocks. The message length used in this simulation is 2048 bits. AWGN channel is considered as the noisy channel, which is a typical noisy channel in smart grid. We set the lower limit of SNR in our evaluation to be 6 dB according to the SNR range in [26]. Figure 7 shows the bit error rate (BER) against each value of the SNR. Based on the simulation results, it can be seen that BER as low as 10-7 is got at 11 dB. As shown in Figure 7, the BER of the proposed scheme is lower than that of NTMAC although NTMAC in [26] has obvious impact on BER. Also, it can be seen that the value of w impacts BER.

Because the proposed scheme aims to provide safety in smart grid environments, we next evaluate the performances of the safety capabilities of the proposed scheme considering the power-line background noise and appliance impulsive noise, respectively. We use Nakagami probability density function (PDF) to model the power-line background noise based on the method in [27]. In addition, we use the parameters of best-fit distribution in [28] to model the appliance impulsive noise from various electric device noises. We perform the evaluation for the three cases: (1) only AWGN noise channel, (2) PLC channel with AWGN noise, and (3) PLC channel with both AWGN and impulsive noises. For the three cases, the bit error rates (BER) of the simulation results against each value of the SNRs are shown in Figure 8. As shown in Figure 8, additive BER can be caused by both PLC background noise and impulsive noise.

5. Discussion

5.1. Safety versus Security. Safety is protection against random incidents which are unwanted. Security is protection against intended incidents which happen due to a result of deliberate and planned act.

Based on aforementioned analysis, both wired and wireless communication standards can provide the basic security for smart grid, including authentication, secrecy, and integrity check. These measures can deal with the network attacks.

In order to provide a set of safety services in smart grid, safety-related standards for wired smart grid have been proposed. The safety devices usually must realize more secure and reliable services than normal devices. Thus, more and more security measures are added into the safety standards for reliable communications. These safety standards can be regarded as the safety extensions of the communication standards. And the safety data can be transmitted based on these safety standards.

PROCEDURE 1: Error detection and correcting procedure.

Input:

Received message blocks: [B'.sub.1], ..., [B'.sub.n]

   The partitioning routine and w

   The received C-CRC;

   C-CRC = ([s'.sub.1,1] [parallel]...[parallel][S'.sub.q,1]
   [parallel]...[parallel]([S'.sub.1,w]
   [parallel]...[parallel][S'.sub.w,q])

   LLRs of [B'.sub.i] and C-CRC, i = 1, ..., q

   The maximum number of iterations: [N.sub.max]

Output:

Corrected/Authentic blocks and irrecoverable blocks

Algorithm:

(1) For i = 1 to q.

(2)    For j = 1 to [N.sup.max].

(3)       If C-CRC verification succeeds, then go to (10).

(4)       Let [T.sub.i] = [B'.sub.i]

(5)          For k = 1 to w.

(6)             [T.sub.i] = [T.sub.i] [parallel][S.sub.i,t].

(7)       End

(8)       Arrange the bits of [T.sub.i] increasing order of their
          [absolute value of (LLR)] values.

(9)       Flip the next combination of least reliable bits of
          [T.sub.i] and go to (2).

(10)      Success, mark [B'.sub.i] as authentic and continue with
          the next block (BJ+1).

(11)   End.

(12)   Mark [B.sub.i] as non authentic.

(13) End.


Note that there are only safety extension standards for wired communication standards but no safety extensions for wireless communication standards.

5.2. Safety Level. In IEC 61508, SIL means safety integrity level and constitutes a rating of the failure probability of a system based on IEC/EN 61508. The categories run from SIL level 1 to 4, with the probability of failure decreasing as the level rating increases. SIL 3 corresponds to a probability of failure of [10.sup.-7] to [10.sup.-8] per hour. The responsible IEC commission once established the general rule that the bus of a safety system must not be involved with more than one percent of all failures.

All the wired communication standards can meet the requirements of IEC 61508 [2] safety integrity level 3 (SIL3). Some safety standards not only fulfill the SIL3, but also satisfy other requirements. The CIP-Safety concept has been approved by TUV Rheinland for adoption in IEC61508 SIL3 and EN954-1 Category 4 applications. CC-Link Safety is a network with high reliability in data transmission suitable for safety applications that require compliance with IEC61508 SIL3 and EN954-1/ISO13849-1 Category 4. For Powerlink, the quality of these measures will fulfill the requirements of SIL 3 (and within specific architectures also SIL 4). Also, for Powerlink Safety, there is even the potential in this system to satisfy reliability and availability demands of Category SIL 4 according to IEC 61508. In practice, Powerlink Safety may cause no more than 10-9 errors per hour. In other words, there is no more than one fault in about every 115,000 years.

5.3. Open Issues. This section discusses the open issues of the safety for control networks in smart grid.

5.3.1. Implementation Efficiency. Firstly, how to enhance the software and hardware implementation is very important. For example, experiences from a practical effort to build a WirelessHART protocol stack have shown that performing AES calculations in software on embedded platforms is too time consuming to meet the 10 ms time-slot requirements of WirelessHART. To fulfill the requirements, it is suggested to use an AES hardware accelerator. Many variants of the CBCMAC can also be used to enhance the performance efficiency [26, 29, 30].

5.3.2. Safety Breach. There are many safety breaches in wireless and wired smart grid. The attacks can occur to the safety data in the safety extension standards. The analysis in [31] shows that it is possible to attack PROFIsafe and change the safety-related process data bypassing any of the safety measures in the protocol. By getting one safety container and using brute force to compute all valid combinations of CRC1 and VCN that generates the same CRC2 as in the received message, a set of possible CRC1 can be obtained. With the knowledge that the CRC1 is static over the session lifetime, the remaining combinations can be reduced down to the CRC1 that is in use. An iterative process will be done till the correct CRC1 has been found. After that, the remaining challenge is to look for the actual VCN soon for all received safety containers. The VCN will increase depending on the period time of bus, host, and device executing the safety layer. If the attack is performed very fast and can receive all safety containers, the VCN would not be updated for each frame received, thus relaxing the computational efforts to derive the VCN in "real time."

6. Conclusion

The analysis and extension of safety mechanisms of standardized control networks in smart grid are given in this paper. Firstly, safety threats and requirements are analyzed. After that, the safety mechanisms of wired control network standards including Profibus, PROFINET, CIP, CC-Link, Powerlink, and EtherCAT are analyzed and studied deeply. More importantly, we proposed a combined CRC safety mechanism to perform the safety enhancement for existing wireless control networks, and its effectiveness is validated by simulation results. Finally, key points and open issues of safety-related mechanisms are discussed. The main contributions of this paper are the analysis for the safety of the wired standardized control network and the proposed safety extension mechanism for wireless control networks, which are meaningful to improve the safety for smart grid.

http://dx.doi.org/ 10.1155/2014/941967

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work is supported by National Natural Science Foundation of China (Grant nos. 61171173 and 61372049). This work is also supported by Key Lab of Information Network Security, Ministry of Public Security and Key Laboratory of Infrared System Detection and Imaging Technology, Shanghai Institute of Technical Physics, Chinese Academy of Sciences. Particularly, the authors would like to thank the anonymous reviewers for their valuable comments to improve the presentation of this paper.

References

[1] IEC 61508-1, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety-Related Systems--Part 1: General Requirements, International Electrotechnical Comission, 2nd edition, 2010.

[2] IEC 61508-2, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety-Related Systems--Part 2: Requirements for Electrical/Electronic/Programmable Electronic Safety-Related Systems, International Electrotechnical Comission, 2nd edition, 2010.

[3] IEC 61508-3, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety-Related Systems--Part 3: Software Requirements, International Electrotechnical Comission, 2nd edition, 2010.

[4] IEC 61508-4, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety-Related Systems--Part 4: Definitions and Abbreviations, International Electrotechnical Comission, 2nd edition, 2010.

[5] IEC 61508-5, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety Related Systems--Part 5: Examples of Methods for the Determination of Safety Integrity Levels, International Electrotechnical Comission, 2nd edition, 2010.

[6] IEC 61508-6, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety-Related Systems--Part 6: Guidelines on the Application of IEC 61508-2 and IEC 61508-3, International Electrotechnical Comission, 2nd edition, 2010.

[7] IEC 61508-7, Functional Safety of Electrical/Electron-ic/Programmable Electronic Safety-Related Systems--Part 7: Overview of Techniques and Measures, International Elec-trotechnical Comission, 2nd edition, 2010.

[8] S.-L. Jamsa-Jounela, "Future trends in process automation," Annual Reviews in Control, vol. 31, no. 2, pp. 211-220, 2007

[9] ODVA, "CIP Common Specification," http://www.odva.org/.

[10] "CC-Link," http://www.cc-link.org/.

[11] "Powerlink," http://www.ethernet-powerlink.org/.

[12] "EtherCAT," http://www.ethercat.org/.

[13] "TwinSAFE," http://www.beckhoff.com/twinsafe/.

[14] S. Petersen and S. Carlsen, "WirelessHART versus ISA100.11a: the format war hits the factory floor," IEEE Industrial Electronics Magazine, vol. 5, no. 4, pp. 23-34, 2011.

[15] HART Communication Foundation, "HART Field Communication Protocol Specification, Revision 70," September 2007.

[16] "Wireless Systems for Industrial Automation: Process Control and Related Applications," ISA-100.11a-2009 Standard, 2009.

[17] IEC 62591, Industrial Communication Networks--Wireless Communication Network and Communication Profiles--WirelessHART, International Electrotechnical Comission, 1st edition, 2010.

[18] IEC 61784-3, Industrial Communication Networks--Profiles--Part 3: Functional Safety Fieldbuses--General Rules and Profile Definitions, International Electrotechnical Comission, 2007.

[19] K. F. Wahid, "Rethinking the link security approach to manage large scale Ethernet network," in Proceedings of the 17th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN '10), pp. 1-6, Long Branch, NJ, USA, May 2010.

[20] D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proceedings of the IEEE, vol. 93, no. 6, pp. 1152-1177, 2005.

[21] A. Treytl, T. Sauter, and C. Schwaiger, "Security measures for industrial fieldbus systems--state of the art and solutions for IP-based approaches," in Proceedings of the IEEE International Workshop on Factory Communication Systems (WFCS '04), pp. 201-209, September 2004.

[22] PROFIBUS Guideline, PROFIsafe--Environmental Requirements, Version 2.5, Order No. 2.232, 2007.

[23] IEC 61784-3-3, Industrial Communication Networks--Profiles--Part 3-3: Functional Safety Fieldbuses-Additional Specifications for CPF 3, International Electrotechnical Comission, 2007.

[24] S. A. Bhatti, Q. Shan, R. Atkinson, M. Vieira, and I. A. Glover, "Vulnerability of Zigbee to impulsive noise in electricity substations," in Proceedings of the 30th URSI General Assembly and Scientific Symposium (URSIGASS '11), pp. 1-4, Istanbul, Turkey, August 2011.

[25] O. Ur-Rehman, N. Zivic, S. A. H. A. E. Tabatabaei, and C. Ruland, "Error correcting and weighted noise tolerant message authentication codes," in Proceedings of the 5th International Conference on Signal Processing and Telecommunication Systems (ICSPCS '11), pp. 1-8, Honolulu, Hawaii, USA, December 2011.

[26] C. G. Boncelet Jr., "The NTMAC for authentication of noisy messages," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 35-42, 2006.

[27] H. Meng, Y. L. Guan, and S. Chen, "Modeling and analysis of noise effects on broadband power-line communications," IEEE Transactions on Power Delivery, vol. 20, no. 2, pp. 630-637, 2005.

[28] Q. Shan, I. A. Glover, R. C. Atkinson et al., "Estimation of impulsive noise in an electricity substation," IEEE Transactions on Electromagnetic Compatibility, vol. 53, no. 3, pp. 653-663, 2011.

[29] S. Vaudenay, "Security flaws induced by CBC padding," in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '02), Amsterdam, The Netherlands, April 2002.

[30] H. Krawczyk, "The order of encryption and authentication for protecting communications (or: how secure is SSL?)," in Advances in Cryptology--CRYPTO 2001, pp. 310-331, Springer, Berlin, Germany, 2001.

[31] J. Black and P. Rogaway, "A suggestion for handling arbitrary-length messages with the CBC MAC," in Proceedings of the NIST Second Modes of Operation Workshop, 2001.

Jun Wu, (1) Zhitao Guan, (2) Ming Zhan, (3) Jianhua Li, (1) and Yuwei Su (4)

(1) School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

(2) School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China

(3) School of Information and Electronics Engineering, Southwest University, Chongqing 400715, China

(4) Graduate School of Global Information and Telecommunication Studies, Waseda University, Tokyo 169-0051, Japan

Correspondence should be addressed to Ming Zhan; zmdjs@swu.edu.cn

Received 20 November 2013; Revised 16 March 2014; Accepted 19 April 2014; Published 25 May 2014

Academic Editor: Shancang Li

TABLE 1: Safety mechanisms of safety standards in wired networks.

Safety       Corresponding       Basic         Security of
standard     communication    network/bus     communication
                standard                      infrastructure

PROFIsafe       Profibus      RS485/fiber         MACsec
                              optics/MBP

                PROFINET       Ethernet       MACsec, IPsec

CIP-Safety       Common       EtherNet/IP     MACsec, IPsec
               industrial
             protocol (CIP)    DeviceNet      MACsec, IPsec,
                                                 TLS/SSL

                               CompoNet       MACsec, IPsec,
                                                 TLS/SSL

                              ControlNet      MACsec, IPsec,
                                                 TLS/SSL

CC-Link         CC-Link         RS-485            MACsec
Safety

Powerlink      Powerlink       Ethernet           MACsec
Safety

TwinSAFE        EtherCAT       Ethernet           MACsec

Safety       Corresponding       Basic         Principle of
standard     communication    network/bus         safety
                standard                        extension

PROFIsafe       Profibus      RS485/fiber     Black channel
                              optics/MBP

                PROFINET       Ethernet

CIP-Safety       Common       EtherNet/IP
               industrial
             protocol (CIP)    DeviceNet

                               CompoNet       Black channel

                              ControlNet

CC-Link         CC-Link         RS-485        Black channel
Safety

Powerlink      Powerlink       Ethernet       Black channel
Safety

TwinSAFE        EtherCAT       Ethernet       Black channel

Safety       Corresponding       Basic         Principle of
standard     communication    network/bus         safety
                standard                        extension

PROFIsafe       Profibus      RS485/fiber      Security of
                              optics/MBP     safety standard

PROFIsafe       Profibus      RS485/fiber       CRC, time
                              optics/MBP        monitoring

                PROFINET       Ethernet

CIP-Safety       Common       EtherNet/IP    CRC, time stamp
               industrial
             protocol (CIP)    DeviceNet

                               CompoNet

                              ControlNet

CC-Link         CC-Link         RS-485         Time stamp,
Safety                                      connection ID, CRC

Powerlink      Powerlink       Ethernet     Time stamp, time
Safety                                         monitoring,
                                            identification tag

TwinSAFE        EtherCAT       Ethernet      CRC, time stamp,
                                             time monitoring,
                                             sequence number
COPYRIGHT 2014 Sage Publications, Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2014 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Research Article
Author:Wu, Jun; Guan, Zhitao; Zhan, Ming; Li, Jianhua; Su, Yuwei
Publication:International Journal of Distributed Sensor Networks
Article Type:Report
Date:Jan 1, 2014
Words:4954
Previous Article:A method for distributed pipeline burst and leakage detection in wireless sensor networks using transform analysis.
Next Article:Trajectory-based road-geometry and crash-risk estimation with smartphone-assisted sensor networks.
Topics:

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters