DOI QR코드

DOI QR Code

DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현

Proposal and Implementation on Non-Repudiation of Origin for DNP3

  • Yu, Ki-Soon (Division of Information Communication Engineering, Dongguk University) ;
  • Song, Kyoung-Young (School of Electrical and Electronic Engineering, Ulsan College) ;
  • Jang, Min-Ho (School of Electrical and Electronic Engineering, Ulsan College)
  • 투고 : 2015.01.13
  • 심사 : 2015.05.11
  • 발행 : 2015.05.31

초록

DNP3는 SCADA 시스템의 대표적인 프로토콜 중 하나이다. IEC 62351에서는 기밀성, 무결성, 가용성, 부인방지 책임추적성을 보안 요구사항으로 들고 있다. 하지만 DNP3 표준인 IEEE Std. 1815에서는 부인방지 책임추적성에 대한 메커니즘을 정의하고 있지 않다. 이에 본 논문에서는 DNP3의 발신자 부인방지 기법을 제안하고, OpenSSL과 스카다시스템 라이브러리를 이용하여 DNP3 발신 부인방지를 구현한다.

DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

키워드

참고문헌

  1. S.-I. Hwang, T.-J. Park, Y.-K. Sohn, and G.-P. Jeon, "Smart grid use case and service requirement based on M2M: Energy management system for public buildings," J. KICS, vol. 38C, no. 7, pp. 612-620, Jul. 2013. https://doi.org/10.7840/kics.2013.38C.7.612
  2. H. Yoo, J.-H. Yun, and T. Shon, "Whitelistbased anomaly detection for Industrial control system," J. KICS, vol. 38B, no. 8, pp. 641- 653, Aug. 2013.
  3. IEC, IEC/TS 62351-1:2007(E), 2007.
  4. IEEE Power and Energy Society, IEEE Std. 1815:2012, 2012.
  5. KATS, KS X ISO/IEC 10181-4:2013, 2013.
  6. A. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  7. M. Seo, et al., "On the standard mechanism for non-repudiation services," in Proc. CISC'99, vol. 9, no. 1, pp. 228-240, Nov. 1999.
  8. J. Zhou and D. Gollmann, "An efficient non-repudiation protocol," Computer Security Foundations Workshop, pp. 126-132, Jun. 1999.
  9. J.-H. Lee and S.-J. Lee, "An accuracy improvement on acquisition time of SCADA RTU status event," Trans. KIEE, vol. 62, no. 3, pp. 332-341, 2013.