Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1143

A study on vulnerabilities of serial based DNP in power control fields  

Jang, Ji Woong (Korea Power Exchange)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Abstract
Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.
Keywords
DNP vulnerability; Power Control System; SCADA;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Moon-suk Choi, Chung-hyo Kim, You-seok Lim, Seong-ho Ju, Yong-hun Lim and Kyung-seok, Jeon, "Development of Low Latency Secure Communication Device for Legacy SCADA," Jonornal of The Korea Institute of information Security & Cryptology 23(2), pp.339-346, APR. 2013   과학기술학회마을   DOI   ScienceOn
2 Jeong-Han Yun, Sung-Ho Jeon, Kyoung-Ho Kim, and Woo-Nyon Kim, "A Burst-based Whitelist Model for DNP3 Communication in the SCADA System", Proceedings, The 7th International Conference on Information Security and Assurance, 2013
3 Korea Power Exchange, "A study on information security policy of Smart Grid," SEP. 2012
4 National Cyber Security Center, "Security Guidelines for Electronic Control System," APR. 2010
5 Young-Jin Kim, Jung-Hyun Lee and Jong-In Lim, "A Study on the Secure Plan of Security in SCADA Systems," Jonornal of The Korea Institute of information Security & Cryptology, 19(6) pp. 145-153, Dec. 2009   과학기술학회마을
6 Dong-joo Kang, Jong-joo Lee, Young Lee, Im-sop Lee and Huy-kang Kim, "Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry," Jonornal of The Korea Institute of information Security & Cryptology 23(3) pp.445-457, JUN. 2013   과학기술학회마을   DOI   ScienceOn
7 Tasik Shon, "EMS-SCADA targeted attacks and countermeasures," Presentation for Smartgrid Security Workshop 2013, May. 2013
8 Ui-Hyong Kim, Kyong-Shik Kim, Kwang-Hyuk Lim and Eul-Gyu Im, "Study on Possibility of Man-in-the-Middle Attacks in RS-232C Serial Communication of the SCADA Systems for Power Systems" , Journal of Security Engineering, 7(4), pp 295-310, AUG. 2010
9 Yun Ho Shin, Gwang Hyuk Lim and Eul Gyu Im, "A Research on the Possibility of ARP Spoofing Attack in SCADA System Based on TCP/IP Environment," Jouranl of Information and Security, 9(3), SEP.2009
10 Moonsu Jang, Gunhee Lee, SinKyu Kim, Byung-gil Min, Woo-nyon Kim and Jungtaek Seo, "Testing Vulnerabilities of DNP3," Journal of Security Engineering, 7(1), Feb. 2010
11 U.S. Department of Energy, "21 Steps to improve Cyber Security of SCADA Networks," JAN. 2007
12 IEEE Power & Energy Society, "IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)," OCT.2012
13 Tracy Amaio, Tien Van, "IEEE 1711-2010 Security For Legacy SCADA Protocols" SEQUI.inc, 2011
14 Grant Gilchrist, "Secure Authentication for DNP3," IEEE 2008
15 Shapiro, Bratus, Rogers and Smith, "Critical Infrastructure Protection 3 Chap1 Do it yourself scada vulnerability testing with lzfuzz," 2012
16 Triangle MicroWorks,Inc, "DNP3 Overview," 2002
17 Omar Faruk "Testing & Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol" Master Thesis, Stockholm, Sweden, 2008
18 Korea Power Exchange, "Development of K-EMS," 2009