NetWare 2018
September 16 - 20, 2018 - Venice, Italy

  • SENSORCOMM 2018, The Twelfth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2018, The Ninth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2018, The Tenth International Conference on Advances in Future Internet
  • CENICS 2018, The Eleventh International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2018, The Twelfth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2018, The Fourth International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2018, The Third International Conference on Green Communications, Computing and Technologies

SoftNet 2018
October 14 - 18, 2018 - Nice, France

  • ICSEA 2018, The Thirteenth International Conference on Software Engineering Advances
  • ICSNC 2018, The Thirteenth International Conference on Systems and Networks Communications
  • CENTRIC 2018, The Eleventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2018, The Tenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2018, The Tenth International Conference on Advances in System Simulation
  • SOTICS 2018,The Eighth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2018, The Seventh International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2018, The Third International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NexTech 2018
November 18 - 22, 2018 - Athens, Greece

  • UBICOMM 2018, The Twelfth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2018, The Twelfth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2018, The Twelfth International Conference on Advances in Semantic Processing
  • AMBIENT 2018, The Eighth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2018, The Tenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2018, The Seventh International Conference on Data Analytics
  • GLOBAL HEALTH 2018, The Seventh International Conference on Global Health Challenges
  • CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems

DigitalWorld 2019
February 24 - 28, 2019 - Athens, Greece

  • ICDS 2019, The Thirteenth International Conference on Digital Society and eGovernments
  • ACHI 2019, The Twelfth International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2019, The Eleventh International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2019, The Eleventh International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2019, The Eleventh International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2019, The Eleventh International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2019, The Fourth International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2019, The Fourth International Conference on Universal Accessibility in the Internet of Things and Smart Environments

NexComm 2019
March 24 - 28, 2019 - Valencia, Spain

  • ICDT 2019, The Fourteenth International Conference on Digital Telecommunications
  • SPACOMM 2019, The Eleventh International Conference on Advances in Satellite and Space Communications
  • ICN 2019, The Eighteenth International Conference on Networks
  • ICONS 2019, The Fourteenth International Conference on Systems
  • MMEDIA 2019, The Eleventh International Conference on Advances in Multimedia
  • PESARO 2019, The Ninth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2019, The Twelfth International Conference on Communication Theory, Reliability, and Quality of Service
  • ALLDATA 2019, The Fifth International Conference on Big Data, Small Data, Linked Data and Open Data
  • SOFTENG 2019, The Fifth International Conference on Advances and Trends in Software Engineering

ComputationWorld 2019
May 5 - 9, 2019 - Venice, Italy

  • SERVICE COMPUTATION 2019, The Eleventh International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2019, The Eleventh International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2019, The Eleventh International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2019, The Eleventh International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2019, The Eleventh International Conference on Creative Content Technologies
  • PATTERNS 2019, The Eleventh International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2019, The Tenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2019, The Ninth International Conference on Business Intelligence and Technology

InfoSys 2019
June 2 - 6, 2019 - Athens, Greece

  • ICNS 2019, The Fiteenth International Conference on Networking and Services
  • ICAS 2019, The FIfteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2019, The Ninth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2019, The Sseventh International Conference on Building and Exploring Web Based Environments
  • DBKDA 2019, The Eleventh International Conference on Advances in Databases, Knowledge, and Data Applications
  • SIGNAL 2019, The Fourth International Conference on Advances in Signal, Image and Video Processing
  • BIOTECHNO 2019, The Eleventh International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies

(to be completed)

 


ThinkMind // International Journal On Advances in Intelligent Systems, volume 8, numbers 1 and 2, 2015 // View article intsys_v8_n12_2015_9


Binding of Security Credentials to a specific Environment on the Example of Energy Automation

Authors:
Steffen Fries
Rainer Falk

Keywords: device authentication; automated certificate enrollment; real-time; network access authentication; firewall; substation automation; smart grid; smart energy; DER; PKI; IEC 61850; IEC 60870-5; IEC 62351

Abstract:
Information security in critical infrastructures is becoming an inevitable part of networked control systems. Examples are industrial automation, process automation, and energy automation systems. Characteristic for all these systems is the data exchange between intelligent electronic devices – IEDs, which are used to monitor and control the operation. In energy automation deployments these IEDs provide the data for a obtaining a system view of connected energy resources. This becomes increasingly important as the number of decentralized energy resources – DER – is constantly increasing. Based on the system view, a set of DER, building a virtual power plant, can be managed reliably. The communication is realized through domain-specific communication protocols like IEC 61850, or IEC 60870-5. This communication is performed over networks of different administrative domains, also over public networks. Therefore, IT security is a necessary prerequisite to prevent intentional manipulations, thereby supporting the reliable operation of the energy grid. Basis for protecting metering and control communication are cryptographic security credentials, which need to be managed not only during operation, but most importantly during installation (initial enrollment). This process needs to be as simple as possible to not increase the overall effort and to not introduce additional sources for failures. Hence, automatic credential management is needed to ensure an efficient management for a huge number of devices. This paper describes a new approach for the automatic initial security credential enrollment process during the installation phase of IEDs. The approach targets the binding of the security credentials of the installed IEDs to the operational environment and also to the intended utilization of the IED by embedding specific information into the enrollment communication, which is then reflected in the issued X.509 certificates.

Pages: 107 to 117

Copyright: Copyright (c) to authors, 2015. Used with permission.

Publication date: June 30, 2015

Published in: journal

ISSN: 1942-2679

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.