KR20140043537A - Secure communication apparatus and method for securing scada communication network - Google Patents
Secure communication apparatus and method for securing scada communication network Download PDFInfo
- Publication number
- KR20140043537A KR20140043537A KR1020120105705A KR20120105705A KR20140043537A KR 20140043537 A KR20140043537 A KR 20140043537A KR 1020120105705 A KR1020120105705 A KR 1020120105705A KR 20120105705 A KR20120105705 A KR 20120105705A KR 20140043537 A KR20140043537 A KR 20140043537A
- Authority
- KR
- South Korea
- Prior art keywords
- dnp
- data
- secure
- control command
- response
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Disclosed are a secure communication apparatus and method for securing a SCADA (Supervisory Control And Data Acquisition) communication network. According to an embodiment of the present invention, a secure communication device for securing a SCADA communication network between a master and an outstation that is a subnode of the master may include a distributed network protocol (DNP) control command or a DNP from the master or the outstation. A first data receiver configured to receive DNP data including a response; An offensive mode component configured to generate secure DNP data by applying an offensive mode that attaches DNP message authentication data corresponding to a DNP standard security policy to the DNP data; And a first data transmitter for transmitting the DNP data or the secure DNP data to another secure communication device.
Description
The present invention relates to a secure communication apparatus and method for securing a SCADA communication network, and performs a function of generating secure DNP data by applying an offensive mode to attach DNP message authentication data corresponding to a DNP standard security policy to DNP data. By performing two-way data authentication using a secure communication device, SCADA communication network can be controlled more securely and security for SCADA communication network security that can minimize the transmission time delay caused by performing security functions to ensure the integrity of DNP data. A communication device and method are disclosed.
Supervisory Control And Data Acquisition (SCADA) system is a system for centralized monitoring and control of remote facility devices. The SCADA system receives, records, displays and collects the status information data of the remote device to an outstation, which is a remote device, using analog or digital signals on the communication path, especially in the field of power generation and distribution. By transmitting to Master, the system, the central control system monitors and controls the remote devices.
In order to protect the communication network of such SCADA system, Secure Authentication is included in the IEEE 1815 DNP 3.0 standard. Security authentication is a protocol that changes only the application layer of the existing DNP 3.0 specification to protect DNP data from cyber attacks such as eavesdropping, data forgery, and retransmission attack, and adds a security mechanism to guarantee authentication and integrity. DNP 3.0 security authentication does not provide encryption to maintain the confidentiality of messages, but does provide authentication to ensure the integrity of sensitive messages, such as control commands sent from the master to the outstation. Secure authentication provides a challenge-response authentication mode for authentication. The challenge-response mode is a basic authentication mode, as shown in FIG. 1, sends an authentication challenge including a random number for authentication, receives an authentication response thereto, and verifies that the response is valid. do.
As described above, in order to protect the SCADA communication network, the IEEE 1815 standard proposes a security standard called security certification, but the existing power control system is developed and operated without considering security, and in the DNP 3.0 security certification, the power control system It is difficult to apply the security function to the power control system in operation because it proposes the method to install the security function in the master and the outstation.
First, DNP 3.0 security certification is often not provided in most SCADA systems that are already built as application level protocols, and in order to provide the security functions suggested by the security certification, the entire existing system is newly added. Since it needs to be replaced with a system, it requires a lot of construction cost for security, and there are many problems in practical application such as a power service supply interruption problem due to system replacement.
Second, it is difficult to guarantee the availability of power services. Electric power service is a basic service of modern society, and if there is a problem with stable power supply, it will not only be difficult to maintain basic social activities, but also cause national losses. The biggest function of power control system is to supply stable power service. To this end, current power control system applies various mechanisms such as system redundancy and communication line redundancy. However, when the security function is installed in the master and out station constituting the power control system, the security function to ensure the integrity of the DNP data affects the entire power control system when malfunctioning. Therefore, DNP data transmission and reception for power equipment status information collection and control is performed. Will fail. Eventually, the DNP data transmission failure causes difficulty in securing the availability of power service, which is a basic function of the power control system.
Another problem with DNP 3.0 security authentication is one-way data authentication. Substation operation information such as response to control command, measurement, and monitoring are important basic information to determine the operation of power equipment such as switch opening and closing. Therefore, if such operation information is forged and transmitted to the power system server, the system operator can change the current power. The misoperation of the plant's operation can lead to incorrect control commands, which can lead to power supply problems. It is also necessary to protect the control command that directly affects the operation of the power plant, but as described above, substation operation information such as response to the control command, measurement, and monitoring is also important information, and thus protection is required.
However, the challenge-response authentication scheme presented in DNP 3.0 security authentication provides only one-way authentication for control commands and no response for response, as shown in FIG.
In addition, since the security vulnerability of the DNP 3.0 specification itself is disclosed, it is increasingly possible for an attacker with malicious intention to attack the DNP-based SCADA system using the above vulnerability, but in the conventional SCADA system, a forged DNP message is used. There is no way to detect and block.
Therefore, it is necessary to develop a DNP security system to ensure the integrity of the DNP request and response data while minimizing the cost of replacing and improving the power control system. In addition, the DNP security system should be able to detect and block forged DNP messages, and in the event of a malfunction of the security function, it can be configured to deliver DNP request and response data stably with a simple operation. Should not.
In this regard, Korean Patent Laid-Open Publication No. 2010-0078584 discloses "a multiple encryption apparatus and method for SCADA communication security".
An object of the present invention is to perform a two-way data authentication by using a secure communication device that performs the function of generating a secure DNP data by applying the offensive mode of attaching DNP message authentication data corresponding to the DNP standard security policy to the DNP data, The present invention provides a secure communication apparatus and method for SCADA communication network security that can more safely control the SCADA communication network and minimize the transmission time delay caused by performing security functions to ensure the integrity of DNP data.
According to an embodiment of the present invention, a secure communication device for securing a Supervisory Control And Data Acquisition (SCADA) communication network between a master and an outstation that is a sub-node of the master is the master or the outstation. A first data receiving unit for receiving DNP data including a DNP control command or a DNP response from the first data receiving unit; An offensive mode component configured to generate secure DNP data by applying an offensive mode that attaches DNP message authentication data corresponding to a DNP standard security policy to the DNP data; And a first data transmitter for transmitting the DNP data or the secure DNP data to another secure communication device.
The offensive mode configuration unit may generate the DNP message authentication data using a class-specific control session key or class-specific monitoring session key classified according to the DNP control command or the function code of the DNP response.
The offensive mode configuration unit may generate secure DNP data by applying an offensive mode for each frame of the DNP data.
The secure communication device for securing the SCADA communication network, by analyzing the function code of the DNP data received from the first data receiving unit to determine whether the DNP data corresponds to the critical (critical) DNP data related to power supply, If the DNP data is the critical DNP data may further include a data determination unit for transmitting the DNP data to the offensive mode configuration unit, and if not the DNP data to deliver the DNP data to the first data transmission unit.
The data determining unit determines whether the DNP control command is received from an authorized SCADA server when the DNP data received by the first data receiving unit is DNP data including a DNP control command received from the master, When the DNP control command is received from the authorized SCADA server, it is determined whether the DNP data received by the first data receiver corresponds to the critical DNP data. Otherwise, the packet of the DNP data is dropped ( drop).
The secure communication device for the SCADA communication network security, the second data receiving unit for receiving DNP data or secure DNP data from another secure communication device; A secure DNP data verification unit verifying whether the DNP message authentication data attached to the secure DNP data corresponds to the DNP standard security policy when the data received by the second data receiver is secure DNP data; A data reconstruction unit reconstructing the secure DNP data into the DNP data when the DNP message authentication data is verified by the secure DNP data verification unit to correspond to the DNP standard security policy; And a second data transmitter for transmitting the DNP data received from the second data receiver or the DNP data reconstructed by the data reconstruction unit to the master or the out station.
The secure communication device for securing the SCADA communication network, the control command forgery detection signature (signature) when the secure DNP data verified by the secure DNP data verification unit is secure DNP data including a DNP control command received from the master A control command forgery detection for detecting whether the security DNP data is forged or not based on a database; It may further include wealth.
According to an embodiment of the present invention, a secure communication method for securing a Supervisory Control And Data Acquisition (SCADA) communication network between a master and an outstation that is a sub-node of the master may include (a) master secure communication. Receiving, by the device, DNP control command data including a Distributed Network Protocol (DNP) control command from the master; (b) generating secure DNP control command data by applying an offensive mode to attach DNP control command authentication data corresponding to a DNP standard security policy to the DNP control command data; And (c) transmitting the DNP control command data or the secure DNP control command data to a slave secure communication device.
The step (b) may include generating the DNP control command authentication data by using a session-specific session key for classification according to a function code of the DNP control command.
Step (b) may include generating secure DNP control command data by applying an offensive mode for each frame of the DNP control command data.
The secure communication method for the SCADA communication network security, (d) analyzing the function code of the DNP control command data received in the step (a) and the DNP control command data to the critical (critical) DNP data related to power supply The method may further include determining whether it is applicable. In this case, when the DNP control command data is critical DNP data, step (b) may be performed. Otherwise, step (c) may be performed.
The secure communication method for securing the SCADA communication network may further include (e) determining whether the DNP control command is received from an authorized SCADA server. In this case, if the DNP control command is received from an authorized SCADA server, the step (d) may be performed. If not, the step of dropping a packet of the DNP control command data may be performed. have.
The secure communication method for securing the SCADA communication network may include: (f) receiving, by the slave secure communication device, DNP control command data or secure DNP control command data from the master secure communication device; (g) if the data received in step (f) is secure DNP control command data, verifying whether the DNP control command authentication data attached to the secure DNP control command data corresponds to the DNP standard security policy; (h) reconstructing the secure DNP control command data into the DNP control command data when the DNP control command authentication data is verified to correspond to the DNP standard security policy; And (i) transmitting the DNP control command data received in step (f) or the DNP control command data reconstructed in step (h) to the out station.
The secure communication method for security of the SCADA communication network may further include detecting (j) forgery of the secure DNP control command data verified in step (g) based on a control command forgery detection signature database. It may include. In this case, if the secure DNP control command data is normal, step (h) may be performed, and if forgery is detected, dropping the packet of the secure DNP data may be performed.
According to another embodiment of the present invention, a secure communication method for securing a Supervisory Control And Data Acquisition (SCADA) communication network between a master and an outstation that is a subordinate node of the master is (k) slave secure communication. A device receiving DNP response data including a Distributed Network Protocol (DNP) response from the outstation; (1) generating secure DNP response data by applying an offensive mode to attach DNP response authentication data corresponding to a DNP standard security policy to the DNP response data; And (m) transmitting the DNP response data or the secure DNP response data to a master secure communication device.
The step (l) may include generating the DNP response authentication data by using a monitoring session key for each level classified according to a function code of the DNP response.
The step (l) may include generating secure DNP response data by applying an offensive mode for each frame of the DNP response data.
The secure communication method for securing the SCADA communication network may include (n) analyzing a function code of the DNP response data received in step (k) to determine whether the DNP response data corresponds to critical DNP data related to power supply. The method may further include determining whether or not. In this case, if the DNP response data is critical DNP data, step (l) may be performed, and if not, step (m) may be performed.
The secure communication method for securing the SCADA communication network may include: (o) receiving, by the master secure communication device, DNP response data or secure DNP response data from the slave secure communication device; (p) if the data received in step (o) is secure DNP response data, verifying whether the DNP response authentication data attached to the secure DNP response data corresponds to the DNP standard security policy; (q) reconstructing the secure DNP response data into the DNP response data when the DNP response authentication data is verified to correspond to the DNP standard security policy; And (r) transmitting the DNP response data received in step (o) or the DNP response data reconstructed in step (q) to the master.
According to an aspect of the present invention, two-way data authentication is performed using a secure communication device that performs a function of generating secure DNP data by applying an offensive mode to attach DNP message authentication data corresponding to a DNP standard security policy to DNP data. By performing the above, it is possible to provide a secure communication apparatus and method for SCADA communication network security that can more securely control the SCADA communication network and minimize the transmission time delay due to the security function to ensure the integrity of the DNP data.
1 is a protocol flow diagram for a challenge-response scheme, which is a conventional authentication scheme recommended in the DNP standard.
2 is a view showing an example of the configuration of the entire system for practicing the present invention.
3 is a protocol flow diagram for a method of authenticating and controlling a secure communication device for securing a SCADA communication network using a conventional challenge-response method recommended in the DNP standard.
4 is a protocol flowchart for an offensive mode authentication method applied in an embodiment of the present invention.
FIG. 5 is a protocol flowchart of an authentication and control method of a secure communication device for securing a SCADA communication network using an offensive mode applied in an embodiment of the present invention.
6 is a block diagram of the configuration of a secure communication device for SCADA communication network security according to an embodiment of the present invention.
7 is a block diagram of a configuration of a master secure communication device for securing a SCADA communication network according to an embodiment of the present invention.
8 is a block diagram of a configuration of a slave secure communication device for securing a SCADA communication network according to an embodiment of the present invention.
9 is a flowchart illustrating an example of a message authentication and control method in a master secure communication device that receives data from a master.
10 is a flowchart illustrating an example of a message verification and forgery detection method in a slave secure communication device that receives data from a master secure communication device.
11 is a flowchart illustrating an example of a message authentication and control method in a slave secure communication device that receives data from an out station.
12 is a flowchart illustrating an example of a message verification method in a master secure communication device receiving data from a slave secure communication device.
The present invention will now be described in detail with reference to the accompanying drawings. Hereinafter, a repeated description, a known function that may obscure the gist of the present invention, and a detailed description of the configuration will be omitted. Embodiments of the present invention are provided to more fully describe the present invention to those skilled in the art. Accordingly, the shapes and sizes of the elements in the drawings and the like can be exaggerated for clarity.
2 is a view showing an example of the configuration of the entire system for practicing the present invention.
Referring to FIG. 2, a secure communication system for securing a SCADA communication network according to an embodiment of the present invention includes a
According to the secure communication system for SCADA communication network security according to an embodiment of the present invention, when the DNP control command data including the DNP control command (request) from the
On the other hand, when the DNP response data including the DNP response from the
As shown in FIG. 2, the secure communication system for securing a SCADA communication network according to an embodiment of the present invention includes an
However, the authentication structure of the challenge-response method (see FIG. 1) proposed by the DNP 3.0 security authentication standard is applied to both the control command and the response to the secure communication system for SCADA communication network security as shown in FIG. In this case, problems may occur in normal operation of the power system, which will be described with reference to FIG. 3.
3 is a protocol flow diagram for a method of authenticating and controlling a secure communication device for securing a SCADA communication network using a conventional challenge-response method recommended in the DNP standard.
Referring to FIG. 3, a communication flow is shown when an authentication structure of the challenge-response method (see FIG. 1) is applied to both the control command and the response to the secure communication system for securing the SCADA communication network described in FIG. 2. . At this time, since the secure communication system is a separate security communication device performs a security function, the data transmitted and received, such as the authentication challenge, the authentication response is increased, to perform a control command for the power equipment and confirm the result The procedure is too complicated. As a result, the transmission time of the DNP data is increased, and in the worst case, even if the power control system receives normal data, the maximum transmission time specified by the system is exceeded, and the data is treated as abnormal data. Problems may arise.
In order to solve this problem, the authentication method for minimizing the delay time caused by applying the challenge-response authentication mode to both the control command and the response to the secure communication system for the SCADA communication network security described in FIG. Needs to be. To this end, in one embodiment, the secure communication system for SCADA communication network security can shorten the execution time of the security function by delivering secure DNP data in addition to the authentication data for ensuring DNP message integrity in offensive mode. Offensive mode will be described with reference to FIG. 4 below.
4 is a protocol flowchart for an offensive mode authentication method applied in an embodiment of the present invention.
Referring to FIG. 4, the offensive mode is an authentication method for eliminating delays and overhead occurring in the challenge-response mode, and includes an authentication response in control command data requiring the
FIG. 5 is a protocol flowchart of an authentication and control method of a secure communication device for securing a SCADA communication network using an offensive mode applied in an embodiment of the present invention.
Message authentication and forgery detection in a secure communication device for SCADA communication network security according to an embodiment of the present invention, when the DNP control command data arrives from the
On the other hand, when the DNP response data for the control command arrives from the
6 is a block diagram of the configuration of a secure communication device for SCADA communication network security according to an embodiment of the present invention.
Referring to FIG. 6, the
The
The
In addition, the
The offensive
The
The
When the data received by the
The control command
The
The
7 is a block diagram of a configuration of a master secure communication device for securing a SCADA communication network according to an embodiment of the present invention.
Referring to FIG. 7, a master
According to FIG. 7, the master
8 is a block diagram of a configuration of a slave secure communication device for securing a SCADA communication network according to an embodiment of the present invention.
Referring to FIG. 8, a slave
The
9 is a flowchart illustrating an example of a message authentication and control method in a master secure communication device that receives data from a master.
9, when the master
10 is a flowchart illustrating an example of a message verification and forgery detection method in a slave secure communication device that receives data from a master secure communication device.
Referring to FIG. 10, when the slave
When the security DNP control command data is verified or normal DNP control command data, the data is analyzed to detect forgery and attack of the data (S230). Here, in the forgery detection (S230), the control command forgery detection signature database is used. Determining whether or not the security DNP control command data is forged through the detection (S230) (S240), if it is not normal, drops the packet and generates a warning (S260), and if it is normal, secure DNP control command Reconstruct the data into the DNP control command data (S250) and transmit the DNP control command data to the out station 20 (S270).
11 is a flowchart illustrating an example of a message authentication and control method in a slave secure communication device that receives data from an out station.
Referring to FIG. 11, when the slave
In step S320, if the DNP response data is critical DNP data, secure DNP response data is generated by applying an offensive mode for each frame (S330). In step S330, the secure DNP response data may be configured by generating MAC as authentication data using the session-specific monitoring session key for the DNP response data, and then adding authentication data after the DNP response data. Then, the secure DNP response data generated in step S330 is transmitted to the master secure communication device 110 (S340). At this time, if the DNP response data is not the critical DNP data in step S320, the original DNP response data is transmitted to the master
12 is a flowchart illustrating an example of a message verification method in a master secure communication device receiving data from a slave secure communication device.
12, when the master
When the secure DNP response data is verified, the secure DNP response data is reconstructed into the DNP response data (S430), and the DNP response data is transmitted to the master 10 (S440). Here, since the forgery detection for the control command is made in the slave
The aforementioned secure communication method for securing the SCADA communication network has been described with reference to the flowchart shown in the drawings. While the above method has been shown and described as a series of blocks for purposes of simplicity, it is to be understood that the invention is not limited to the order of the blocks, and that some blocks may be present in different orders and in different orders from that shown and described herein And various other branches, flow paths, and sequences of blocks that achieve the same or similar results may be implemented. Also, not all illustrated blocks may be required for implementation of the methods described herein.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is clearly understood that the same is by way of illustration and example only and is not to be taken as limitations. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
10 master
100 secure communication devices
110 Master Secure Communication Device
120 Slave Secure Communication Device
20 slave
30 SCADA Communication Network
Claims (19)
A first data receiver configured to receive DNP data including a DNP control command or a DNP response from the master or the outstation;
An offensive mode component configured to generate secure DNP data by applying an offensive mode that attaches DNP message authentication data corresponding to a DNP standard security policy to the DNP data; And
And a first data transmitter for transmitting the DNP data or the secure DNP data to another secure communication device.
The offensive mode configuration unit,
For generating the DNP message authentication data using a class-specific control session key or class-specific monitoring session key classified according to the DNP control command or a function code of the DNP response. Secure communication devices.
The offensive mode configuration unit,
Secure communication device for SCADA communication network security, characterized in that for generating a secure DNP data by applying an offensive mode for each frame of the DNP data.
The function code of the DNP data received by the first data receiver is analyzed to determine whether the DNP data corresponds to critical DNP data related to power supply, and when the DNP data is critical DNP data, And a data determination unit configured to transmit data to the offensive mode configuration unit, and, if not, to transmit the DNP data to the first data transmission unit.
Wherein the data determination unit comprises:
When the DNP data received by the first data receiver is DNP data including a DNP control command received from the master, it is determined whether the DNP control command is received from an authorized SCADA server, and the DNP control command is If it is received from an authorized SCADA server, it is determined whether the DNP data received by the first data receiver corresponds to the critical DNP data, and if not, drop the packet of the DNP data. Secure communication device for SCADA communication network security.
A second data receiver for receiving DNP data or secure DNP data from another secure communication device;
A secure DNP data verification unit verifying whether the DNP message authentication data attached to the secure DNP data corresponds to the DNP standard security policy when the data received by the second data receiver is secure DNP data;
A data reconstruction unit reconstructing the secure DNP data into the DNP data when the DNP message authentication data is verified by the secure DNP data verification unit to correspond to the DNP standard security policy; And
And a second data transmitter for transmitting the DNP data received from the second data receiver or the DNP data reconstructed by the data reconstruction unit to the master or the out station. Device.
When the secure DNP data verified by the secure DNP data verification unit is secure DNP data including a DNP control command received from the master, whether the secure DNP data is forged based on a control command forgery detection signature database; SCADA communication network security, characterized in that it further comprises a control command forgery detection unit for detecting, and if it is normal delivers the security DNP data to the data reconstruction unit, and if the forgery is detected, dropping the packet of the security DNP data Secure communication device.
(a) a master secure communication device receiving DNP control command data including a Distributed Network Protocol (DNP) control command from the master;
(b) generating secure DNP control command data by applying an offensive mode to attach DNP control command authentication data corresponding to a DNP standard security policy to the DNP control command data; And
(c) transmitting the DNP control command data or the secure DNP control command data to a slave secure communication device.
The step (b)
And generating the DNP control command authentication data by using the session-specific session key for classifying according to the function code of the DNP control command.
The step (b)
And generating secure DNP control command data by applying an offensive mode for each frame of the DNP control command data.
(d) analyzing the function code of the DNP control command data received in step (a) and determining whether the DNP control command data corresponds to critical DNP data related to power supply,
If the DNP control command data is critical DNP data, perform step (b); otherwise, perform step (c).
(e) determining whether the DNP control command is received from an authorized SCADA server;
If the DNP control command is received from an authorized SCADA server, performing step (d); otherwise, dropping a packet of the DNP control command data; SCADA Communication Secure communication method for network security.
(f) the slave secure communication device receiving DNP control command data or secure DNP control command data from the master secure communication device;
(g) if the data received in step (f) is secure DNP control command data, verifying whether the DNP control command authentication data attached to the secure DNP control command data corresponds to the DNP standard security policy;
(h) reconstructing the secure DNP control command data into the DNP control command data when the DNP control command authentication data is verified to correspond to the DNP standard security policy; And
(i) transmitting the DNP control command data received in step (f) or the DNP control command data reconstructed in step (h) to the out station. Secure communication method.
(j) detecting whether the security DNP control command data verified in step (g) is forged or not based on a control command forgery detection signature database,
And performing step (h) if the secure DNP control command data is normal, and dropping a packet of the secure DNP data if forgery is detected. Way.
(k) receiving, by a slave secure communication device, DNP response data including a Distributed Network Protocol (DNP) response from the outstation;
(1) generating secure DNP response data by applying an offensive mode to attach DNP response authentication data corresponding to a DNP standard security policy to the DNP response data; And
(m) transmitting the DNP response data or the secure DNP response data to a master secure communication device.
The step (l)
And generating the DNP response authentication data using a monitoring session key for each level classified according to a function code of the DNP response.
The step (l)
And generating a secure DNP response data by applying an offensive mode for each frame of the DNP response data.
(n) analyzing the function code of the DNP response data received in step (k) to determine whether the DNP response data corresponds to critical DNP data related to power supply,
If the DNP response data is critical DNP data, perform step (l); otherwise, perform step (m).
(o) the master secure communication device receiving DNP response data or secure DNP response data from the slave secure communication device;
(p) if the data received in step (o) is secure DNP response data, verifying whether the DNP response authentication data attached to the secure DNP response data corresponds to the DNP standard security policy;
(q) reconstructing the secure DNP response data into the DNP response data when the DNP response authentication data is verified to correspond to the DNP standard security policy; And
(r) transmitting the DNP response data received in step (o) or the reconstructed DNP response data in step (q) to the master. .
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120105705A KR102018064B1 (en) | 2012-09-24 | 2012-09-24 | Secure communication apparatus and method for securing SCADA communication network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120105705A KR102018064B1 (en) | 2012-09-24 | 2012-09-24 | Secure communication apparatus and method for securing SCADA communication network |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20140043537A true KR20140043537A (en) | 2014-04-10 |
KR102018064B1 KR102018064B1 (en) | 2019-09-05 |
Family
ID=50651986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020120105705A KR102018064B1 (en) | 2012-09-24 | 2012-09-24 | Secure communication apparatus and method for securing SCADA communication network |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR102018064B1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101520769B1 (en) * | 2014-06-17 | 2015-05-14 | 울산과학대학교 산학협력단 | Method and apparatus for secure and efficient scada system |
KR20160038935A (en) * | 2014-09-30 | 2016-04-08 | 한국전력공사 | Secure communication apparatus and method of distribute network protocol message |
KR20170030374A (en) * | 2015-09-09 | 2017-03-17 | 한국전력공사 | Apparatus and method for providing secure authentication of distributed network protocol |
KR20180066737A (en) | 2016-12-09 | 2018-06-19 | 한전케이디엔주식회사 | Distribution intelligence system with ip based security method |
KR102125047B1 (en) | 2018-12-26 | 2020-06-19 | 한전케이디엔 주식회사 | Key Management and Operation Method for Improving Security of Distribution Intelligence System |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090102469A (en) * | 2008-03-26 | 2009-09-30 | 한국전기연구원 | System and method for data protection and security of scada network based on dnp |
KR20100078584A (en) * | 2008-12-30 | 2010-07-08 | 한국전기연구원 | Multiple encryption apparatus and method for supervisory control and data acquisition communication security |
KR100994880B1 (en) * | 2008-07-11 | 2010-11-16 | 엘에스산전 주식회사 | System and method for acquiring power monitoring data using distributed network protocol |
KR20110068072A (en) * | 2009-12-15 | 2011-06-22 | 에스케이 텔레콤주식회사 | Method and apparatus for managing security document |
-
2012
- 2012-09-24 KR KR1020120105705A patent/KR102018064B1/en active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090102469A (en) * | 2008-03-26 | 2009-09-30 | 한국전기연구원 | System and method for data protection and security of scada network based on dnp |
KR100994880B1 (en) * | 2008-07-11 | 2010-11-16 | 엘에스산전 주식회사 | System and method for acquiring power monitoring data using distributed network protocol |
KR20100078584A (en) * | 2008-12-30 | 2010-07-08 | 한국전기연구원 | Multiple encryption apparatus and method for supervisory control and data acquisition communication security |
KR20110068072A (en) * | 2009-12-15 | 2011-06-22 | 에스케이 텔레콤주식회사 | Method and apparatus for managing security document |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101520769B1 (en) * | 2014-06-17 | 2015-05-14 | 울산과학대학교 산학협력단 | Method and apparatus for secure and efficient scada system |
KR20160038935A (en) * | 2014-09-30 | 2016-04-08 | 한국전력공사 | Secure communication apparatus and method of distribute network protocol message |
KR20170030374A (en) * | 2015-09-09 | 2017-03-17 | 한국전력공사 | Apparatus and method for providing secure authentication of distributed network protocol |
KR20210125965A (en) * | 2015-09-09 | 2021-10-19 | 한국전력공사 | Apparatus and method for providing secure authentication of distributed network protocol |
KR20180066737A (en) | 2016-12-09 | 2018-06-19 | 한전케이디엔주식회사 | Distribution intelligence system with ip based security method |
KR102125047B1 (en) | 2018-12-26 | 2020-06-19 | 한전케이디엔 주식회사 | Key Management and Operation Method for Improving Security of Distribution Intelligence System |
Also Published As
Publication number | Publication date |
---|---|
KR102018064B1 (en) | 2019-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107094155B (en) | Data security storage method and device based on alliance block chain | |
CN106789015B (en) | Intelligent power distribution network communication safety system | |
US7698555B2 (en) | System and method for enabling secure access to a program of a headless server device | |
RU2459369C2 (en) | Method and device for real-time message transfer | |
KR102018064B1 (en) | Secure communication apparatus and method for securing SCADA communication network | |
US20180270052A1 (en) | Cryptographic key distribution | |
Lim et al. | Security protocols against cyber attacks in the distribution automation system | |
US20130081112A1 (en) | Global Terminal Management Using 2-Factor Authentication | |
CN106685775A (en) | Self-inspection type invasion prevention method and system for intelligent household electrical appliance | |
CN116405302B (en) | System and method for in-vehicle safety communication | |
CN106027473A (en) | Identity card reading terminal and cloud authentication platform data transmission method and system | |
CN110474921A (en) | A kind of perception layer data fidelity method towards local Internet of Things | |
CN103647788A (en) | Node safety authentication method in smart grid | |
US11245699B2 (en) | Token-based device access restriction systems | |
KR101599213B1 (en) | Method and system for providing service detection rule in network security | |
Gilles et al. | Securing IIot communications using OPC UA pubsub and trusted platform modules | |
CN111314382A (en) | Network safety protection method suitable for high-frequency emergency control system | |
CN100596350C (en) | Method for encrypting and decrypting industrial control data | |
CN112514322A (en) | Method for managing keys inside a vehicle | |
KR101691201B1 (en) | Secure communication apparatus and method of distribute network protocol message | |
CN104247326A (en) | Field bus data transmission | |
CN102804724B (en) | The transfer of data of anti-manipulation between automation equipment | |
KR101339013B1 (en) | Method for processing multi security of dnp message in data link | |
CN105763518A (en) | B/S architecture-based remote data encryption method | |
KR101112169B1 (en) | Scada apparatus, control command authenticating apparatus capable of authenticating control command and method for authenticating control command in scada system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |