Substation Bill of Materials: A Novel Approach to Managing Supply Chain Cyber-risks on IEC 61850 Digital Substations
- URL: http://arxiv.org/abs/2503.19638v1
- Date: Tue, 25 Mar 2025 13:28:36 GMT
- Title: Substation Bill of Materials: A Novel Approach to Managing Supply Chain Cyber-risks on IEC 61850 Digital Substations
- Authors: Xabier Yurrebaso, Fernando Ibañez, Ángel Longueira-Romero,
- Abstract summary: Substation Bill of Materials (Subs-BOM) is capable of modeling all the IEDs in a DS and their relationships from a cybersecurity perspective.<n>Subs-BOM provides energy utilities with an accurate and complete inventory of the devices, the firmware they are running, and the services that are deployed into the DS.
- Score: 44.99833362998488
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Smart grids have undergone a profound digitization process, integrating new data-driven control and supervision techniques, resulting in modern digital substations (DS). Attackers are more focused on attacking the supply chain of the DS, as they a comprise a multivendor environment. In this research work, we present the Substation Bill of Materials (Subs-BOM) schema, based on the CycloneDX specification, that is capable of modeling all the IEDs in a DS and their relationships from a cybersecurity perspective. The proposed Subs-BOM allows one to make informed decisions about cyber risks related to the supply chain, and enables managing multiple DS at the same time. This provides energy utilities with an accurate and complete inventory of the devices, the firmware they are running, and the services that are deployed into the DS. The Subs-BOM is generated using the Substation Configuration Description (SCD) file specified in the IEC 61850 standard as its main source of information. We validated the Subs-BOM schema against the Dependency-Track software by OWASP. This validation proved that the schema is correctly recognized by CycloneDX-compatible tools. Moreover, the Dependency-Track software could track existing vulnerabilities in the IEDs represented by the Subs-BOM.
Related papers
- Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid [0.0]
Cyber-physical system (CPS) security for the smart grid enables secure communication for the SCADA and wide-area measurement system data.<n>Power utilities world-wide use various SCADA protocols, namely DNP3, and IEC 61850, for the data exchanges across substation field devices, remote terminal units (RTUs), and control center applications.<n> Adversaries may exploit compromised SCADA protocols for the reconnaissance, data exfiltration, vulnerability assessment, and injection of stealthy cyberattacks to affect power system operation.
arXiv Detail & Related papers (2024-12-10T20:57:43Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - SDN-Based Smart Cyber Switching (SCS) for Cyber Restoration of a Digital Substation [0.4749981032986242]
This paper proposes a cybersecurity framework to bolster the resilience of substations based on the IEC-61850 standard.
The framework's effectiveness is validated through comprehensive simulations and a hardware-in-the-loop (HIL) testbed.
arXiv Detail & Related papers (2024-11-11T23:22:02Z) - Sustainable Diffusion-based Incentive Mechanism for Generative AI-driven Digital Twins in Industrial Cyber-Physical Systems [65.22300383287904]
Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries.<n>By digitizing data throughout product life cycles, Digital Twins (DTs) in ICPSs enable a shift from current industrial infrastructures to intelligent and adaptive infrastructures.<n>GenAI can drive the construction and update of DTs to improve predictive accuracy and prepare for diverse smart manufacturing.
arXiv Detail & Related papers (2024-08-02T10:47:10Z) - Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files [56.96539046813698]
steganographic channels can allow additional data to be embedded within the STL files without changing the printed model.
This paper addresses this security threat by designing and evaluating a emphsanitizer that erases hidden content where steganographic channels might exist.
arXiv Detail & Related papers (2024-04-07T23:28:35Z) - HasTEE+ : Confidential Cloud Computing and Analytics with Haskell [50.994023665559496]
Confidential computing enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs)
TEEs offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks.
We address the above with HasTEE+, a domain-specific language (cla) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety.
arXiv Detail & Related papers (2024-01-17T00:56:23Z) - Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection [0.0]
An Ensemble Defense System (EDS) is a cybersecurity framework aggregating multiple security tools to monitor and alert an organization during cyber attacks.
The proposed EDS leverages a comprehensive range of Intrusion Detection System (IDS) capabilities by introducing a hybrid of signature-based IDS and anomaly-based IDS tools.
The effectiveness of the EDS is evaluated through a payload from a bash script that executes various attacks, including port scanning, privilege escalation, and Denial-of-Service (DoS)
arXiv Detail & Related papers (2024-01-07T14:07:00Z) - SDN-Based Dynamic Cybersecurity Framework of IEC-61850 Communications in
Smart Grid [0.5399800035598186]
Cyber breaches into power grid substations present a risk.
Nowadays, software-defined network (SDN) is being widely used in the substation automation system.
We propose a hybrid intrusion detection system (IDS)-integrated SDN architecture for detecting and preventing the injection of malicious IEC 61850-based generic object-oriented substation event (GOOSE) messages.
arXiv Detail & Related papers (2023-11-20T21:49:41Z) - ChatGPT and Other Large Language Models for Cybersecurity of Smart Grid Applications [0.0]
This paper proposes large language models (LLM), e.g., ChatGPT, for the cybersecurity of IEC 61850-based digital substation communications.
A hardware-in-the-loop (HIL) testbed is used to generate and extract dataset of IEC 61850 communications.
arXiv Detail & Related papers (2023-11-09T15:50:44Z) - An Empirically Grounded Reference Architecture for Software Supply Chain Metadata Management [2.1574657220935602]
Adopting SSC metadata requires organisations to procure or develop a Software Supply Chain Metadata Management system (SCM2)
SCM2 is a suite of software tools for performing life cycle activities of SSC metadata documents such as creation, signing, distribution, and consumption.
This paper presents an empirically grounded Reference Architecture (RA) comprising of a domain model and an architectural blueprint for SCM2 systems.
arXiv Detail & Related papers (2023-10-10T04:25:30Z) - Will bots take over the supply chain? Revisiting Agent-based supply
chain automation [71.77396882936951]
Agent-based supply chains have been proposed since early 2000; industrial uptake has been lagging.
We find that agent-based technology has matured, and other supporting technologies that are penetrating supply chains are filling in gaps.
For example, the ubiquity of IoT technology helps agents "sense" the state of affairs in a supply chain and opens up new possibilities for automation.
arXiv Detail & Related papers (2021-09-03T18:44:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.