Electric Power ›› 2021, Vol. 54 ›› Issue (1): 167-174.DOI: 10.11930/j.issn.1004-9649.202003037

Previous Articles     Next Articles

Security Transformation Technology for Electricity Metering Communication Protocol

REN Hui1,5, LI Huifeng2, ZHAO Hui3, HE Feng4, DOU Renhui1,5, YAO Zhiqiang1,5, ZHAO Guoqing1,5   

  1. 1. Nanjing Department of China Electric Power Research Institute, Nanjing 210003, China;
    2. State Grid Hebei Electric Power Supply Co., Ltd. Electric Power Research Institute, Shijiazhuang 050021, China;
    3. Jicheng Electronic Co., Ltd., Jinan 250100, China;
    4. Shanghai Boban Data Technology Co., Ltd., Shanghai 200333, China;
    5. Beijing Key Laboratory of Research and System Evaluation of Power Dispatching Automation Technology, Beijing 100192, China
  • Received:2020-03-05 Revised:2020-03-30 Online:2021-01-05 Published:2021-01-11
  • Supported by:
    This work is supported by Science and Technology Project of SGCC (Research and Application of Domestic Communication Protocol for Substation Control Layer, No.5108-202018037A-0-0-00)

Abstract: Network attacks are now penetrating into industrial control system. Acquisition of electricity energy data is related to the economic interests of all parties, so it is very important to obtain accurate electricity data in time. In the paper, security transformation is made to the 102 protocol based on IEC 62351. The TLS protocol is added in the transmission layer, and the HMAC is used in the application layer to verify the security of ASDU message, so as to realize such functions as the communication encryption, authentication and integrity verification between the main and sub stations of the electricity energy acquisition system. The key data indexes, such as the authentication time of the main and sub stations, the increase time of the single frame data before and after the 102 protocol transformation of the electricity energy acquisition system, are simulated and tested. The testing results show that transformation of the application layer consumes more time and can seriously affect the communication efficiency when message frames are large in numbers. It is concluded through comprehensive comparison that the overall performance is better when SM4 encryption suite is used for TLS protocol.

Key words: 102 protocol, IEC 62351, TLS protocol, encryption and authentication, transformation of application layer