Electric Power ›› 2024, Vol. 57 ›› Issue (9): 53-60.DOI: 10.11930/j.issn.1004-9649.202401006

• Cross Domain Attack Threats and Defense Against Power Infrastructure • Previous Articles     Next Articles

A Non-intrusive Method for Enhancing the Security of Modbus TCP Protocol Based on Cloud-Edge Collaboration in Distributed Resources

Zheqiu HETU1(), Zidong XU1, Xin CHE2, Zhenyong ZHANG1()   

  1. 1. State Key Laboratory of Public Big Data (College of Computer Science and Technology, Guizhou University), Guiyang 550025, China
    2. State Key Laboratory of Industrial Control Technology and College of Control Science and Engineering, Zhejiang University, Hangzhou 310027, China
  • Received:2024-01-02 Accepted:2024-04-01 Online:2024-09-23 Published:2024-09-28
  • Supported by:
    This work is supported by National Natural Science Foundation of China (A Defense Framework Against the Coordinated Cyber-physical Attack on Load Frequency Control, No.62303126,A Privacy Preserving Neural Network with Multi-source Encrypted Data, No.62362008),Guizhou Provincial Science and Technology Projects (Research on Cyber-Physical Attack and Defense of State Estimation in Smart Grid, No.ZK[2022]149), Guizhou Provincial Research Project (Youth) for Universities under grant (Research on the Vulnerability of Power Grid Stability Assessment System Empowered by Big Data, No.[2022]104)

Abstract:

The security problem of data transmission from smart edge devices in distributed resources (DR) brings hidden risks for power system. The Modbus TCP (transmission control protocol) is a commonly used communication method for edge devices, but its flawed security design makes the system vulnerable to cyber-attacks. In this paper, based on a review of the existing security methods, we analyzed their shortcomings under DR application scenarios, and proposed a non-intrusive Modbus TCP security enhancement method. The method adopts an architecture of cloud-edge collaboration, and uses the cloud platform of the power control center to manage access control principles, and deploys the actual access control module in the edge devices to restrict malicious behaviours through fine-grained access control combinations. Finally, based on the Modbus protocol reference guide, a DR application scenario was built for penetration testing. It was proved that the proposed method can effectively defend against the replay attacks and man-in-the-middle attacks in this scenario, and the time cost is within a hundred microseconds.

Key words: Modbus TCP protocol, protocol security, distributed resources, access control