{"id":192132,"date":"2024-08-21T12:21:42","date_gmt":"2024-08-21T10:21:42","guid":{"rendered":"https:\/\/www.rse-web.it\/rapporti\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/"},"modified":"2024-09-19T13:00:18","modified_gmt":"2024-09-19T11:00:18","slug":"use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis","status":"publish","type":"rapporti","link":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/","title":{"rendered":"Use of a communications security test environment for power system control and KPI analysis"},"content":{"rendered":"<p class=\"last-updated-date\">Recently updated on September 19th, 2024 at 01:00 pm<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity plays an important role in ensuring the stability and efficiency of the electricity system. The work described concerns the use of a hardware\/software platform developed by RSE for measuring the impact of security profiles specified in the IEC 62351 standards on communications performance; architectural scenarios were prepared that took into consideration the influence of computing devices and communication solutions.<\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[1350,1349,1344,1346,1351,1348,1623,1305,1330],"targets":[1317],"rapporti_tipologie":[762],"class_list":["post-192132","rapporti","type-rapporti","status-publish","hentry","tag-cyber-anomaly-detection-en","tag-cyber-attack-forecast-en","tag-cybersecurity-en","tag-cybersecurity-assessment-en","tag-cybersecurity-operation-en","tag-cybersecurity-performance-testing-en","tag-energy-cybersecurity-standards-en","tag-energy-efficiency-en","tag-security-en","targets-research","rapporti_tipologie-report-en"],"acf":{"projects":{"ID":191051,"post_author":"464","post_date":"2024-07-10 16:51:29","post_date_gmt":"2024-07-10 14:51:29","post_content":"","post_title":"Application of Information Technology, Internet of Things, Peer-to-peer, to the electrical system in order to improve security and resilience","post_excerpt":"The project develops methods, tools, demonstrators and experiments to evaluate the application potential of the latest information and communication technologies for the benefit of the electro-energy system.","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience","to_ping":"","pinged":"","post_modified":"2024-08-09 15:59:29","post_modified_gmt":"2024-08-09 13:59:29","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"dont_show_hompage":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>Cybersecurity vulnerabilities have proven to be a real risk for the digital technologies that now govern the remote control of energy systems; they put both users and utilities at risk with regards to the reliability, continuity, and efficiency of services, with significant repercussions from an economic point of view. The IEC 62351 security standards specify solutions that can be applied to energy remote control systems and communications to counter or mitigate cybersecurity threats.<br \/>\nThe work described in this report concerns the use of a software platform implemented internally at RSE and installed in the PCS-ResTest laboratory which deals with monitoring, command, and control communications between an electrical station and multiple distributed resources according to the IEC 61850 standard; these communications are secured according to the specifications of the IEC 62351-3 and IEC 62351-4 standards regarding the security profiles to be activated in the TLS (Transport Layer Security) protocol, which relies on cryptographic techniques and digital certificates for confidentiality, integrity, and communications authentication. The standard provides alternatives that system integrators must adapt to the operational scenario; the tool developed and the performance tests conducted highlight how the different possibilities determine even significant performance differences requiring appropriate design and operational choices.<br \/>\nThe platform calculates appropriate Key Performance Indicators (KPIs) for evaluating the performance of different security profiles so as to support the system integrator in choosing solutions that satisfy performance, as well as architectural and functional requirements. The identified KPIs essentially consist of latency measurements at different moments of the remote control communication; it has been verified that different security profile parameters have a different impact in the different communication phases. Knowing and evaluating the impact at different moments of communication and on the basis of different architectural choices generally allows adapting remote control procedures to minimize performance degradation while at the same time maximizing architecture security and robustness.<br \/>\nIn the reference period, the development of functions to support encryption with algorithms based on elliptic curves was integrated, which are the subject of discussion and current evaluation within WG 15 of TC 57 of the IEC which draws up the specifications of the IEC 62351 standards.<br \/>\nNew features were also introduced for logging significant events relating to cybersecurity, which are being standardized using the consolidated syslog protocol.<br \/>\nA series of test scenarios were also set up aimed at verifying both the weight of the individual safety parameters specified in the standards and the relative behavior of the different profiles considered. The influences of external but inevitable factors such as processing systems, virtualization tools, and communication solutions, which are essential for remote control activities, were also verified. Tools similar to the one developed in the three-year period of research and the tests carried out during the reference period also provide support for the application of the IEC 62351 standard, both at<br \/>\na national level (e.g., in the CEI 0-16 standard for the protection of data exchange with active users connected to medium voltage networks) and at an international level. The availability of this type of test environments is a highly innovative contribution to the deployment of standard secure communications, in compliance with the operational requirements characteristic of energy applications.<\/p>\n","link_estreno":false,"scarica_file":[{"download_option":"download","file_name":"Download Report","download":{"ID":173990,"id":173990,"title":"21008878","filename":"21008878.pdf","filesize":6117983,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2022\/11\/21008878.pdf","link":"https:\/\/www.rse-web.it\/en\/rapporti\/utilizzo-di-un-ambiente-di-test-della-sicurezza-delle-comunicazioni-per-il-controllo-dei-sistemi-energetici-e-analisi-dei-kpi\/attachment\/21008878\/","alt":"","author":"93","description":"","caption":"","name":"21008878","status":"inherit","uploaded_to":173989,"date":"2022-11-24 14:06:37","modified":"2022-11-24 14:06:37","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}}],"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2021-12-31","autori":"G. Dondossola, M.G. Todeschini (RSE S.p.A.)","rapporto":"","rif_rse":"21008878"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Use of a communications security test environment for power system control and KPI analysis - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use of a communications security test environment for power system control and KPI analysis - RSE\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity plays an important role in ensuring the stability and efficiency of the electricity system. The work described concerns the use of a hardware\/software platform developed by RSE for measuring the impact of security profiles specified in the IEC 62351 standards on communications performance; architectural scenarios were prepared that took into consideration the influence of computing devices and communication solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T11:00:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/\",\"name\":\"Use of a communications security test environment for power system control and KPI analysis - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-08-21T10:21:42+00:00\",\"dateModified\":\"2024-09-19T11:00:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use of a communications security test environment for power system control and KPI analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Use of a communications security test environment for power system control and KPI analysis - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Use of a communications security test environment for power system control and KPI analysis - RSE","og_description":"Cybersecurity plays an important role in ensuring the stability and efficiency of the electricity system. The work described concerns the use of a hardware\/software platform developed by RSE for measuring the impact of security profiles specified in the IEC 62351 standards on communications performance; architectural scenarios were prepared that took into consideration the influence of computing devices and communication solutions.","og_url":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/","og_site_name":"RSE","article_modified_time":"2024-09-19T11:00:18+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/","url":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/","name":"Use of a communications security test environment for power system control and KPI analysis - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-08-21T10:21:42+00:00","dateModified":"2024-09-19T11:00:18+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/reports\/use-of-a-communications-security-test-environment-for-power-system-control-and-kpi-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"Use of a communications security test environment for power system control and KPI analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/192132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/rapporti"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=192132"}],"version-history":[{"count":2,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/192132\/revisions"}],"predecessor-version":[{"id":196821,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/192132\/revisions\/196821"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=192132"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=192132"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=192132"},{"taxonomy":"rapporti_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti_tipologie?post=192132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}