Cape Peninsula University of Technology
Browse
DOCUMENT
Appendix A.docx (57.73 kB)
DOCUMENT
Appendix B.docx (57.88 kB)
DOCUMENT
Appendix C.docx (67.85 kB)
DOCUMENT
Appendix D.docx (69.23 kB)
DOCUMENT
Appendix E.docx (77.59 kB)
DOCUMENT
Appendix F.docx (74.69 kB)
DOCUMENT
Appendix G.docx (62.22 kB)
DOCUMENT
Appendix H.docx (61.04 kB)
DOCUMENT
Appendix I.docx (59.81 kB)
DOCUMENT
Appendix J.docx (60.25 kB)
IMAGE
Ettercap capture of MITM attack.png (118.99 kB)
IMAGE
Packet capture for Publisher.png (160.45 kB)
IMAGE
Packet capture for Subscriber.png (167.54 kB)
IMAGE
Rejected SV PDU.png (70.27 kB)
IMAGE
Terminal output for subscriber device.png (182.37 kB)
IMAGE
Unsecure GOOSE.png (207.05 kB)
IMAGE
Wireshark capture of corrected GOOSE PDU.png (122.07 kB)
IMAGE
Wireshark capture of GOOSE PDU with error.png (71.07 kB)
IMAGE
Wireshark Capture of MITM attack.png (93.42 kB)
1/0
19 files

Development of authentication algorithms for IEC 61850 goose and sampled value messages

Download all (1.8 MB)
Version 2 2024-03-11, 10:03
Version 1 2024-03-11, 08:36
dataset
posted on 2024-03-11, 10:03 authored by Africa NdzekuAfrica Ndzeku

This study aims to develop an authentication algorithm for Routable-GOOSE (R-GOOSE) or Routable-SV (R-SV). Critical security features must be enabled to support authentication and authorization. The EtM algorithm is proposed for maintaining message confidentiality and integrity, with AES-128 encryption for privacy and MAC algorithms for message authentication. Simulation results indicate that the EtM algorithm can be successfully used for R-SV messages while meeting the stringent 3 ms latency criteria. The results suggest that future IEC 62351 security standards can confidently advocate for encryption for R-SV communication.

History

Is this dataset for graduation purposes?

  • Yes

Supervisor email address

bartq@cput.ac.za