ImageVerifierCode 换一换
格式:PDF , 页数:49 ,大小:353.78KB ,
资源ID:1248439      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1248439.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(IEEE 1711-2010 en Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links《网络分站串行链路协议的安全加密试验用标准》.pdf)为本站会员(tireattitude366)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

IEEE 1711-2010 en Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links《网络分站串行链路协议的安全加密试验用标准》.pdf

1、g3g3g3IEEE Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links g3Sponsored by the Substations Committee g3IEEE 3 Park Avenue New York, NY 10016-5997 USA 15 February 2011 IEEE Power +1 978 750 8400. Permission to photocopy portions of any individual standard

2、for educational classroom use can also be obtained through the Copyright Clearance Center. iv Copyright 2011 IEEE. All rights reserved. Introduction This introduction is not part of IEEE Std 1711-2010, IEEE Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links

3、. This trial use standard defines a cryptographic protocol called Serial SCADA Protection Protocol (SSPP) to provide integrity, and optionally confidentiality, for cyber security of substation serial links. It focuses exclusively on “formatting bits on the wire” to provide cryptographic assurance of

4、 cyber security properties. It does not address specific applications or hardware implementations and is largely independent of the underlying communications channel and application or SCADA protocol. The requirements of this standard are in addition to any requirements contained in standards for in

5、dividual devices in which this protocol is implemented. SSPP operates by encapsulating each SCADA or application message in a cryptographic envelope that adds minimal overhead to the message. This encapsulation is performed in a manner that is largely independent of the underlying communications pro

6、tocol. While SSPP was originally designed to protect serial SCADA communications, its domain of application is not limited to SCADA. SSPP can also be used to protect other types of serial communications, such as data concentrator links, load management links, dial-in revenue meter reading, dial-in m

7、aintenance connections, etc. SSPP is designed for systems or applications in the following circumstances: Traffic is message-oriented, with messages consisting of contiguous sequences of 7-bit or 8-bit characters, in lengths ranging from a few characters to a few hundred characters. The communicatio

8、ns channel may be either half-duplex or full-duplex. Messages are never reordered by the communications channel. Messages are never fragmented by the communications channel. The communications topology is point-to-point, point-to-multipoint, or broadcast. For point-to-multipoint topologies, messages

9、 include an identifying address of the receiver in the header of the message. Transmission speeds may be slow enough that cryptographic protocol overhead in the form of too many additional header, trailer, or framing characters may significantly impact message latency and roundtrip message delivery

10、times. Message integrity is critical to reliable system operation, and system operation may be adversely impacted if messages are modified, forged, spliced, reordered, or replayed. The system or application is able to tolerate lost messages. SSPP assures message integrity by detecting modified, forg

11、ed, spliced, reordered, or replayed messages and discarding them. Applications such as SCADA systems are designed to accommodate accidental communications errors and, through timeouts, detects and retries lost or damaged messages. Such applications thereby recover from messages discarded by SSPP in

12、the same way as they recover from messages lost or damaged by communications errors. Applications such as dial-in remote maintenance involve a live operator who can reissue commands whose action or response is discarded by SSPP. SSPP is designed to support point-to-point links, point-to-multi-point

13、(or multi-drop) links, and broadcast links. For multi-drop links and broadcast links, SSPP supports mixed-mode operation, where some of the stations use SSPP to achieve protected communications, and other stations communicate in the clear. Mixed-mode operation allows for phased or incremental deploy

14、ment of devices providing SSPP protection so that all stations on a multi-drop or broadcast link do not have to be upgraded simultaneously. SSPP protection can be deployed at the master station first, then incrementally added to slave stations as needed. v Copyright 2011 IEEE. All rights reserved. S

15、SPP may be implemented in standalone security devices, integrated in communications modems, or embedded in applications or systems. When implemented in standalone bump-in-the-wire security devices, SSPP may be used to retrofit protection of legacy serial systems with little or no modification of exi

16、sting systems and equipment. Figure a illustrates a typical deployment of SSPP implemented with a multi-channel Ethernet-to-Serial SSPP gateway in the control center and SSPP bump-in-the-wire (BITW) devices in the substations. Figure aRetrofit bump-in-the-wire SSPP deployment Key management for the

17、long-term cryptographic keys used by SSPP is specifically not addressed in this standard. Key management is a complex issue, and including key management would significantly increase the size and complexity of the standard. But more significantly, key management for SSPP keys is not markedly differe

18、nt from key management for other cryptographic systems. Including a specific mechanism for key management in SSPP could preclude integration with existing commercial key management systems and inhibit adoption of SSPP in products. It is expected that key management systems for SSPP keys follow good

19、security practices, and the quality, flexibility, and usability of such systems should be evaluated by prospective purchasers of SSPP implementations. Goals This standard has several goals. Designing cryptographic algorithms and protocols that operate correctly and are free of undiscovered flaws is

20、difficult at best. There is general agreement in the cryptography community that openly published and time-tested cryptographic algorithms and protocols are less likely to contain security flaws than secretly developed ones because their publication enables scrutiny by the entire community. Historic

21、ally, proprietary and secret protocols have frequently been found to contain flaws when their designs become public. However, well-known and time-tested protocols such as TLS and SSH that are designed for high-speed IP networks add too much overhead when used on slow serial communications links. The

22、re are no suitable cryptographic protocols for protecting the integrity of asynchronous serial communications of a SCADA-like nature. By defining such a protocol that can be used with a wide variety of systems and vi Copyright 2011 IEEE. All rights reserved. application protocols, this standard aims

23、 to help manufacturers build secure systems, products, and applications, and avoid the pitfalls of proprietary and secret cryptographic designs. By utilizing a common framework, different implementations of this protocol built by different vendors may be able to interoperate. Adherence to this stand

24、ard is by no means a guarantee of interoperability, but this standard does provide a significant step toward interoperable implementations. Interoperability can foster competition and lead to more and better choices for end users. Interoperability can also simplify merging diverse operational infras

25、tructures, such as can occur when two utilities merge. Finally, interoperability can provide opportunities for alternative support or migration from one vendors equipment to another. Systems operators may use this specification in procurement requirements to gain some assurance that products are wel

26、l-designed and secure. Without a specification of this nature, most utilities do not have the expertise to evaluate cryptographic designs. Security and control systems manufacturers will build products only if they perceive a viable market. This standard has the potential to create a market for seri

27、al communications protection products. Notice to users Laws and regulations Users of these documents should consult all applicable laws and regulations. Compliance with the provisions of this standard does not imply compliance to any applicable regulatory requirements. Implementers of the standard a

28、re responsible for observing or referring to the applicable regulatory requirements. IEEE does not, by the publication of its standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so. Copyrights This document is copyrighted

29、 by the IEEE. It is made available for a wide variety of both public and private uses. These include both use, by reference, in laws and regulations, and use in private self-regulation, standardization, and the promotion of engineering practices and methods. By making this document available for use

30、 and adoption by public authorities and private users, the IEEE does not waive any rights in copyright to this document. Updating of IEEE documents Users of IEEE standards should be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time t

31、o time through the issuance of amendments, corrigenda, or errata. An official IEEE document at any point in time consists of the current edition of the document together with any amendments, corrigenda, or errata then in effect. In order to determine whether a given document is the current edition a

32、nd whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE Standards Association web site at http:/ieeexplore.ieee.org/xpl/standards.jsp, or contact the IEEE at the address listed previously. For more information about the IEEE Standards Association or t

33、he IEEE standards development process, visit the IEEE-SA web site at http:/standards.ieee.org. vii Copyright 2011 IEEE. All rights reserved. Errata Errata, if any, for this and all other standards can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/updates/errata/index.html.

34、Users are encouraged to check this URL for errata periodically. Interpretations Current interpretations can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/interp/ index.html. Patents Attention is called to the possibility that implementation of this trial-use standard may re

35、quire use of subject matter covered by patent rights. By publication of this trial-use standard, no position is taken with respect to the existence or validity of any patent rights in connection therewith. The IEEE is not responsible for identifying Essential Patent Claims for which a license may be

36、 required, for conducting inquiries into the legal validity or scope of Patents Claims or determining whether any licensing terms or conditions provided in connection with submission of a Letter of Assurance, if any, or in any licensing agreements are reasonable or non-discriminatory. Users of this

37、trial-use standard are expressly advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is entirely their own responsibility. Further information may be obtained from the IEEE Standards Association. Trial use Publication of this trial-use standa

38、rd for comment and criticism has been approved by the Institute of Electrical and Electronics Engineers. Trial-use standards are effective for 24 months from the date of publication. Comments for revision will be accepted for 18 months after publication. Suggestions for revision should be directed t

39、o the Secretary, IEEE-SA Standards Board, 445 Hoes Lane, Piscataway, NJ 08854, and should be received no later than 15 August 2012. It is expected that following the 24-month period, this trial-use standard, revised as necessary, shall be submitted to the IEEE-SA Standards Board for approval as a fu

40、ll-use standard. viii Copyright 2011 IEEE. All rights reserved. Participants At the time this trial-use standard was submitted to the IEEE-SA Standards Board for approval, the Cryptographic Protocol for Cyber Security of Substation Serial Links Working Group had the following membership: David White

41、head, Chair Andrew Wright, Vice Chair Mason Clark Mike Dood Dennis Holstein Marc Lacroix Craig Preuss Sam Sciacca Lee Smith John Tengdin Tim TibbalsThe following members of the individual balloting committee voted on this trial-use standard. Balloters may have voted for approval, disapproval, or abs

42、tention. William J. Ackerman Terrence Burns Arvind K. Chaudhary Stephen Conrad Ratan Das Gary Donner Michael Dood Randall Dotson Neal Dowling Sourav Dutta Gary Engmann Kenneth Fodero Frank Gerleve Grant Gilchrist Ron Greenthaler Randall Groves Adolfo Gutierrez David Harris John Hawkins Gary Heuston

43、Dennis Holstein C. Huntley R. Jackson Piotr Karocki Yuri Khersonsky J. Koepfinger Jim Kulchisky Marc Lacroix Chung-Yiu Lam John McDonald Jerry Murphy R. Murphy Bruce Muschlitz Michael S. Newman Nick S. A. Nikjoo Satoshi Obara Chris Osterloh Craig Preuss Jose Puthenkulam Michael Roberts Charles Roger

44、s Anne-Marie Sahazizian Miriam Sanders Steven Sano Bartien Sayogo Samuel Sciacca Hamidreza Sharifnia Devki Sharma Gil Shultz Mark Simon James Smith Gary Stoedter Walter Struppler Michael Swearingen William Taylor John Tengdin David Tepen Joe Uchiyama Eric Udren John Vergis Ilia Voloh David Whitehead

45、 Andrew Wright ix Copyright 2011 IEEE. All rights reserved. When the IEEE-SA Standards Board approved this trial-use standard on 9 November 2010, it had the following membership: Robert M. Grow, Chair Richard H. Hulett, Vice Chair Steve M. Mills, Past Chair Judith Gorman, Secretary Karen Bartleson V

46、ictor Berman Ted Burse Clint Chaplin Andy Drozd Alexander Gelman Jim Hughes Young Kyun Kim Joseph L. Koepfinger* John Kulick David J. Law Hung Ling Oleg Logvinov Ted Olsen Ronald C. Petersen Thomas Prevost Jon Walter Rosdahl Sam Sciacca Mike Seavey Curtis Siller Don Wright *Member Emeritus Also incl

47、uded are the following nonvoting IEEE-SA Standards Board liaisons: Satish Aggarwal, NRC Representative Richard DeBlasio, DOE Representative Michael Janezic, NIST Representative Julie Alessi IEEE Standards Program Manager, Document Development Soo H. Kim IEEE Standards Program Manager, Technical Prog

48、ram Development x Copyright 2011 IEEE. All rights reserved. Contents 1. Overview 1 1.1 Scope . 1 1.2 Purpose 1 2. Normative references 2 3. Definitions, acronyms, and abbreviations 2 3.1 Definitions . 2 3.2 Acronyms and abbreviations . 3 4. Substation Serial Protection Protocol (SSPP) . 4 4.1 Protoc

49、ol overview 4 4.2 SSPP organizational layers 6 4.3 Octet order in SSPP messages . 6 4.4 Session layer 6 4.5 Transport layer . 17 4.6 Link layer . 18 4.7 Cipher suites 23 4.8 SSPP management messages . 28 Annex A (informative) Background . 30 A.1 Overview 30 Annex B (informative) Implementation considerations . 31 B.1 Link layer mixed-mode operation . 31 B.2 Hardware handshaking 31 B.3 Dialup modem interaction . 33 B.4 Timing consideration for shared connections . 34 B.5 Design consideration for cipher suites 35 B.6 Side channel design considerations .

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1