What is Secure GOOSE & Sampled Values?
GOOSE is a mechanism for transmitting time-critical information, such as alarms or status changes, between intelligent electronic devices (IEDs) in a substation. Sampled Values provides synchronized sampling and transmission of analog data, such as voltage and current, from sensors to protection and control devices in substations. Securing GOOSE and Sampled Values refers to the implementation of enhanced security measures in the transmission of real-time events and analog measurements throughout the power system, namely authentication and optionally encryption:
When using KDC, each GDOI (Group Domain of Interpretation as defined in RFC-6407) has one publisher and one or more subscribers. The KDC Server is responsible for assigning cryptographic keys to each GDOI and sending them to each KDC Client, which then matches the GDOIs to the correct publisher or subscriber stream on the device.
Authentication (mandatory for routable versions) - GOOSE and Sampled Values are authenticated by utilizing HMAC to validate that the messages were signed with the key supplied by the KDC Server, this verifies that the message was not corrupted in transit.
Encryption (optional) - Implement encryption to protect the confidentiality of the data transmitted. Encryption ensures that unauthorized parties cannot decipher the content of the messages.
Why do I need to Secure GOOSE & Sampled Values?
- Confidentiality of Data:
- Integrity Assurance:
- Perfect Forward Secrecy :
- Use Case: Breaking the key for one set of key pulls does not provide key materials that allow you to break future exchanges since key exchanges are protected via Diffie-Hellman Exchanges.
- Information Isolation:
- Use Case: Each group consisting of a publisher and its subscribers has its own set of keys and policies therefore compromising one group does not compromise the other groups.
- Secure Communication in Shared Networks:
- Use Case: Ensure confidentiality in shared network environments with non-critical systems or external entities.
- Compliance with Security Standards:
- Use Case: Meet industry standards and regulations for power system security.
- Prevention of Man-in-the-Middle Attacks:
- Use Case: Guard against unauthorized interception and alteration of communication.
- Maintaining Data Integrity in Wide-Area Networks:
- Use Case: Secure communication over extended distances to ensure data integrity.
- Protection Against Insider Threats:
- Use Case: Mitigate risks associated with malicious actions from within the organization.
- Ensuring System Resilience:
- Use Case: Enhance infrastructure resilience against cyber threats for continuous and reliable power grid operation.