{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T04:01:59Z","timestamp":1730088119013,"version":"3.28.0"},"reference-count":43,"publisher":"Walter de Gruyter GmbH","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["GRK 2182"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,26]]},"abstract":"Abstract<\/jats:title>The digitalization of substations leads to a high degree of automation, which is referred to as Digital Substations with the use of the IEC 61850. An increase in cybersecurity is necessary, and technically enabled by detection and incident response systems \u2013 security-by-design is currently often secondary. The next transformation step of substations is introduced and outlined in this paper as a cyber-resilient digital substation. Based on a state-of-the-art description, this paper presents a definition of cyber resilience for digital substations as a basis for the introduced cyber resilience monitor. The monitor acts as a central instance for recording, assessing and responding to security threats and incidents. Furthermore, the requirements for the system structure of the cyber-resilient digital substation are shown and underpinned with current research approaches.<\/jats:p>","DOI":"10.1515\/auto-2023-0075","type":"journal-article","created":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T10:42:19Z","timestamp":1694169739000},"page":"789-801","source":"Crossref","is-referenced-by-count":0,"title":["Transformation in substation automation: Cyber-Resilient Digital Substations (CyReDS) in power grids"],"prefix":"10.1515","volume":"71","author":[{"given":"Dennis","family":"R\u00f6sch","sequence":"first","affiliation":[{"name":"Fraunhofer IOSB, IOSB-AST , Ilmenau , Germany"}]},{"given":"Thomas","family":"Bauer","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, IOSB-AST , Ilmenau , Germany"}]},{"given":"Andr\u00e9","family":"Kummerow","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, IOSB-AST , Ilmenau , Germany"}]},{"given":"Marcel","family":"K\u00fchne","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, IOSB-AST , Ilmenau , Germany"}]},{"given":"Steffen","family":"Nicolai","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, IOSB-AST , Ilmenau , Germany"}]},{"given":"Peter","family":"Bretschneider","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, IOSB-AST , Ilmenau , Germany"}]}],"member":"374","published-online":{"date-parts":[[2023,9,8]]},"reference":[{"key":"2023120702422586705_j_auto-2023-0075_ref_001","doi-asserted-by":"crossref","unstructured":"S. Ruhe, S. Nicolai, T. Jiang, et al., \u201cApproach of a Digital Twin based automatic grid operation for distribution grids,\u201d in ETG Congress 2021, VDE, 2021, pp. 1\u20136.","DOI":"10.1109\/UPEC55022.2022.9917713"},{"key":"2023120702422586705_j_auto-2023-0075_ref_002","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Die Lage der IT-Sicherheit in Deutschland 2022, Bonn, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), 2022."},{"key":"2023120702422586705_j_auto-2023-0075_ref_003","doi-asserted-by":"crossref","unstructured":"A. Zaballos, A. Vallejo, and J. Selga, \u201cHeterogeneous communication architecture for the smart grid,\u201d IEEE Network, vol.\u00a025, no.\u00a05, pp.\u00a030\u201337, 2011. https:\/\/doi.org\/10.1109\/MNET.2011.6033033.","DOI":"10.1109\/MNET.2011.6033033"},{"key":"2023120702422586705_j_auto-2023-0075_ref_004","doi-asserted-by":"crossref","unstructured":"M. Vadiati, M. Basirifar, and B. Shahbazi, \u201cFuture trends in smart grid by applying digital modern substations,\u201d in 2011 IEEE PES Innovative Smart Grid Technologies, Perth, WA, 2011, pp.\u00a01\u20136.","DOI":"10.1109\/ISGT-Asia.2011.6167109"},{"key":"2023120702422586705_j_auto-2023-0075_ref_005","unstructured":"DIN EN 61850 Beiblatt 1:2006-10, Kommunikationsnetze und -systeme in Stationen_- Beiblatt_1: Einf\u00fchrung und \u00dcbersicht (IEC\/TR_61850-1:2003), Berlin, Beuth Verlag, 2006."},{"key":"2023120702422586705_j_auto-2023-0075_ref_006","doi-asserted-by":"crossref","unstructured":"D. R\u00f6sch, A. Kummerow, S. Ruhe, K. Sch\u00e4fer, C. Monsalve, and S. Nicolai, \u201cIT-Sicherheit in digitalen Stationen: cyber-physische Systemmodellierung, -bewertung und -analyse,\u201d at \u2013 Automatisierungstechnik, vol.\u00a068, no.\u00a09, pp.\u00a0720\u2013737, 2020. https:\/\/doi.org\/10.1515\/auto-2020-0077.","DOI":"10.1515\/auto-2020-0077"},{"key":"2023120702422586705_j_auto-2023-0075_ref_007","doi-asserted-by":"crossref","unstructured":"A. Salvi, P. Spagnoletti, and N. S. Noori, \u201cCyber-resilience of Critical Cyber Infrastructures: integrating digital twins in the electric power ecosystem,\u201d Comput. Secur., vol.\u00a0112, p.\u00a0102507, 2022. https:\/\/doi.org\/10.1016\/j.cose.2021.102507.","DOI":"10.1016\/j.cose.2021.102507"},{"key":"2023120702422586705_j_auto-2023-0075_ref_008","doi-asserted-by":"crossref","unstructured":"F. Patzer, P. L\u00fcdtke, A. Meshram, and J. Beyerer, \u201cContext-aware software-defined networking for automated incident response in industrial networks,\u201d in Communications in Computer and Information Science, Information Systems Security and Privacy (CCIS), P. Mori, S. Furnell, and O. Camp, Eds., Cham, Springer International Publishing, 2020, pp. 137\u2013161.","DOI":"10.1007\/978-3-030-49443-8_7"},{"key":"2023120702422586705_j_auto-2023-0075_ref_009","doi-asserted-by":"crossref","unstructured":"A. Leal and J. F. Botero, \u201cDefining a reliable network topology in software-defined power substations,\u201d IEEE Access, vol.\u00a07, pp.\u00a014323\u201314339, 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2893114.","DOI":"10.1109\/ACCESS.2019.2893114"},{"key":"2023120702422586705_j_auto-2023-0075_ref_010","doi-asserted-by":"crossref","unstructured":"J. F. Botero and A. Leal, \u201cAn architecture for power substations communication networks based on SDN and virtualization paradigms,\u201d Rev. Fac. Ing., Univ. Antioquia, vol. 100, pp. 48\u201366, 2021. https:\/\/doi.org\/10.17533\/udea.redin.20210321.","DOI":"10.17533\/udea.redin.20210321"},{"key":"2023120702422586705_j_auto-2023-0075_ref_011","doi-asserted-by":"crossref","unstructured":"H. Maziku and S. Shetty, \u201cSoftware Defined Networking enabled resilience for IEC 61850-based substation communication systems,\u201d in 2017 International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA, 2017, pp.\u00a0690\u2013694.","DOI":"10.1109\/ICCNC.2017.7876213"},{"key":"2023120702422586705_j_auto-2023-0075_ref_012","doi-asserted-by":"crossref","unstructured":"X. Dong, H. Lin, R. Tan, R. K. Iyer, and Z. Kalbarczyk, \u201cSoftware-defined networking for smart grid resilience,\u201d in Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, Singapore, Republic of Singapore, 2015, pp.\u00a061\u201368.","DOI":"10.1145\/2732198.2732203"},{"key":"2023120702422586705_j_auto-2023-0075_ref_013","doi-asserted-by":"crossref","unstructured":"O. Pospisil, P. Blazek, R. Fujdiak, and J. Misurec, \u201cActive scanning in the industrial control systems,\u201d in 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC), Rome, Italy, 2021, pp.\u00a0227\u2013232.","DOI":"10.1109\/ISCSIC54682.2021.00049"},{"key":"2023120702422586705_j_auto-2023-0075_ref_014","doi-asserted-by":"crossref","unstructured":"A. Kummerow, C. Monsalve, D. R\u00f6sch, K. Sch\u00e4fer, and S. Nicolai, \u201cCyber-physical data stream assessment incorporating Digital Twins in future power systems,\u201d in 2020 International Conference on Smart Energy Systems and Technologies (SEST), Istanbul, Turkey, 2020, pp.\u00a01\u20136.","DOI":"10.1109\/SEST48500.2020.9203270"},{"key":"2023120702422586705_j_auto-2023-0075_ref_015","doi-asserted-by":"crossref","unstructured":"D. R\u00f6sch, S. Ruhe, K. Sch\u00e4fer, and S. Nicolai, \u201cLocal anomaly detection analysis in distribution grid based on IEC 61850-9-2 LE SV voltage signals,\u201d in 2019 International Conference on Smart Energy Systems and Technologies (SEST), Porto, Portugal, 2019, pp.\u00a01\u20136.","DOI":"10.1109\/SEST.2019.8849139"},{"key":"2023120702422586705_j_auto-2023-0075_ref_016","doi-asserted-by":"crossref","unstructured":"J. Hong, C.-C. Liu, and M. Govindarasu, \u201cDetection of cyber intrusions using network-based multicast messages for substation automation,\u201d in ISGT 2014, Washington, DC, USA, 2014, pp.\u00a01\u20135.","DOI":"10.1109\/ISGT.2014.6816375"},{"key":"2023120702422586705_j_auto-2023-0075_ref_017","doi-asserted-by":"crossref","unstructured":"A. Kummerow, K. Sch\u00e4fer, P. Gupta, S. Nicolai, and P. Bretschneider, \u201cCombined network intrusion and phasor data anomaly detection for secure dynamic control centers,\u201d Energies, vol.\u00a015, no.\u00a09, p.\u00a03455, 2022. https:\/\/doi.org\/10.3390\/en15093455.","DOI":"10.3390\/en15093455"},{"key":"2023120702422586705_j_auto-2023-0075_ref_018","doi-asserted-by":"crossref","unstructured":"H. C. Tan, C. Cheh, B. Chen, and D. Mashima, \u201cTabulating cybersecurity solutions for substations: towards pragmatic design and planning,\u201d in 2019 IEEE Innovative Smart Grid Technologies \u2013 Asia (ISGT Asia), Chengdu, China, 2019, pp.\u00a01018\u20131023.","DOI":"10.1109\/ISGT-Asia.2019.8881706"},{"key":"2023120702422586705_j_auto-2023-0075_ref_019","doi-asserted-by":"crossref","unstructured":"A. F. Murillo Piedrahita, V. Gaur, J. Giraldo, A. A. Cardenas, and S. J. Rueda, \u201cLeveraging software-defined networking for incident response in industrial control systems,\u201d IEEE Softw., vol.\u00a035, no.\u00a01, pp.\u00a044\u201350, 2018. https:\/\/doi.org\/10.1109\/MS.2017.4541054.","DOI":"10.1109\/MS.2017.4541054"},{"key":"2023120702422586705_j_auto-2023-0075_ref_020","unstructured":"C. Edwards, Resilient Nation, London, Demos, 2009."},{"key":"2023120702422586705_j_auto-2023-0075_ref_021","unstructured":"K. Thoma, Resilien-Tech: Resilience-By-Design: Strategie F\u00fcr Die Technologischen Zukunftsthemen, M\u00fcnchen, Herbert Utz Verlag, 2014."},{"key":"2023120702422586705_j_auto-2023-0075_ref_022","doi-asserted-by":"crossref","unstructured":"K. Thoma, B. Scharte, D. Hiller, and T. Leismann, \u201cResilience engineering as part of security research: definitions, concepts and science approaches,\u201d Eur. J. Secur. Res., vol.\u00a01, no.\u00a01, pp.\u00a03\u201319, 2016. https:\/\/doi.org\/10.1007\/s41125-016-0002-4.","DOI":"10.1007\/s41125-016-0002-4"},{"key":"2023120702422586705_j_auto-2023-0075_ref_023","doi-asserted-by":"crossref","unstructured":"M. Bruneau, S. E. Chang, R. T. Eguchi, et al., \u201cA framework to quantitatively assess and enhance the seismic resilience of communities,\u201d Earthq. Spectra, vol. 19, no. 4, pp. 733\u2013752, 2003. https:\/\/doi.org\/10.1193\/1.1623497.","DOI":"10.1193\/1.1623497"},{"key":"2023120702422586705_j_auto-2023-0075_ref_024","unstructured":"ENISA, Measurement Frameworks and Metrics for Resilient Networks and Services: Challenges and Recommendations, Heraklion, European Network and Information Security Agency (ENISA), 2010."},{"key":"2023120702422586705_j_auto-2023-0075_ref_025","doi-asserted-by":"crossref","unstructured":"R. Ross, V. Pillitteri, R. Graubart, D. Bodeau, and R. McQuaid, Developing Cyber-Resilient Systems, Gaithersburg, MD, National Institute of Standards and Technology (NIST), 2021.","DOI":"10.6028\/NIST.SP.800-160v2r1"},{"key":"2023120702422586705_j_auto-2023-0075_ref_026","doi-asserted-by":"crossref","unstructured":"I. Linkov, D. A. Eisenberg, K. Plourde, T. P. Seager, J. Allen, and A. Kott, \u201cResilience metrics for cyber systems,\u201d Environ. Syst. Decis., vol.\u00a033, no.\u00a04, pp.\u00a0471\u2013476, 2013. https:\/\/doi.org\/10.1007\/s10669-013-9485-y.","DOI":"10.1007\/s10669-013-9485-y"},{"key":"2023120702422586705_j_auto-2023-0075_ref_027","unstructured":"D. Bodeau, R. Graubart, J. Picciotto, and R. McQuaid, Cyber Resiliency Engineering Framework, Bedford, The MITRE Corporation, 2011."},{"key":"2023120702422586705_j_auto-2023-0075_ref_028","doi-asserted-by":"crossref","unstructured":"M. A. Haque, G. K. de Teyou, S. Shetty, and B. Krishnappa, \u201cCyber resilience framework for industrial control systems: concepts, metrics, and insights,\u201d in IEEE International Conference on Intelligence and Security Informatics [Online], Miami, FL, Florida International University, 2018. Available at: http:\/\/ieeexplore.ieee.org\/servlet\/opac?punumber=8575039.","DOI":"10.1109\/ISI.2018.8587398"},{"key":"2023120702422586705_j_auto-2023-0075_ref_029","doi-asserted-by":"crossref","unstructured":"D. R\u00f6sch, S. Nicolai, and P. Bretschneider, \u201cContainer-based virtualization of an IEC 61850 substation Co-simulation approach,\u201d in 2022 10th Workshop on Modelling and Simulation of Cyber-Physical Energy Systems (MSCPES), Milan, Italy, 2022, pp.\u00a01\u20136.","DOI":"10.1109\/MSCPES55116.2022.9770163"},{"key":"2023120702422586705_j_auto-2023-0075_ref_030","doi-asserted-by":"crossref","unstructured":"D. R\u00f6sch, S. Nicolai, and P. Bretschneider, \u201cCombined simulation and virtualization approach for interconnected substation automation,\u201d in 2021 6th International Conference on Smart and Sustainable Technologies (SpliTech), Bol and Split, Croatia, 2021, pp.\u00a01\u20136.","DOI":"10.23919\/SpliTech52315.2021.9566380"},{"key":"2023120702422586705_j_auto-2023-0075_ref_031","doi-asserted-by":"crossref","unstructured":"R. Wojtowicz, R. Kowalik, and D. D. Rasolomampionona, \u201cNext generation of power system protection automation\u2014virtualization of protection systems,\u201d IEEE Trans. Power Delivery, vol.\u00a033, no.\u00a04, pp.\u00a02002\u20132010, 2018. https:\/\/doi.org\/10.1109\/TPWRD.2017.2786339.","DOI":"10.1109\/TPWRD.2017.2786339"},{"key":"2023120702422586705_j_auto-2023-0075_ref_032","doi-asserted-by":"crossref","unstructured":"R. Wojtowicz, R. Kowalik, D. D. Rasolomampionona, and K. Kurek, \u201cVirtualization of protection systems \u2013 tests performed on a large environment based on data center solutions,\u201d IEEE Trans. Power Delivery, vol.\u00a037, no.\u00a04, pp.\u00a03401\u20133411, 2022. https:\/\/doi.org\/10.1109\/TPWRD.2021.3128993.","DOI":"10.1109\/TPWRD.2021.3128993"},{"key":"2023120702422586705_j_auto-2023-0075_ref_033","doi-asserted-by":"crossref","unstructured":"Working Group on Centralized Substation Protection and Control, IEEE Power System Relaying Committee, \u201cAdvancements in centralized protection and control within a substation,\u201d IEEE Trans. Power Delivery, vol.\u00a031, no.\u00a04, pp.\u00a01945\u20131952, 2016. https:\/\/doi.org\/10.1109\/TPWRD.2016.2528958.","DOI":"10.1109\/TPWRD.2016.2528958"},{"key":"2023120702422586705_j_auto-2023-0075_ref_034","doi-asserted-by":"crossref","unstructured":"N. Kabbara, M. O Nait Belaid, M Gibescu, et al.., \u201cTowards software-defined protection, automation, and control in power systems: concepts, state of the art, and future challenges,\u201d Energies, vol.\u00a015, no.\u00a024, p.\u00a09362, 2022. https:\/\/doi.org\/10.3390\/en15249362.","DOI":"10.3390\/en15249362"},{"key":"2023120702422586705_j_auto-2023-0075_ref_035","unstructured":"Henry Niveri (ABB), Virtualization and Grid Stability, 2023 [Online]. Available at: https:\/\/search.abb.com\/library\/Download.aspx?DocumentID=9AKK108468A0774&LanguageCode=en&DocumentPartId=&Action=Launch"},{"key":"2023120702422586705_j_auto-2023-0075_ref_036","unstructured":"ABB, Case Study: Winds of Change \u2013 Acciona Energia Takes the Next Step in Power System Reliability and Operational Efficiency [Online], 2023. Available at: https:\/\/library.e.abb.com\/public\/5afbe16adfd94ca486577d38bef0e009\/Acciona_Energia_case_study_2NGA001502_ENa.pdf?x-sign=3US6A7Hd2zbEv8EVYJMNZ7f0TuSuQ3X8e7GT8iWqaBn2ZvbGKYvXLVwMCAzPl9Sy."},{"key":"2023120702422586705_j_auto-2023-0075_ref_037","doi-asserted-by":"crossref","unstructured":"J. Velasquez, C. Kr\u00fcger, D. Babazadeh, et al., \u201cFlexible and reconfigurable automation architecture for electrical power systems,\u201d in 2019 IEEE Milan PowerTech, Milan, Italy, IEEE, 2019, pp. 1\u20136.","DOI":"10.1109\/PTC.2019.8810822"},{"key":"2023120702422586705_j_auto-2023-0075_ref_038","doi-asserted-by":"crossref","unstructured":"D. R\u00f6sch, T. Bauer, S. Nicolai, and P. Bretschneider, \u201cDelay modeling for virtualization-based Co-simulation of IEC 61850 substations,\u201d J. Cleaner Prod., vol.\u00a0368, p.\u00a0133179, 2022. https:\/\/doi.org\/10.1016\/j.jclepro.2022.133179.","DOI":"10.1016\/j.jclepro.2022.133179"},{"key":"2023120702422586705_j_auto-2023-0075_ref_039","doi-asserted-by":"crossref","unstructured":"U. Gentile and L. Serio, \u201cSurvey on international standards and best practices for patch management of complex industrial control systems: the critical infrastructure of particle accelerators case study,\u201d IJCCBS, vol.\u00a09, nos. 1\/2, p.\u00a0115, 2019. https:\/\/doi.org\/10.1504\/IJCCBS.2019.098812.","DOI":"10.1504\/IJCCBS.2019.098812"},{"key":"2023120702422586705_j_auto-2023-0075_ref_040","doi-asserted-by":"crossref","unstructured":"H. Kanamaru, \u201cRequirements for IT\/OT cooperation in safe and secure IACS,\u201d in 2020 59th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), Chiang Mai, Thailand, 2020, pp.\u00a039\u201344.","DOI":"10.23919\/SICE48898.2020.9240295"},{"key":"2023120702422586705_j_auto-2023-0075_ref_041","doi-asserted-by":"crossref","unstructured":"N. Dissanayake, A. Jayatilaka, M. Zahedi, and M. A. Babar, \u201cSoftware security patch management \u2013 a systematic literature review of challenges, approaches, tools and practices,\u201d Inf. Softw. Technol., vol.\u00a0144, p.\u00a0106771, 2022. https:\/\/doi.org\/10.1016\/j.infsof.2021.106771.","DOI":"10.1016\/j.infsof.2021.106771"},{"key":"2023120702422586705_j_auto-2023-0075_ref_042","doi-asserted-by":"crossref","unstructured":"A. Wedgbury and K. Jones, \u201cAutomated asset discovery in industrial control systems \u2013 exploring the problem,\u201d in Ingolstadt, Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, British Computer Society, 2015.","DOI":"10.14236\/ewic\/ICS2015.8"},{"key":"2023120702422586705_j_auto-2023-0075_ref_043","doi-asserted-by":"crossref","unstructured":"Z. Jadidi and Y. Lu, \u201cA threat hunting framework for industrial control systems,\u201d IEEE Access, vol.\u00a09, pp.\u00a0164118\u2013164130, 2021. https:\/\/doi.org\/10.1109\/ACCESS.2021.3133260.","DOI":"10.1109\/ACCESS.2021.3133260"}],"container-title":["at - Automatisierungstechnik"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2023-0075\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2023-0075\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T19:27:31Z","timestamp":1730057251000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2023-0075\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":43,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9,8]]},"published-print":{"date-parts":[[2023,9,26]]}},"alternative-id":["10.1515\/auto-2023-0075"],"URL":"https:\/\/doi.org\/10.1515\/auto-2023-0075","relation":{},"ISSN":["0178-2312","2196-677X"],"issn-type":[{"type":"print","value":"0178-2312"},{"type":"electronic","value":"2196-677X"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}