Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (10): 22-30.doi: 10.11959/j.issn.2096-109x.2018080

• Papers • Previous Articles     Next Articles

Security test of 101 protocol of FTU

Yong WANG1,Xiang WANG1,Wenting HE2,Yuhao ZHOU3,Yufan CAI1   

  1. 1 Department of Information Security,Shanghai University of Electric Power,Shanghai 200090,China
    2 Huaneng Shanghai Shidongkou Second Power Plant,Huaneng Shanghgai Shidongkou Power Genertation CO.,LTD.,Shanghai 200942,China
    3 National Energy Distributed Energy Technology Research and Development (experimental) Center,Huadian Electric Power Research Institute Co.,LTD.,Hangzhou 310030,China
  • Revised:2018-09-08 Online:2018-10-01 Published:2018-12-15
  • Supported by:
    The National Natural Science Foundation of China(61772327);Shanghai Natural Science Foundation(16ZR1436300);Zhejiang University State Key Laboratory of Industrial Control Technology Open Fund(ICT1800380);Smart Grid Industry-University Research and Development Center Project of Shanghai University of Electric Power(A-0009-17-002-05);Project of Shanghai Science and Technology Committee under Grant(15110500700)


The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.

Key words: FTU, 101 protocol, man-in-the-middle attack, ARP spoofing

CLC Number: 

No Suggested Reading articles found!