Cyber Security for IEC Protocols Series Part 2

Written by Michael Zillgith

18. March 2026

Securing IEC 60870-5-101 and IEC 60870-5-104

A Technical Exploration of Threats, Countermeasures, and IEC 62351-5 Implementation for Telecontrol Protocols

Abstract

IEC 60870-5-101 and IEC 60870-5-104 are foundational telecontrol protocols used extensively in power system SCADA environments. Originally designed in an era with limited cybersecurity awareness, these protocols rely on open serial and IP-based communication, making them highly susceptible to a range of cyber threats including message injection, spoofing, replay, and denial-of-service (DoS) attacks.

This article provides a comprehensive examination of the cybersecurity challenges associated with IEC 60870-5-101 and 104. It delves into the structure and operation of both protocols, outlines their inherent vulnerabilities, and introduces the security architecture defined in IEC 62351-5. We explore the cryptographic mechanisms, authentication models, replay protection, implementation recommendations, and performance considerations in depth, offering practical recommendations for enhancing protocol-level security in real-world SCADA systems.

Introduction

In many national and regional grid infrastructures, IEC 60870-5-101 (serial) and IEC 60870-5-104 (TCP/IP) continue to serve as critical communication standards for telemetry and remote control. Their longevity, simplicity, and interoperability have made them a favored choice in Europe, Asia, and parts of the Middle East.

However, this operational ubiquity has also become a cybersecurity liability. Neither protocol was designed with built-in security—no encryption, no authentication, and no integrity checks. This lack of protection enables attackers with access to the network (or even to serial lines in substations) to intercept or manipulate traffic, falsify commands, or disrupt operations.

To address these gaps, IEC 62351-5 was created as a security extension primarily targeting the IEC 60870-5-101/104 protocol family, but its mechanisms have also been adopted by other protocols, most notably DNP3, which references it and provides protocol-specific adaptations for secure authentication. It defines mechanisms for ensuring message integrity, origin authentication, and optional confidentiality features. These enhancements are designed to be retrofitted into existing deployments or natively supported by compliant devices.

Protocol Overview and Security Deficiencies

IEC 60870-5-101: Serial Telecontrol Communication

IEC 60870-5-101 operates over serial links (RS-232, RS-485), using a structured frame format for transmitting process information such as analog values, binary inputs, and control commands. While reliable in isolated environments, it lacks any mechanism for:

  • Detecting modification or tampering
  • Preventing eavesdropping
  • Defending against replay or injection

Attackers with physical access to cabling or serial terminal servers can inject control commands, disrupt remote terminal unit (RTU) responses, or spoof legitimate devices.

IEC 60870-5-104: TCP/IP-Based Communication

IEC 60870-5-104 transports the same Application Protocol Data Units (APDUs) over TCP/IP, enabling wide-area communication via Ethernet and IP networks. This increases exposure to modern cyberattack techniques such as:

  • Man-in-the-Middle (MITM) attacks via ARP spoofing or DNS hijacking
  • TCP session hijacking or injection
  • Reconnaissance and fingerprinting of RTUs and master stations
  • Unencrypted credentials for user-level authentication in some extensions

Without encryption or message-level protection, all traffic, including critical controls, is susceptible to interception and manipulation.

Security Enhancements in IEC 62351-5

IEC 62351-5 introduces a security layer for 101/104 based on cryptographic Message Authentication Codes (MACs), replay detection, and optional confidentiality features. These enhancements are designed to be retrofitted into existing deployments or natively supported by compliant devices.

Secure Frame Format

IEC 62351-5 defines a secure APDU format that wraps the original 101/104 message in a security envelope. This envelope includes:

  • Security Header: Identifies the sender and includes a security control field
  • MAC Field: Contains a cryptographic checksum calculated over the message and header using a shared secret or certificate-based key
  • Optional Encryption: Symmetric encryption may be applied to the entire payload using AES (Advanced Encryption Standard), depending on use case

Message Integrity and Origin Authentication

Each message is cryptographically signed using a MAC algorithm such as HMAC-SHA256, ensuring that any tampering or forgery will be detected by the recipient. Origin authentication is achieved because only trusted peers possess the keys needed to compute valid MACs.

Replay Protection via Sequence Numbers

Replay attacks are mitigated using a monotonic counter fields embedded in the security header. Each valid message must have a higher sequence number than the last accepted message. Implementations must persist these counters across reboots to avoid reuse of old messages.

Key Management and Cryptographic Agility

IEC 62351-5 supports multiple key management models:

  • Static shared secrets: Suitable for small deployments with manual provisioning
  • X.509 Certificates and PKI: Recommended for scalable and secure deployments

A-Profile and T-Profile Security: TLS vs Application Layer Authentication

The security framework for IEC 60870-5-101/104 is formally defined by two complementary standards:

  • IEC 62351-5, which specifies generic message authentication using HMAC and session keys
  • IEC 60870-5-7, which details protocol-specific adaptations (e.g., ASDU types and message segmentation)

Security mechanisms can be grouped into two profiles:

  • T-profile security refers to the use of TLS (Transport Layer Security), defined in IEC 62351-3, to secure CS 104 at the transport layer
  • A-profile security refers to application layer message authentication, as standardized in IEC 60870-5-7 and supported in IEC 62351-5

T-profile provides confidentiality and authentication at the transport level (TCP/IP), while A-profile secures individual IEC messages (ASDUs), making it applicable to both CS 101 and CS 104, even in serial or hybrid environments.

Message Authentication and HMAC Usage

A-profile security uses HMAC (Hash-based Message Authentication Codes) to ensure message authenticity and integrity. The HMAC is calculated over critical application data using a secret session key shared between the sender and receiver. This ensures that only trusted endpoints can validate and accept critical messages (e.g., control commands).

Key features:

  • Different session keys are used per direction (monitoring vs control)
  • Session keys are updated periodically and exchanged over the same channel using a symmetric update key
  • Non-critical messages may remain unauthenticated for performance reasons

Challenge/Reply and Aggressive Mode Authentication

A-profile supports two authentication modes:

  • Challenge/Reply (two-pass): Used when a device needs to verify a received critical message. The device issues a challenge, and the sender replies with an HMAC based on the message and challenge data.
  • Aggressive Mode (one-pass): Faster unilateral method that appends an HMAC directly to the message. It requires an initial challenge/reply exchange to initialize shared challenge data.

Both modes aim to minimize bandwidth while maintaining trust, with Aggressive Mode favored in time-sensitive environments like CS 101-based control loops. Under normal circumstances communication goes into aggressive mode after the first challenge/reply cycle. The challenge/reply cycle has to be done immediately after a session key change.

IEC 60870-5-7: Protocol Adaptation and ASDU Mapping

IEC 60870-5-7 provides the protocol-specific mappings required to implement A-profile security in CS 101 and 104:

  • Defines new security ASDUs (e.g., S_CH_NA_1 for Challenge, S_AR_NA_1 for Aggressive Reply)
  • Introduces segmentation fields for security messages exceeding maximum ASDU size
  • Maps security states and transitions into the IEC 60870-5 finite state model

These definitions allow security messages to coexist with legacy protocols without breaking interoperability.

Edition Differences: 2013 vs 2023/2025

Two editions of A-profile security are currently recognized:

  • Edition 1 (2013):
    • Introduced basic HMAC authenticationSupports multi-user sessions with individual keys
    • Optional RBAC via session-based user identities
  • Edition 2 (2023/2025) (Draft):
    • Adds optional encryption of application dataEnforces single-user sessions for stricter controlIncorporates RBAC from IEC 62351-8 with defined role-permission mappingsIncompatible ASDU types vs Edition 1 (non-interoperable)
    • Multicast support for CS 101 unbalanced modes

Deployment Considerations and Performance Impact

Retrofits vs Native Support

Legacy RTUs and IEDs often lack the computational power or memory to process cryptographic functions. To mitigate this:

  • Security proxies or bump-in-the-wire devices can be used to offload security processing
  • Gateway appliances can act as secure concentrators, handling key management and enforcing policies

New devices should ideally support native 62351-5 capabilities, including MAC generation/verification, counter persistence, and cryptographic configuration.

Real-Time Constraints

The introduction of cryptographic operations must not violate the real-time characteristics of SCADA systems. IEC 62351-5 therefore emphasizes:

  • Low-latency MAC algorithms (e.g., HMAC with hardware acceleration)
  • Deterministic execution times
  • Offloading security processing to non-blocking threads or hardware modules

Compatibility and Interoperability

All security mechanisms are optional and must be negotiated between peers. Backward compatibility with unsecured devices must be explicitly managed:

  • Security Profiles define which features are enabled for each connection
  • Systems may operate in mixed mode, allowing secure and non-secure peers to coexist

Integration with TLS and Network Layer Security

While IEC 62351-5 provides application-layer protection, IEC 62351-3 complements it by specifying TLS as the preferred transport layer security mechanism for IEC 60870-5-104. Key integration points include:

  • TLS Mutual Authentication using certificates
  • Encrypted TCP channels
  • Fallback modes for non-TLS peers

TLS ensures confidentiality and connection integrity, while IEC 62351-5 ensures message-level authenticity and replay protection. For maximum security, both should be implemented in tandem.

Testing, Validation, and Compliance

IEC 62351-5-compliant systems must be rigorously tested for:

  • MAC validation and rejection of forged frames
  • Replay detection under attack conditions
  • Key rollover and certificate revocation support
  • Latency and jitter impact on SCADA timing
  • Interoperability between vendors

Certification programs and third-party security evaluations are encouraged to ensure robustness across heterogeneous deployments.

Summary and Best Practices

Securing IEC 60870-5-101/104 is a critical priority for utilities relying on legacy telecontrol infrastructure. IEC 62351-5 provides a flexible yet rigorous framework for message integrity, origin authentication, and replay protection. Key recommendations include:

  • Use TLS where possible for 104-based communication
  • Deploy MAC-based authentication and replay counters as per 62351-5
  • Implement gateway-based security when end devices cannot support cryptography
  • Use certificate-based key management for scalable trust models
  • Regularly update security policies and validate implementation conformance

Conclusion

IEC 62351-5 bridges the gap between legacy telecontrol protocols and modern cybersecurity requirements. Through its well-defined message authentication, replay protection, and key management frameworks, it offers a path to secure even the most entrenched SCADA systems. By embracing these standards, utilities can significantly reduce the attack surface of their operational networks while maintaining real-time performance and compatibility.

Looking forward

In the next part of this series, we will explore Security for IEC 61850/MMS, a client-server protocol at the heart of digital substations, and how IEC 62351-4 brings critical protections to the foundation of substation automation.

You May also Like…

Company

About us

What we do

Links

Products

Privacy Policy

Legal Information

FAQ

Contact

Merzhauser Str. 76A, 79100 Freiburg

info@mz-automation.de

+49 7681 – 20 91 980

Follow Us