and access to information valuable to the power
infrastructure’s efficient operation.
A digital substation consists of several physical
and cyber infrastructures in switchyard and substation
buildings. One of the main challenges with a digital
substation is to ensure the security, availability, and
reliability of power systems as in conventional
methods and interoperability capability for different
vendors.
Physical infrastructure components of a digital
substation at the process level are current
transformers (CT), voltage transformers (VT),
merging units (MU), breakers, sensors, etc., and the
cyber infrastructure includes a communication
network, Intelligent Electronic Devices (IEDs),
switches, software and hardware at the station level.
A Human Machine Interface (HMI) is the graphical
interface between the human operator and the
controller (all the physical devices) of an industrial
system for interaction and communication between
them. SCADA is a centralised system used for
monitoring and controlling a plant. IED is a
microprocessor-based device used by the electric
power industry to maintain power system switching
devices. Current and voltage transformers are devices
that constantly interact with the physical electric
power environment and communicate with the
controller via a shared process bus. MU is a device
that enables the implementation of an IEC61850
process bus by converting the analog signals from the
conventional CT/VT into IEC61850 for metering,
protection, and control purposes.
These components are vulnerable to cyber threats
and must be secured to prevent, mitigate, and handle
cyber-attacks to ensure the power system’s
availability and preserve reliability (Khodabakhsh et
al., 2020).
The complexity of modern computer systems is so
great that it is difficult to have a complete overview
of the functionality, even for those who develop them.
We know that building flawless systems is almost
impossible. This is accepted to the extent that no one
will purchase complex equipment without a support
agreement that the supplier will provide software
updates to correct programming errors as they are
identified. Thus, complexity is not restricted to
software code but includes hardware devices and
social engineering to exploit business processes.
Verifying the security of components of a digital
substation, consisting of techniques, methods, tools,
procedures, and a methodology for systematically
applying them, will support the power industry and
operators of critical infrastructure, as well as
authorities to verify the security of products currently
being used, without us knowing their possible
vulnerabilities, but if the buyers of equipment are no
longer expected even to understand the equipment
they buy, this has profound cost implications (Lysne,
2018). It means that the equipment vendor has the
power to make the gear do things that are not in the
interest of its owner. For example, the vendor could
turn the equipment against its owner without the
owner ever finding out.
There are many hardware components within the
power infrastructure from different vendors, ranging
from IT products to industry-specific tailored details.
According to (Lysne, 2018), this increases what a
dishonest vendor in the supply chain could do. The
exact answer will vary depending on the motivation
of the illegal vendor, but the actions need to be
concerned the same as those we fear from third-party
cyberattacks. We fear that attackers carry out
espionage and surveillance to hold confidential
information from companies, private per-sons, or
nation-states. We fear sabotage of equipment, either
permanently or temporarily.
4 ETHICAL CONSIDERATIONS
4.1 Ethical Challenges
Using reverse engineering methodology to verify the
absence of unwanted content within hardware
components must be interpreted with ethical caution,
and several limitations should be borne in mind. First,
the vast complexity of hardware trojans hiding and
operating makes it difficult to generalise findings.
According to ethics, honesty, objectivity,
integrity, carefulness, openness, respect for
intellectual property, confidentiality, responsible
publication, respect for colleagues, social
responsibility, competence, and legality must be
observed and respected throughout the research
project. Furthermore, the confidentiality of
information and of the collaborating individuals and
institutions provided during and for the research must
be respected. Current methods of oversight and
guidance regarding cybersecurity ethics are
inadequate (Macnish et al., 2020). In the latter, a lack
of adequate guidance or accountability forms a barrier
to consistent ethical practice. The ethical issues are
complicated, although hardly new to the
cybersecurity community. Despite this, there is
relatively little guidance on how practitioners should
proceed in many cases. There is a clear need to
develop an active dialogue regarding ethics in the
research and practice of cybersecurity. This, too, is