Secure Cryptography Testbed Implementation for SCADA Protocols Security

被引:11
|
作者
Shahzad, AAmir [1 ]
Musa, Shahrulniza [1 ]
Aborujilah, Abdulaziz [1 ]
Irfan, Muhammad [2 ]
机构
[1] Univ Kuala Lumpur, MIIT, Kuala Lumpur, Malaysia
[2] Windfield Coll, Kuala Lumpur, Malaysia
关键词
Supervisory Control and Data Acquisition (SCADA); Cryptography solutions; Secuity attacks; Modbus protocol; IEC60870; protocol; IEC; 60870-5-104; standard; Authenatication; Confidentiality; Integrity and Non-Repudiation;
D O I
10.1109/ACSAT.2013.69
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modbus protocol and IEC 60870-5-104 protocols are widely deployed in critical infrastructure sectors or SCADA systems. With the growing demands of industries, these protocols are also connected over internet using TCP/IP protocol or other transport protocols. Using internet facility, these protocols are vulnerable from several threads/attacks. The current research, detail review the lack of security issues within SCADA/Protocols communication and then propose two security solutions that are based on cryptography algorithms (solutions). The two proposed cryptography solutions have been implemented within the communication of Modbus protocol and IEC 60870-5-104 protocol as part of SCADA system. Abnormal traffic has been generated during transmission to evaluate the security solutions (Implementations). Testbed has been run several times and performance results are measured during normal and abnormal communication.
引用
收藏
页码:315 / 320
页数:6
相关论文
共 50 条
  • [21] Implementation of telecontrol protocols in SCADA system based on FSM
    Fu Qin-cui
    Chen Jian-yun
    Liu Zi-ying
    2007 CONFERENCE PROCEEDINGS IPEC, VOLS 1-3, 2007, : 75 - 79
  • [22] Security Fusion Implementation and Optimization in SCADA Systems
    Casper, William
    Papa, Stephen
    Nair, Suku
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 620 - 625
  • [23] Testbed implementation of a secure flooding time synchronization protocol
    Roosta, Tanya
    Liao, Wei-Chieh
    Teng, Wei-Chung
    Sastry, Shankar
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 3157 - +
  • [24] Design and implementation of automated IoT security testbed
    Abu Waraga, Omnia
    Bettayeb, Meriem
    Nasir, Qassim
    Abu Talib, Manar
    COMPUTERS & SECURITY, 2020, 88 (88)
  • [25] THE IMPLEMENTATION OF A CRYPTOGRAPHY-BASED SECURE OFFICE SYSTEM
    MUELLERSCHLOER, C
    WAGNER, NR
    AFIPS CONFERENCE PROCEEDINGS, 1982, 51 : 487 - +
  • [26] Cryptography & Security implementation in Network Computing Environments
    Pandey, Rajanikant
    Pandey, Vinay Kumar
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3136 - 3140
  • [27] Implementation of Secure Key Distribution Based On Quantum Cryptography
    Elboukhari, Mohamed
    Azizi, Abdelmalek
    Azizi, Mostafa
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 361 - +
  • [28] Towards implementing scalable and reconfigurable SCADA security testbed in power system environment
    Qassim, Qais Saif
    Jamil, Norziana
    Daud, Maslina
    Hasan, Hafizah Che
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2019, 15 (02) : 91 - 120
  • [29] Redesigning Secure Protocols to Compel Security Checks
    Irwin, Keith
    SECURITY PROTOCOLS XXIII, 2015, 9379 : 22 - 29
  • [30] Security analysis of electronic payment protocols based on quantum cryptography
    Liu, Yi
    Liu, Xingtong
    Wang, Jian
    Zhang, Lei
    Tang, Chaojing
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 1709 - 1712