Secure Cryptography Testbed Implementation for SCADA Protocols Security

被引:11
|
作者
Shahzad, AAmir [1 ]
Musa, Shahrulniza [1 ]
Aborujilah, Abdulaziz [1 ]
Irfan, Muhammad [2 ]
机构
[1] Univ Kuala Lumpur, MIIT, Kuala Lumpur, Malaysia
[2] Windfield Coll, Kuala Lumpur, Malaysia
关键词
Supervisory Control and Data Acquisition (SCADA); Cryptography solutions; Secuity attacks; Modbus protocol; IEC60870; protocol; IEC; 60870-5-104; standard; Authenatication; Confidentiality; Integrity and Non-Repudiation;
D O I
10.1109/ACSAT.2013.69
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modbus protocol and IEC 60870-5-104 protocols are widely deployed in critical infrastructure sectors or SCADA systems. With the growing demands of industries, these protocols are also connected over internet using TCP/IP protocol or other transport protocols. Using internet facility, these protocols are vulnerable from several threads/attacks. The current research, detail review the lack of security issues within SCADA/Protocols communication and then propose two security solutions that are based on cryptography algorithms (solutions). The two proposed cryptography solutions have been implemented within the communication of Modbus protocol and IEC 60870-5-104 protocol as part of SCADA system. Abnormal traffic has been generated during transmission to evaluate the security solutions (Implementations). Testbed has been run several times and performance results are measured during normal and abnormal communication.
引用
收藏
页码:315 / 320
页数:6
相关论文
共 50 条
  • [31] Research and Implementation of Secure Industrial Communication Protocols
    Wang Jingran
    Liu Mingzhe
    Xu Aidong
    Hu Bo
    Han Xiaojia
    Zhou Xiufang
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 314 - 317
  • [32] SCADA Security Issues and FPGA implementation of AES - A Review
    Singh, Amrik
    Prasad, Ajay
    Talwar, Yoginder
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 899 - 904
  • [33] A unified architecture for the implementation of security protocols
    Abdullah, IS
    Menascé, DA
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 95 - 100
  • [34] Middleware for Automated Implementation of Security Protocols
    Genge, Bela
    Haller, Piroska
    SEMANTIC WEB: RESEARCH AND APPLICATIONS, 2009, 5554 : 476 - 490
  • [35] Security analysis of multilayer SCADA protocols: A Modbus TCP case study
    Edmonds, Janica
    Papa, Mauricio
    Shenoi, Sujeet
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 205 - +
  • [36] Perceptions of security contributing to the implementation of secure is
    Tryfonas, T
    Kiountouzis, E
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 313 - 324
  • [37] Synchronized Power Simulation and Programmable Network Emulation Testbed for SCADA System Security Evaluation
    Hu, Zheng
    Waind, Luke
    Qu, Yanfeng
    Jin, Dong
    PROCEEDINGS OF THE 38TH ACM SIGSIM INTERNATIONAL CONFERENCE ON PRINCIPLES OF ADVANCED DISCRETE SIMULATION, ACM SIGSIM-PADS 2024, 2024, : 69 - 70
  • [38] Implementation of Symmetric Cryptography in Embedded Systems for Secure Measurement Systems
    Bilski, Piotr
    Winiecki, Wieslaw
    Adamski, Tomasz
    2011 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2011, : 1288 - 1293
  • [39] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
    Pandey, Jai Gopal
    Mitharwal, Chhavi
    Karmakar, Abhijit
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
  • [40] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Sklavos, Nicolas
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93