Secure Cryptography Testbed Implementation for SCADA Protocols Security

被引:11
|
作者
Shahzad, AAmir [1 ]
Musa, Shahrulniza [1 ]
Aborujilah, Abdulaziz [1 ]
Irfan, Muhammad [2 ]
机构
[1] Univ Kuala Lumpur, MIIT, Kuala Lumpur, Malaysia
[2] Windfield Coll, Kuala Lumpur, Malaysia
关键词
Supervisory Control and Data Acquisition (SCADA); Cryptography solutions; Secuity attacks; Modbus protocol; IEC60870; protocol; IEC; 60870-5-104; standard; Authenatication; Confidentiality; Integrity and Non-Repudiation;
D O I
10.1109/ACSAT.2013.69
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modbus protocol and IEC 60870-5-104 protocols are widely deployed in critical infrastructure sectors or SCADA systems. With the growing demands of industries, these protocols are also connected over internet using TCP/IP protocol or other transport protocols. Using internet facility, these protocols are vulnerable from several threads/attacks. The current research, detail review the lack of security issues within SCADA/Protocols communication and then propose two security solutions that are based on cryptography algorithms (solutions). The two proposed cryptography solutions have been implemented within the communication of Modbus protocol and IEC 60870-5-104 protocol as part of SCADA system. Abnormal traffic has been generated during transmission to evaluate the security solutions (Implementations). Testbed has been run several times and performance results are measured during normal and abnormal communication.
引用
收藏
页码:315 / 320
页数:6
相关论文
共 50 条
  • [41] Implementation of Cryptography Algorithm for E-Passport Security
    Sharma, Shruti
    Zodpe, Harshali
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 335 - 337
  • [42] Multimedia contents security: Watermarking diversity and secure protocols
    Bojkovic, Z
    Milovanovic, D
    TELSIKS 2003: 6TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICE, VOLS 1 AND 2, PROCEEDINGS OF PAPERS, 2003, : 377 - 383
  • [43] Cryptography based secure multipath routing protocols in Wireless Sensor Network: A Survey
    Selvam, R.
    Senthilkumar, A.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [44] On distributed security transactions that use secure transport protocols
    Broadfoot, P
    Lowe, G
    16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 141 - 151
  • [45] Security Architecture and Protocols for Secure MQTT-SN
    Park, Chang-Seop
    Nam, Hye-Min
    IEEE ACCESS, 2020, 8 : 226422 - 226436
  • [46] Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols
    Arenas, Monica P.
    Fotiadis, Georgios
    Lenzini, Gabriele
    Rakeei, Mohammadamin
    COMPUTERS & SECURITY, 2025, 148
  • [47] Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols
    Gnatyuk, Sergiy
    Okhrimenko, Tetiana
    Azarenko, Olena
    Fesenko, Andriy
    Berdibayev, Rat
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 183 - 188
  • [48] Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    Piatkowski, Jacek
    COMPUTER NETWORKS, CN 2016, 2016, 608 : 107 - 117
  • [49] Horus Testbed: Implementation of Real-Time Video Streaming Protocols
    Abdelhadi, Ahmed
    Gerstlauer, Andreas
    Vishwanath, Sriram
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [50] An IDE for the Design, Verification and Implementation of Security Protocols
    Garcia, Remi
    Modesti, Paolo
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 157 - 163