Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication
Aamir Shahzad, Shahrulniza Musa
Pages - 28 - 44 | Revised - 15-05-2012 | Published - 20-06-2012
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Cryptography Algorithms, Authentication, Confidentiality, Security Issues
ABSTRACT
Supervisory control and data acquisition (SCADA) systems and Distributed control systems (DCS) were developed to reduce labor costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water, and wastewater industries. While control systems can be vulnerable to a variety of types of cyber attacks that could have devastating consequences, however, little attention is given to security considerations in the initial design and deployment of these systems, which has caused an urgent need to upgrade existing systems to withstand unauthorized intrusions potentially leading to communication attacks [1]. The current paper take a Hybrid-based Cryptography (combination of Symmetric AES and Asymmetric RSA) solution to enable confidentiality and authentication placed at each end of SCADA communication and provides secure channel for communication between MTU Terminal Unit (MTU) to Remote Terminal Units (RTUs) and/or RTUs to MTU.
1 | Aghajanzadeh, N., & Keshavarz-Haddad, A. (2015). A Concise Model to Evaluate Security of SCADA Systems based on Security Standards. International Journal of Computer Applications, 111(14). |
2 | Premnath, A. P., Jo, J. Y., & Kim, Y. (2014, April). Application of NTRU Cryptographic Algorithm for SCADA Security. In Information Technology: New Generations (ITNG), 2014 11th International Conference on (pp. 341-346). IEEE. |
3 | Shahzad, A., Musa, S., Irfan, M., & Asadullah, S. (2014). Key Encryption Method for SCADA Security Enhancement. Journal of Applied Sciences, 14(20), 2498. |
4 | Shahzad, A., Musa, S., Irfan, M., & Asadullah, S. (2014). Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement. Journal of Applied Sciences, 14(20), 2487. |
5 | Gupta, R., Agarwal, R., & Goyal, S. A Review of Cyber Security Techniques for Critical Infrastructure Protection. |
6 | WANG, D. (2013). Malicious Node Detection Mechanism for Wireless Ad Hoc Network. International Journal of Security (IJS), 7(1), 1. |
7 | Puliadi Premnath, A. (2013). Application of NTRU Cryptographic Algorithm for securing SCADA communication. |
A. Wright and J. Kinast and J. M.Carty. “Low-Latency Cryptographic Protection for SCADA Communication,” Springer Lecture Notes, 2006. | |
C.Li.Bettati and R. W. Zhao. “Response time analysis for distributed real-time systems with bursty job arrivals,” Dept. of Compute. Sci., Texas A&M Univ., College Station, TX, http://ieeexplore.ieee.org/Xplore. | |
D.Bailey and Edwin. “Wright, Practical SCADA for industry.” Available: http://books.google.com.my/books | |
DNP3 Organization homepage: http://www.dnp.org/ | |
E.B.Fernandez and J.Wu and M.M.Larrondo. “On Building Secure SCADA Systems using Security Patterns,”ACM conference, April .2009. | |
E.Nahum and S.O.Malley. “Towards High Performance Cryptographic Software,” ftp://ftp.cs.arizona.edu/reports/1995/TR95-03.ps. | |
G.Clarke and D. Reynders. “Practical Modern SCADA Protocols,” May.2003. | |
J.H. Graham and S.C. Patel. “Security Considerations in SCADA Communication Protocols,” Sept 2004. | |
Kim and Montgomery. “Behavioral and Performance Characteristics of IPSec/IKE in Large- Scale VPNs,” Proceedings of the IASTED, International Conference on Communication Network and Information Security,” pp. 231-236, Dec. 2003. | |
M.D. Hadley and K.A. Huston and T.W. Edgar. “American Gas Association (AGA), Report No. 12 Part 2.Cryptographic Protection of SCADA Communications: Retrofit Link Encryption for Asynchronous Serial Communications”, Aug. 2007. | |
M.Jethanandani and C.FI. “CERT Vulnerability Report in TCP,” April .20. 2004. | |
Modbus Organization. http://www.modbus.com/ | |
P.Blomgren and S.M Kotronx. “Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan,” American Gas Association (AGA), Draft 4, AGA Report 12, Mar.14.2006. | |
P.Oman and E.O. Schweitzer. “Substations, and SCADA Systems against Electronic Intrusions,” Schweitzer Engineering Laboratories, Inc. Pullman, WA USA. | |
R.D. Colin and B.E. Dawson. “A Key Management Architecture for SCADA Systems,” ACM journal, 2006. | |
R.J.Robles and M.K.Choi. “Symmetric-Key Encryption for Wireless Internet SCADA,” Springer-Verlag Berlin Heidelberg, Communications in Computer and Information Science, Volume 58, 289-297, DOI: 10.1007/978-3-642-10847-1_36, 2009. | |
S.C. Patel and G.D. Bhatt and J.H. Graham. “Improving the cyber security of Scada communication Network,” Communication of ACM, Vol .52 No.7, July.2009. | |
Schneier and Bruce. “Performance Comparison of the AES Submissions,” http://www.schneier.com/paper-aes. | |
Mr. Aamir Shahzad
Universiti Kuala Lumpur - Malaysia
mail2aamirshahzad@gmail.com
Dr. Shahrulniza Musa
- Malaysia
|
|
|
|
View all special issues >> | |
|
|