scada security
Recently Published Documents


TOTAL DOCUMENTS

73
(FIVE YEARS 13)

H-INDEX

11
(FIVE YEARS 2)

Author(s):  
M. Agus Syamsul Arifin ◽  
Susanto Susanto ◽  
Deris Stiawan ◽  
Mohd Yazid Idris ◽  
Rahmat Budiarto

<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>


2021 ◽  
Vol 11 (5) ◽  
pp. 2082
Author(s):  
Sagarika Ghosh ◽  
Marzia Zaman ◽  
Gary Sakauye ◽  
Srinivas Sampalli

The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12. Therefore, researchers are developing various security schemes based on either quantum or post-quantum algorithms. However, the efficiency of quantum algorithms impacts the security of the post-quantum digital signature scheme. We propose an intrusion resistant algorithm exploiting and applying quantum principles in the post-quantum signature algorithm. We use the Bennett 1992 (B92) protocol, a quantum key distribution scheme, to obtain the cipher, and the practical Stateless Hash-based Signatures (SPHINCS)-256 protocol to obtain a post-quantum signature. However, instead of Chacha-12, a well-known cryptographically secure pseudo-random number generator, we apply a quantum random number generator to obtain a truly random Hash to Obtain Random Subset (HORS) signature with Tree (HORST) secret key used in SPHINCS-256. We have implemented the design in Python with the Quantum Information Toolkit. We have validated the proposed algorithm using the Probabilistic Model Checking for Performance and Reliability Analysis (PRISM) and Scyther tools. Moreover, the National Institute of Standards and Technology (NIST) statistical tests show that the proposed algorithm key pairs have randomness of 98% and RSA and ECDSA are below 96%.


Fast track article for IS&T International Symposium on Electronic Imaging 2021: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2021 proceedings.


Fast track article for IS&T International Symposium on Electronic Imaging 2021: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2021 proceedings.


2020 ◽  
Vol 16 (2) ◽  
pp. 153
Author(s):  
Rajesh Kalluri ◽  
Reddi Hareesh ◽  
M. V. Yeshwanth ◽  
R. K. Senthil Kumar ◽  
B. S. Bindhumadhava
Keyword(s):  

The industrial communication systems of present time are to a large extent based on commercial operating systems, open protocol implementation & communication application which are not secure. By connecting to the internet or other public networks these risks are exposed to potential attacker and cause damage to the industries. The data send by the network can be tampered causing network failure. This results in an increase in the downtime of the industry causing major loss. The industrial communication channel can be accessed by unauthorized person and uncorrect information can be transmitted, i.e. the originality of the information is violated. Cryptography is the technique, which is used to improve SCADA security. Cryptography is hiding of actual information. But SCADA protocols do not support any type of cryptography due to limited computational capabilities of SCADA device and low rate data transmission in SCADA network. To tackle this situation we are introducing an encrypting/decrypting module (ENIGMA) which can be connected at one end of the plant and one end of the control room. The encrypting module encrypts the data at the transmitting end and transmits it through the communication channel. The decrypting module decrypts the data received via the communication channel.


2019 ◽  
Vol 15 (2) ◽  
pp. 91 ◽  
Author(s):  
Qais Saif Qassim ◽  
Norziana Jamil ◽  
Maslina Daud ◽  
Hafizah Che Hasan

2019 ◽  
Vol 15 (2) ◽  
pp. 91
Author(s):  
Qais Saif Qassim ◽  
Hafizah Che Hasan ◽  
Norziana Jamil ◽  
Maslina Daud

Sign in / Sign up

Export Citation Format

Share Document