Encryption method for SCADA security enhancement
With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Network for Scientific Information
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/36980/ http://irep.iium.edu.my/36980/ http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf |
id |
iium-36980 |
---|---|
recordtype |
eprints |
spelling |
iium-369802015-04-01T11:06:15Z http://irep.iium.edu.my/36980/ Encryption method for SCADA security enhancement Shah , Asadullah Musa, Shahrulniza Irfan, Muhammad Asadullah, Shah T10.5 Communication of technical information With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations. Asian Network for Scientific Information 2014 Article PeerReviewed application/pdf en http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf Shah , Asadullah and Musa, Shahrulniza and Irfan, Muhammad and Asadullah, Shah (2014) Encryption method for SCADA security enhancement. Journal of Applied Sciences. pp. 1-9. ISSN 1812-5662 (O), 1812-5654 (P) http://iosrjournals.org/ |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T10.5 Communication of technical information |
spellingShingle |
T10.5 Communication of technical information Shah , Asadullah Musa, Shahrulniza Irfan, Muhammad Asadullah, Shah Encryption method for SCADA security enhancement |
description |
With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations. |
format |
Article |
author |
Shah , Asadullah Musa, Shahrulniza Irfan, Muhammad Asadullah, Shah |
author_facet |
Shah , Asadullah Musa, Shahrulniza Irfan, Muhammad Asadullah, Shah |
author_sort |
Shah , Asadullah |
title |
Encryption method for SCADA security enhancement |
title_short |
Encryption method for SCADA security enhancement |
title_full |
Encryption method for SCADA security enhancement |
title_fullStr |
Encryption method for SCADA security enhancement |
title_full_unstemmed |
Encryption method for SCADA security enhancement |
title_sort |
encryption method for scada security enhancement |
publisher |
Asian Network for Scientific Information |
publishDate |
2014 |
url |
http://irep.iium.edu.my/36980/ http://irep.iium.edu.my/36980/ http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf |
first_indexed |
2023-09-18T20:53:02Z |
last_indexed |
2023-09-18T20:53:02Z |
_version_ |
1777410121381445632 |