Encryption method for SCADA security enhancement

With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks...

Full description

Bibliographic Details
Main Authors: Shah , Asadullah, Musa, Shahrulniza, Irfan, Muhammad, Asadullah, Shah
Format: Article
Language:English
Published: Asian Network for Scientific Information 2014
Subjects:
Online Access:http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf
id iium-36980
recordtype eprints
spelling iium-369802015-04-01T11:06:15Z http://irep.iium.edu.my/36980/ Encryption method for SCADA security enhancement Shah , Asadullah Musa, Shahrulniza Irfan, Muhammad Asadullah, Shah T10.5 Communication of technical information With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations. Asian Network for Scientific Information 2014 Article PeerReviewed application/pdf en http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf Shah , Asadullah and Musa, Shahrulniza and Irfan, Muhammad and Asadullah, Shah (2014) Encryption method for SCADA security enhancement. Journal of Applied Sciences. pp. 1-9. ISSN 1812-5662 (O), 1812-5654 (P) http://iosrjournals.org/
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T10.5 Communication of technical information
spellingShingle T10.5 Communication of technical information
Shah , Asadullah
Musa, Shahrulniza
Irfan, Muhammad
Asadullah, Shah
Encryption method for SCADA security enhancement
description With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations.
format Article
author Shah , Asadullah
Musa, Shahrulniza
Irfan, Muhammad
Asadullah, Shah
author_facet Shah , Asadullah
Musa, Shahrulniza
Irfan, Muhammad
Asadullah, Shah
author_sort Shah , Asadullah
title Encryption method for SCADA security enhancement
title_short Encryption method for SCADA security enhancement
title_full Encryption method for SCADA security enhancement
title_fullStr Encryption method for SCADA security enhancement
title_full_unstemmed Encryption method for SCADA security enhancement
title_sort encryption method for scada security enhancement
publisher Asian Network for Scientific Information
publishDate 2014
url http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf
first_indexed 2023-09-18T20:53:02Z
last_indexed 2023-09-18T20:53:02Z
_version_ 1777410121381445632