IIUM Repository

Encryption method for SCADA security enhancement

Shah , Asadullah and Musa, Shahrulniza and Irfan, Muhammad and Asadullah, Shah (2014) Encryption method for SCADA security enhancement. Journal of Applied Sciences. pp. 1-9. ISSN 1812-5662 (O), 1812-5654 (P)

[img] PDF
Restricted to Repository staff only

Download (827kB) | Request a copy
Official URL: http://iosrjournals.org/


With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations.

Item Type: Article (Journal)
Additional Information: 6566/36980
Uncontrolled Keywords: supervisory control and data acquisition, key encryption methods, DNP3 protocol security, cryptography algorithms, SCADA attacks/threads
Subjects: T Technology > T Technology (General) > T10.5 Communication of technical information
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System
Depositing User: Prof Asadullah Shah
Date Deposited: 19 Jun 2014 09:39
Last Modified: 01 Apr 2015 19:06
URI: http://irep.iium.edu.my/id/eprint/36980

Actions (login required)

View Item View Item


Downloads per month over past year