Development of security mechanisms for scada systems in the postquantium period

Author:

Воропай О. В.ORCID,Погасій С. С.ORCID,Король О. Г.ORCID,Мілевський С. В.ORCID

Abstract

The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.

Publisher

Ivan Kozhedub Kharkiv National Air Force University KNAFU

Subject

General Medicine

Reference47 articles.

1. Gaevskij, V.V. (2017), “Sovremennyie scada-sistemyi dlya zheleznodorozhnogo transporta” [Modern scada systems for railway transport] Ukrainian Railway. No. 3(4), pp. 45-46.

2. May, W. (2016), Report on Post-Quantum Cryptography, 15 p., available at: http://surl.li/csddl (accessed 02 March 2022).

3. Hryshchuk, R.V. and Danyk, Yu.H. (2016), “Osnovy kibernetychnoi bezpeky” [Fundamentals of cyber security], ZhNAEU, Zhytomyr, 636 p.

4. May, W. (2016), Guide for Cybersecurity Event Recovery, 53 p., available at: https://nvlpubs.nist.gov/nistpubs/.../NIST.SP.800-184.pdf (accessed 02 March 2022).

5. Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O. and Milevskyi, S. (2021), Synergy of building cybersecurity systems, РС Тесhnology Сеntеr, Kharkiv, 188 p. https://doi.org/10.15587/978-617-7319-31-2.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3