Abstract
Internet of things based industrial automation systems are widely used for process monitoring, and control applications. The security threats increase due to the internet is an open environment. This proposed work is the implementation of secure monitoring of plant information through the Supervisory Control and Data Acquisition (SCADA) system. The modified asymmetric and hash algorithm is proposed which generates the large key size of 4096-bit and 512-bit respectively. This proposed security algorithm is implemented using the ARM Cortex A53 processor which performs data encryption and decryption. It provides authentication and integrity of process information across the internet. It achieves a data transfer rate of 300 Megabits per second and more than 95 percent efficiency. This proposed work can be applied for securing the internet-enabled industrial automation process and allows secure monitoring of plant information in remote areas. The security of sensitive process parameters is enhanced through the proposed large key size in asymmetric algorithms. This proposed security algorithm prevents the damage to industrial devices from unauthorized access and modification. It assures the smooth functioning of plant operations and also provides safety to plant operators.
Reference27 articles.
1. J. S. Prasath, U. Ramachandraiah, G. Muthukumaran, “Modified Hardware Security Algorithms for Process Industries Using Internet of Things,” Taylor and Francis Journal of Applied Security Research, Article in Press, pp. 1-14, 2020.
2. Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari, “New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks,” International Journal of Communication Networks and Information Security, Vol. 9, No. 3, pp. 376-385, 2017.
3. Vikas K.Soman, Natarajan V, “An Enhanced Hybrid Data Security Algorithm for Cloud,” IEEE International Conference on Networks and Advances in Computational Technologies, Trivandrum, India, pp. 416-419, 2017.
4. Adviti Chauhan, Jyoti Gupta, “A Novel Technique of Cloud Security Based on Hybrid Encryption by Blowfish and MD5,” IEEE International Conference on Signal Processing, Computing and Control, Solan, India, pp. 349-355, 2017.
5. M. Harini, K. PushpaGowri, C. Pavithra, M. Pradhiba Selvarani, “A Novel Security Mechanism Using Hybrid Cryptography Algorithms,” IEEE International Conference on Electrical, Instrumentation and Communication Engineering, Karur, India, pp. 1-4, 2017.