Abstract
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems are, today, vulnerable to attacks such as, among several others, interception of data traffic, malicious modifications of settings and control operations data, malicious modification of measurements and infrastructure data and Denial-of-Service attacks. Our research focuses on strengthening SCADA systems with cryptographic methods and protection mechanisms with emphasis on data and messaging encryption and device identification and authentication. The limited availability of computing power and memory in sensors and embedded devices deployed in SCADA systems make render cryptographic methods with higher resource requirements, such as the use of conventional public key cryptography such as RSA, unsuitable. We, thus, propose Elliptic Curve Cryptography as an alternative cryptographic mechanism, where smaller key sizes are required, with lower resource requirements for cryptographic operations. Accordingly, our approach integrates Modbus, a commonly used SCADA communication protocol, with Elliptic Curve Cryptography. We have, also, developed an experimental set-up in order to demonstrate the performance of our approach and draw conclusions regarding its effectiveness in real SCADA installations.
Subject
Computer Networks and Communications
Reference36 articles.
1. 14 Major SCADA Attacks and What You Can Learn from Them
https://www.dpstele.com/blog/major-scada-hacks.php
2. McAfee
https://www.mcafee.com/wpcontent/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf
3. Flame Malware and SCADA Security: What are the Impacts?
https://www.tofinosecurity.com/blog/flame-malware-and-scada-security-what-are-impacts
4. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
5. Control Techniques Drives and Controls Handbook;Drury,2009
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献