Cyber Security of Industrial Networks

نویسندگان

  • Anupam Jain
  • Zia Saquib
چکیده

SCADA stands for Supervisory Control and Data Acquisition, a communication technology which collects data from distant facilities and sends control signals to actuators. There are several factors which increase the risk associated with SCADA systems. SCADA components are considered to be profoundly privileged targets for cyber attacks through which hackers can easily hit the nation’s critical infrastructure and economy. This paper investigates security issues of SCADA communication protocols. In order to protect the SCADA networks, we focus on the protocols as they were not designed with inherent security features. Security system through protocol hardening is the main focus of this paper. The goal is to modify the structure of such protocols to provide more integrity and authentication. In the proposed structure, two algorithms are used to enhance the security and integrity of the payload. They are each discussed further in the next six sections. . Keywords—SCADA, Data link layer protocol, CRC, Cyber security, Industrial Network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Physical Security for Industrial Control Systems and IoT

Cyber-attacks and cybersecurity used to be the issues for those who use Internet and computers. The issues, however, are expanding to anyone who does not even use them directly. The society is gradually and heavily depending on networks and computers. They are not closed within a cyberspace anymore and having interaction with our real world with sensors and actuators. Such systems are known as ...

متن کامل

Towards a Framework for Assuring Cyber Physical System Security

Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...

متن کامل

Preparation of Papers in a Two-Column Format for the 21st Annual Conference of the IEEE Industrial Electronics Society

Extensive use of digital systems and networks is causing the problem of the cyber security to safety related industries like research reactors. The aim of cyber security study, in this article, is to develop a cyber-security risk analysis model based on activityquality & Instrumentation & Control (I&C) architecture for the safety of nuclear industry. Activity-quality is a qualitative number sho...

متن کامل

Application of trusted network technology to industrial control networks

Interconnections between industrial control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest h...

متن کامل

Cybernetic modeling of Industrial Control Systems: Towards threat analysis of critical infrastructure

Industrial Control Systems (ICS) encompassing resources for process automation are subjected to a wide variety of security threats. The threat landscape is arising due to increased adoption of Commercial-of-the-shelf (COTS) products as well as the convergence of Internet and legacy systems. Prevalent security approaches for protection of critical infrastructure are scattered among various subsy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015