The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication

نویسندگان

  • Aamir Shahzad
  • Shahrulniza Musa
  • Abdulaziz Aborujilah
  • Muhammad Irfan
چکیده

The SCADA system connectivity with several open networks using internet facility brought SCADA platform more vulnerable from attacks/threads. Therefore, the detail security review has been conducted, to find the potential security issues which are residing and warming the SCADA communication and also existing potential security solutions that are used to protect the SCADA communication. However, Security deployments are the future tread of this study. This security review is divided into four main sections: (1) Security Analysis for SCADA System, (2) SCADA Security using Cryptography Solution, (3) Key Management and Distribution Protocols for SCADA System and (4) SCADA Communication using Security Patterns. In this study; the SCADA security review has been conducted and generic security solution using cryptography will implement in future.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying encryption schemed to supervisory control and data acquisition systems for security management

Supervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication ...

متن کامل

A Survey: An Advanced Key Management Technique with Enhanced Security SCADA System

Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data acquisition (SCADA).In this paper, we analyze several security issues in SCADA systems. We classify these issues based on key management, vulnerability and survivability. Using this standardized security techniques we can easily compare & c...

متن کامل

Guide to Industrial Control Systems (ICS) Security

This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and...

متن کامل

Design on SCADA Test-bed and Security Device

Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA (Supervisory Control and Data Acquisition) system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management ...

متن کامل

Web-Based Remote Control of a Building’s Electrical Power, Green Power Generation and Environmental System Using a Distributive Microcontroller

This article proposes a novel, web-based, remote monitoring and control system design for a building’s electrical power, green power generation and environmental system that will save energy. The supervisory control system is based on the use of distributed microcontroller architecture to access programmable logic controllers (PLC) and remote input/output devices through the system hardware fra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCS

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2014