Design and Implementation of a Secure Modbus Protocol

نویسندگان

  • Igor Nai Fovino
  • Andrea Carcano
  • Marcelo Masera
  • Alberto Trombetta
چکیده

The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Serial Communication between PC and DSP Processor Using Modbus Protocol

This paper described the principle, application and implementation of serial communication between PC and a Digital Signal Processor (DSP). The TMS320F28031 which is a type of DSPs made by Texas Instruments (TI) is used in this implementation. This DSP processor has serial communication interface (SCI) module for serial communication. The SCI is a two−wire asynchronous serial port, commonly kno...

متن کامل

Design and Implementation of Industrial Firewall for Modbus/TCP

For the fragile security status and the growing threat of attack on industrial control systems, it is particularly important to strengthen the technology of security protection. After a detailed study of the characteristics of industrial control systems, this paper put forward design scheme of industrial firewall based on Modbus/TCP protocol, combining "white list" security policies with deep p...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot

Recently, botnets such as Mirai and Persirai targeted IoT devices on a large scale. We consider aŠacks by botnets on cyber-physical systems (CPS), which require advanced capabilities such as controlling the physical processes in real-time. Traditional botnets are not suitable for this goal mainly because they lack process control capabilities, are not optimized for low latency communication, an...

متن کامل

Formally Verifying Flow Integrity Properties in Industrial Systems∗

In contrast to other IT systems, industrial systems often do not only require classical properties like data confidentiality or authentication of the communication, but have special needs due to their interaction with physical world. For example, the reordering or deletion of some commands sent to a machine can cause the system to enter an unsafe state with potentially catastrophic effects. To ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009