Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher*
نویسندگان
چکیده
Critical infrastructures like Nuclear Power Plants (NPP), railroad networks, and water distribution / treatment systems are fundamentally important to human life. Failure of such structures endangers human lives, environment, and economy in world-wide scale. Supervisory Control And Data Acquisition (SCADA) system have been installed to operate those infrastructures efficiently and safely, but series of recent hacking incidents have stressed the importance to improve cyber-security of SCADA systems. This paper assesses basic differences between general IT systems and SCADA system, analyzes up-to-date technologies and approaches to secure the systems, and suggests cyber-security improvement of popular DNP3 protocol in SCADA system using authenticated encryption based on low-latency symmetric key cryptography and key management scheme.
منابع مشابه
Building Small-Scale Testbed for DNP3 Protocol in SCADA system
SCADA is a type of industrial control systems which monitor and control the industrial device. To adjust the smart-grid, a new method is needed which improves security to SCADA system. But a difficulty for small laboratory happens to research SCADA system in a large scale, because of building own testbed. In this paper, a testbed in a lab environment is suggested to attack and defence DNP3 prot...
متن کاملSimulated Attack on DNP3 Protocol in SCADA System
Supervisory Control and Data Acquisition (SCADA) system monitors and controls industrial process in physical critical Infrastructures. It is thus of vital importance that any vulnerabilities of SCADA system must be identified and mitigated. DNP3 is and open SCADA network protocol that is mainly used in electrical utilities. However, the security mechanisms of DNP3 were neglected at its design s...
متن کاملLow-Latency Cryptographic Protection for SCADA Communications
Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber attack. A retrofit solution to protect existing SCADA communications links must assure the integrity of com...
متن کاملDesign and Development of Layered Security: Future Enhancements and Directions in Transmission
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open pr...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کامل