Utilization of different Encryption Schemes for Securing SCADA Component Communication
نویسنده
چکیده
This dissertation is a study on the comparison of different Encryption Schemes for Securing SCADA Component Communication. SCADA Communication is a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. Today, it is much more common for SCADA communications to travel over LAN or WLAN. The process of communication over a SCADA system involves several different SCADA system components. These include the sensors and control relays, Remote Terminal Units (RTUs), SCADA master units, and the overall communication network. Each of these parts is necessary for effective SCADA communication. A system can effectively monitor alarms and status updates within the network only when all of these system components function properly. For more complete monitoring of SCADA communications, operators must deploy advanced RTUs. The RTU is where most SCADA communication is gathered within the system. Values from inputs and outputs, referred to as SCADA points, are sent from individual sensors to the RTU. The RTU is responsible for forwarding these SCADA communications to the master station, or Human Machine Interface (HMI). Common misconception regarding SCADA security was SCADA networks were isolated from all other networks and so attackers could not access the system. As the industry grows, the demand for more connectivity also increased. From a small range network, SCADA systems are sometimes connected to other networks like the internet. The open standards also make it very easy for attackers to gain in depth knowledge about the working of these SCADA networks. The use of COTS hardware and software to develop devices for operating in the SCADA network also contribute to its lack of security. Devices that are designed to operate in safety critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail safe mechanisms. This makes these devices must not only be designed for safety but also for security. Because of so many vulnerabilities encryption Schemes are applied to secure the communication between the components. This work compares different Encryption Schemes for Securing SCADA Component Communication.
منابع مشابه
Applying encryption schemed to supervisory control and data acquisition systems for security management
Supervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication ...
متن کاملCustomized PKI for SCADA System
Anupam Saxena Centre for Development of Advanced Computing, Mumbai, India Email: [email protected] Om Pal Centre for Development of Advanced Computing, Mumbai, India Email:[email protected] Zia Saquib Centre for Development of Advanced Computing, Mumbai, India Email: [email protected] Dhiren Patel Indian Institute of Technology Gandhinagar, Ahmedabad, India Email: [email protected] ---...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملOn Securing Communication from Profilers
A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for ...
متن کاملSecurity Architecture for Point-to-Point Splitting Protocols
The security of industrial supervisory control and data acquisition systems (SCADA) has become a major concern since the Stuxnet worm in 2010. As these systems are connected to the physical world, this makes them possibly hazardous if a malicious attacker is able to take over their control. SCADA can live up to 40 years, are particularly hard to patch, and quite often have no security feature a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014