IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Authors
Abstract:
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is used in the ICSs as telemetry communication. According to achievement of these goals, we have analyzed the IEC 60870-5-104 design phase carefully and used experimental test bed to identify the security threats and vulnerabilities and characterize the technical attacks. Finally we review the design of hardening mechanisms and their challenges.
similar resources
Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middl...
full textRFID Security: Attacks, Countermeasures and Challenges
Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...
full textA General Review on DLMS/COSEM and IEC 60870-5 Smart Grid Standards
Abstract – DLMS/COSEM and IEC 60870-5 standards, are the most widely accepted standards for smart grid industries at Europe and large sections of the world. It is the trend for the observable future. This paper reviews these standards, and an effort is being made to present the material from an innovative point of view. There are various accurate and clear papers describing the standards, and t...
full textNetwork Security: Compromises and Countermeasures
Network security is a long-standing and well-recognized problem in the computing world. Protecting information is a main priority of a network administrator, with security techniques becoming increasingly robust. As more and more information has become digital, security of this digital information has tightened and mitigation techniques to protect the information have become more complex. While...
full textWireless Security: Vulnerabilities and Countermeasures
The panel session will cover current issues and problems in wireless security and approaches to dealing with them.
full textExtending Security Protocol Analysis: New Challenges
We argue that formal analysis tools for security protocols are not achieving their full potential, and give only limited aid to designers of more complex modern protocols, protocols in constrained environments, and security APIs. We believe that typical assumptions such as perfect encryption can and must be relaxed, while other threats, including the partial leakage of information, must be cons...
full textMy Resources
Journal title
volume 7 issue 2
pages 30- 15
publication date 2019-08
By following a journal you will be notified via email when a new issue of this journal is published.
No Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023