| Literature DB >> 26751443 |
Aamir Shahzad1, Malrey Lee2, Suntae Kim3, Kangmin Kim4, Jae-Young Choi5, Younghwa Cho6, Keun-Kwang Lee7.
Abstract
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.Entities:
Keywords: distributed network protocol; dynamic cryptography buffer; supervisory control and data acquisition
Mesh:
Year: 2016 PMID: 26751443 PMCID: PMC4732070 DOI: 10.3390/s16010037
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Research scope and study gap.
Figure 2Application-layer state-transition process with cryptography solution.
Figure 3Request header structure.
Figure 4Response-header structure.
Figure 5New logical fixing of ASDU.
Terminologies for system design and development.
| Notations | Descriptions |
|---|---|
|
| |
Figure 6APDU bytes flow with the DCB interaction: At the initial stage, the number of bytes is manipulated within the application-layer stack as a part of the DNP3 protocol. The black-color bytes are designated for user-manipulated bytes, while the red-color bytes c3: Application Control (AC), 01: Function Code (FC), 1e: Group, 02: Variation, 00: Qualifer, 04: Start, 07: Stop are operational, specified bytes of the application layer, and the remaining bytes such as 1e, ee, 1a, ee, 2a, and ee are security-implementation bytes. During implementation, the performances-measure lines in this figure show the overall byte flow within the stack, and the dynamic allocation of the DCB bytes depends on the APDU bytes.
Terminologies for security development.
| Notations | Descriptions |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 7Encryption process: application-layer implementation.
Figure 8Decryption process: application-layer implementation.
Figure 9Security test using embedded DNP3 security.
Figure 10Security test using end-to-end DNP3 security.
Figure 11Approximate security comparison.