| Literature DB >> 26950129 |
Aamir Shahzad1, Malrey Lee2, Neal Naixue Xiong3,4, Gisung Jeong5, Young-Keun Lee6, Jae-Young Choi7, Abdul Wheed Mahesar8, Iftikhar Ahmad9.
Abstract
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.Entities:
Keywords: cellular system; cryptography algorithms; human machine interface; industrial automation and control; protocols security; remote information analysis and visualization; remote sensing and monitoring; supervisory control and data acquisition; wireless sensor network
Year: 2016 PMID: 26950129 PMCID: PMC4813897 DOI: 10.3390/s16030322
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1SCADA system and network components.
Figure 2DNP3 protocol model.
Attack taxonomy for the DNP3 pseudo-transport layer.
| No. | Attacks | Attacks Instances (Description) |
|---|---|---|
| 1 | Passive Network Reconnaissance | Interception of main station, sub-controller, and network information. |
| 2 | Baseline Response Replay | Interruption, modification, and fabrication of the main station and sub-controller. |
| 3 | Rogue Interloper | Interruption, modification, and fabrication of the main station, sub-controller, and network information. |
| 4 | Fragment Interruption | Interruption of the main station and sub-controller. |
| 5 | Sequence Modification | Interception of Main Station, sub-controller, and network information. |
Attack taxonomy for the DNP3 data link layer.
| No. | Attacks | Attacks Instances (Description) |
|---|---|---|
| 1 | Passive Network Reconnaissance | Interception of main station, sub-controller, and network information. |
| 2 | Baseline Response Replay | Interruption, modification, and fabrication of the main Station and sub-controller. |
| 3 | Rogue Interloper | Interruption, modification, and fabrication of the main station, sub-controller, and network information. |
| 4 | Length Overflow Attack | Interruption and modification of the main station and sub-controller. |
| 5 | Flag Attack | Interruption of sub-controller. |
| 6 | Reset Function Attack | Interruption and modification of the main station and sub-controller |
| 7 | Unavailable Function Attack | Interruption of the main station |
| 8 | Destination Address Alteration | Interruption, modification, and fabrication of the main station, sub-controller, and network information |
Figure 3Simulation design and environment.
Figure 4Single TPDU block.
Figure 5Multiple TPDU blocks.
Figure 6Transport header field structure.
Figure 7Interconnection between OSI model and DNP3 protocol.
Figure 8Logical interrelation and communication flow.
Security notations.
| Notations | Description |
|---|---|
| Assembled bytes. | |
| Disassembled bytes. | |
| Manipulated header bytes. | |
| Manipulated data bytes, after disassembling. | |
| K is dual integer that defines the limit (lim). | |
| User defined index pointer. | |
| User defined hashing function. | |
| Hashing comparison function. | |
| User defined relation function. | |
| User defined bytes separator function. |
Figure 9Security development Using hashing function.
Figure 10Traffic: (left): Main Controller; (right) Remote Terminal Unit.
Figure 11Attacks: Main controller traffic.
Figure 12Attacks: Remote terminal unit traffic.