| Literature DB >> 27314351 |
Aamir Shahzad1,2, René Landry3, Malrey Lee4, Naixue Xiong5,6, Jongho Lee7, Changhoon Lee8.
Abstract
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.Entities:
Keywords: Human Machine Interface; cellular protocols and networks; embedded protocol security; information analysis and visualization; intelligent sensor networks; security issues; supervisory control and data acquisition system; transmission flows
Year: 2016 PMID: 27314351 PMCID: PMC4934247 DOI: 10.3390/s16060821
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A cellular system.
Figure 2M2M cellular communications.
Figure 3A Mobile-based SCADA application [53].
The Description of DNP3 Layers.
| DNP3 Layers | Header Length | User Data Length | Description |
|---|---|---|---|
| Application layer | 2–4 bytes | 2044–2046 bytes | 2 bytes of header and 2046 ASDU bytes in the case of message request. |
| Pseudo-transport layer | 1 byte | 249 bytes | 1 byte of header is added with each data blocks in cases, message requests or message responses. |
| Data link layer | 10 bytes | 250 bytes | 10 bytes of link header is added with each upcoming TPDUs, in-cases of message requests or message responses. |
Figure 4The Basic structure of the SCADA/DNP3 protocol.
Terminologies for System Model and Design.
| Notations | Descriptions |
|---|---|
| Number of Sub-controllers. | |
| Number of Field Sensors. | |
| Number of cellular gateway | |
| Information that retrieved from Main Controller | |
| Number of k functional operation. | |
| Ccontrollers | |
| Uppen Layer Bytes. | |
| Link Frame LF is fromed by adding of assembled bytes | |
| [ | Protocol header bytes, such that: |
| Bytes Assembling function. | |
| Cryptography functions: Encryption (Ey) function | |
| DI | Device installer DI |
| SCT | Secure certificate |
| Bytes Updated inside security development controller (SDC). | |
| Main Controller Authentication | |
| RSS | Refresh Secure Session RSS |
| SS | Secure Session |
| DL | Device Logon, |
Figure 5System design and setup.
Security Development Controller.
| Security Development Controller | ||
|---|---|---|
| Field’s Name | Length | Description |
| External addresses | 4 bytes | Four bytes are defined for external source and destination addresses. The data link layer provides and maintains a reliable logical connection between the SCADA/DNP3 master and slaves (or between the master unit and sub-controllers), and addresses are also specified by this layer. In a few cases, encrypted data link layer frames (or LPSUs) might not verify at the receiver side, this is because the data link layer header (or LPCI) is also transmitted as hidden bytes. Therefore, external addresses are defined and transmitted with encrypted information. The sub-controller also verifies the message contents (or encrypted header information) corresponding to external address information [ |
| Security checker | 1 byte | Security checker function is defined that ensures the security development via cryptography, and also generates an exception in case of security failure (or unsuccessful deployment). |
| Acknowledgment | 1 byte | One external byte is employed for acknowledgment purposes. |
| Critical/non-critical | 2 bytes | Two bytes are defined as critical or non-critical bytes which check the normal and abnormal flow of traffic. |
| Selected Method | 1 byte | The selected method (or changed method) function is employed which will dynamically change the security method or security algorithm. For example, in this research three algorithms (AES, RSA and SHA-2) are employed to enhance the security of the SCADA/DNP3 system. The RSA algorithm is not appropriate for SCADA/DNP3 broadcasting due to number of keys required in transmission, but it is appropriate for unicasing [ |
| Key sequence | 1 byte | Keeps the information of cryptography keys in sequential order during generation and distribution. |
| Optional | 1 byte | An optional function is deployed that verifies the contents of messages before transmitting them to an open network, |
| User bytes controller | 4 bytes | Four bytes are deployed that keep track of the data link layer byte information such as the number of link service data unit (LSDU) bytes from the upper layer, LPDU bytes and security computation bytes. |
| Dynamic storage, padding and future use | 16–34 bytes | These bytes are occupied by dynamic fields designated as dynamic storage and dynamic padding. Dynamic storage allocated the bytes to the existing fields, if they are required and in-case a new function will be added. The security development has been made and remaining bytes are padded with zeros. |
Figure 6The Cellular device secure login.
Figure 7The SCADA cellular interface.
Figure 8The transmission of bytes from a sub-controller to a main controller.
Figure 9The transmission of bytes received at the main controller and transmission errors
Figure 10The transmission of bytes sent from the main controller to a cellular device.
Figure 11Bytes received at the cellular device and transmission errors.