Next Article in Journal
Contactless Inductive Bubble Detection in a Liquid Metal Flow
Previous Article in Journal
Pedestrian Counting with Occlusion Handling Using Stereo Thermal Cameras
Article Menu

Export Article

Open AccessArticle
Sensors 2016, 16(1), 37; doi:10.3390/s16010037

Design and Development of Layered Security: Future Enhancements and Directions in Transmission

1
Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea
2
Department of Software Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea
3
Division of Biotechnology, College of Environmental & Bioresource Sciences, Chonbuk National University, Iksan 570-752, Korea
4
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea
5
Department of Beauty Arts Care, Koguryeo College, Naju 520-930, Korea
*
Authors to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Received: 5 October 2015 / Revised: 12 December 2015 / Accepted: 12 December 2015 / Published: 6 January 2016
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [3176 KB, uploaded 8 January 2016]   |  

Abstract

Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. View Full-Text
Keywords: supervisory control and data acquisition; distributed network protocol; dynamic cryptography buffer supervisory control and data acquisition; distributed network protocol; dynamic cryptography buffer
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Shahzad, A.; Lee, M.; Kim, S.; Kim, K.; Choi, J.-Y.; Cho, Y.; Lee, K.-K. Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors 2016, 16, 37.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top