Next Article in Journal
Research on a Lamb Wave and Particle Filter-Based On-Line Crack Propagation Prognosis Method
Next Article in Special Issue
Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility
Previous Article in Journal
Signal-Conditioning Block of a 1 × 200 CMOS Detector Array for a Terahertz Real-Time Imaging System
Previous Article in Special Issue
Joint Prior Learning for Visual Sensor Network Noisy Image Super-Resolution
Article Menu

Export Article

Open AccessArticle
Sensors 2016, 16(3), 322; doi:10.3390/s16030322

A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

1
Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea
2
School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China
3
Department of Business and Computer Science, Southwestern Oklahoma State University, Oklahoma, OK 73096, USA
4
Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea
5
Department of Orthopedic Surgery, Chonbuk National University Hospital, Jeonju 561-756, Korea
6
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Korea
7
Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia
8
Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Academic Editor: Xuefeng Liang
Received: 10 December 2015 / Revised: 22 January 2016 / Accepted: 25 January 2016 / Published: 3 March 2016
(This article belongs to the Special Issue Mobile Sensor Computing: Theory and Applications)
View Full-Text   |   Download PDF [3688 KB, uploaded 9 March 2016]   |  

Abstract

In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. View Full-Text
Keywords: supervisory control and data acquisition; industrial automation and control; remote sensing and monitoring; wireless sensor network; remote information analysis and visualization; human machine interface; protocols security; cryptography algorithms; cellular system supervisory control and data acquisition; industrial automation and control; remote sensing and monitoring; wireless sensor network; remote information analysis and visualization; human machine interface; protocols security; cryptography algorithms; cellular system
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Shahzad, A.; Lee, M.; Xiong, N.N.; Jeong, G.; Lee, Y.-K.; Choi, J.-Y.; Mahesar, A.W.; Ahmad, I. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks. Sensors 2016, 16, 322.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top