Next Article in Journal
Contactless Inductive Bubble Detection in a Liquid Metal Flow
Previous Article in Journal
Pedestrian Counting with Occlusion Handling Using Stereo Thermal Cameras
Open AccessArticle

Design and Development of Layered Security: Future Enhancements and Directions in Transmission

1
Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea
2
Department of Software Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea
3
Division of Biotechnology, College of Environmental & Bioresource Sciences, Chonbuk National University, Iksan 570-752, Korea
4
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea
5
Department of Beauty Arts Care, Koguryeo College, Naju 520-930, Korea
*
Authors to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Sensors 2016, 16(1), 37; https://doi.org/10.3390/s16010037
Received: 5 October 2015 / Revised: 12 December 2015 / Accepted: 12 December 2015 / Published: 6 January 2016
(This article belongs to the Section Sensor Networks)
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. View Full-Text
Keywords: supervisory control and data acquisition; distributed network protocol; dynamic cryptography buffer supervisory control and data acquisition; distributed network protocol; dynamic cryptography buffer
Show Figures

Figure 1

MDPI and ACS Style

Shahzad, A.; Lee, M.; Kim, S.; Kim, K.; Choi, J.-Y.; Cho, Y.; Lee, K.-K. Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors 2016, 16, 37.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

1
Back to TopTop