You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

3 March 2016

A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

,
,
,
,
,
,
and
1
Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea
2
School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China
3
Department of Business and Computer Science, Southwestern Oklahoma State University, Oklahoma, OK 73096, USA
4
Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea
This article belongs to the Special Issue Mobile Sensor Computing: Theory and Applications

Abstract

In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

1. Introduction

In the last two decades, a number of enhancements have been made in industrial sectors such as Water, Oil, Gas, and Electric. The communication methods have been changed from standalone systems to network based systems; furthermore, to fulfill the current communication demands of industries, there is also a requirement to connect the industrial remote (geographical) located stations to one or more centralized station. To connect several remote located stations, the best, most efficient and cost effective way is to use the wireless technologies (i.e., cellular, satellite, and others). Through the deployment of wireless technology, the industrial systems or the SCADA systems are able to access, monitor, and control their remotely located networked stations from a control center in minimal time; the wireless technology also overcomes the costs required with wired technology [,].
Human machine interface (HMI) is part of the SCADA system that provides interaction between supervisory control and data acquisition (SCADA) operators and devices. SCADA/HMIs are highly designed graphics-based interfaces in which a SCADA monitor and controlling systems are visualized; SCADA system operators use the HMI to manage the overall network structure and communication is usually displayed in the form of text (or text stream) and graphic symbols. SCADA systems are highly distributed network systems in which a number of field devices are located graphically and controlled for the main center; multimedia audio/video contents are employed at a remote location, embedded with processes, and monitored from the control center in case there is no operator available at that site [,]. Typically, SCADA field devices are designed for low bandwidth transmission over serial channels and the SCADA communication links and employed protocols are also limited for low bandwidth access, and are inadequate to accomplish the requirements of advance multimedia components such as audio/video. Thus, the SCADA system components need to be integrated with advanced communication networks to enable the employment or integration of advanced multimedia applications into the SCADA systems [,,,,].
With the arrival of new technology, SCADA systems are also connected to numbers of advanced networks such as LAN/WAN and cellular networks; significant changes have also been observed in SCADA protocol designs and network supported specifications, which are connected to the internet for faster multimedia information delivery via non-proprietary transport control protocol (TCP). This means that the SCADA messages are constructed then passed to lower layered protocols (e.g., TCP/IP and UDP), which are usually designed to manage and meet the needs of a high bandwidth corresponding to the transmission of SCADA multimedia applications [,,,,]. For example, the delivery time of SCADA messaging may typically be in the range of 10 ms to 100 ms, while the reliable and sequential delivery of messages (or packets) is also an important factor in the SCADA system. If we transmit the packets using SCADA serial protocols (e.g., DNP3 protocol and Modbus protocol) over Ethernet LAN using 100 Mbps transmission link, then a SCADA message (or multimedia message) can be sent in less than or within the range of 10 ms. However, converters and/or gateways such as 5201-DFNT-DNPM, Moxa NPort 6110, VLINX MODBUS, and PLX31-MBTCP-MBS are used during the transmitting of a message from SCADA serial protocols to TCP/IP protocols and vice versa. Nowadays, SCADA predominated protocols such as the DNP3 protocol and Modbus protocol are also available in TCP/IP versions as the DNP3 TCP/IP protocol and Modbus TCP/IP protocol, respectively; the frames are constructed according to protocol specifications and directly encapsulated into TCP/IP packets to ensure reliable transmission over LAN/WAN [,,,]. Moreover, the network architecture of the SCADA system is illustrated in Figure 1.
Figure 1. SCADA system and network components.
In SCADA system, DNP3 protocol has been considered as an major protocol due to its functionalities and reliable communication over the physical channels, but at the same time it has several security issues while travelling over the open networks and/or Internet [,]. As a consequence, the proposed study focuses on the DNP3 pseudo-transport layer security issues that most often occur during the transmission of fragments and a corresponding security mechanism or hashing function is deployed as a strong security wall that provides protection against adversaries (i.e., integrity attacks); however, this development is also able to test the other cryptography algorithms according to security demands. In addition, attack scenarios are defined in which attackers gain access to the fragments, user defined attacks are launched by employing various built-in tools for performance evaluation purposes, formal proofs are employed for validation purposes, and approximate communication is visualized as part of the multimedia technology.
The remainder of this research paper is organized as follows. Section 2 reviews the related works of study. Simulation Design and Environment is explained in Section 3, Section 4 describes the Pseudo-Transport layer message structure, Section 5 describes the Payload Design and Security Development, and Section 6 explains the Algorithm. In Section 7, Attacking Scenarios are defined, while the Setup and Abnormal Communication, as well as Measurement and Discussion are explained in Section 8 and Section 9. Multimedia Contexts are highlighted in Section 10. The significance of the study is discussed in Section 11 and Section 12 provides the conclusion and suggestions for future research.

3. Simulation Design and Environment

To measure the desired goals of current study, a simulation environment is designed for water pumping system as a part of wireless SCADA system. In wireless SCADA system, the field devices’ (or field sensors) are configured and directly connected with the sub-controllers, which are designated to carry the real time information from the sensors, or to monitor the real time information, as required by the main controller. The main controller is superior in the whole system design and network setup and is authorized to send the commands to the field sensors through the sub-controller(s). In water pumping system, as shown in Figure 3, only its two functional parts are considered: pumping for the cooler and pumping for the heater, the heating/cooling points are measured in-accordance to the normal set points that added at the time of configuration; and alarms are generated in-case the abnormal points or critical points will be measured from the field sensors. In wireless SCADA systems, each network node, such as sub-controller and main controller, is installed and configured using of DNP3 protocol as a part of SCADA system. Each time communication has occurrs between the nodes, the message is generated by deploying of DNP3 specified message structure and transmitted between the networked nodes, through employment of WAP (Wireless Application Protocol), the SCADA/DNP3 system would able to made the connection and to communicate wirelessly, to its remote located terminals (or remote field devices). In conclusion, the proposed study uses the SCADA/DNP3 protocol for messaging, the TCP/IP protocols to communicate over the Internet, and WAP for wireless communication; and moreover to secure the communication of wireless SCADA system, the cryptography hashing algorithm is deployed and tested at the pseudo-transport layer of SCADA/DNP3 protocol. The details for: message design, security design, security implementation, and security testing, are described in the below sections, of this study.
Figure 3. Simulation design and environment.

4. DNP3 Pseudo-Transport Layer

The pseudo-transport layer is the second layer of DNP3 after the application layer. The pseudo-transport layer takes the application protocol data units (APDUs) from the application layer of the DNP3 protocol and the upper layer bytes are treated as a transport service data unit (TSDU) or user bytes in the lower layer (or in the pseudo-transport layer). The main function performed by the transport layer is the disassembling and reassembling of bytes. The disassembling and reassembling processes allow a larger block of user data from the application layer to be handled easily by a data link layer []. In this research, transport protocol data units (TPDUs) are constructed as part of the DNP3 transport layer. Subsequently, control should be passed to the security development process where the hash function is applied using the SHA-2 hashing algorithm, as part of the cryptography mechanism.

Message Structure

The pseudo-transport layer breaks the TSDU into a number of units called transport protocol data unit (TPDUs) and each TPDU is made up of 250 bytes including 1 header byte. In Figure 4, 249 bytes are added with 1 byte of transport header (TH) information; this TH was originally named transport protocol control information (TPCI). In the case where a complete payload (or 2048 bytes information) has been received from the upper layer, the APDUs are then generated according to the payload size. In Figure 5, a total of eight TPDUs are generated and the remaining 56 bytes of the Application Protocol Data Unit (APDU) or 32 bytes of the cyclic redundancy check (CRC) from Link Protocol Data Unit (LPDU) would be employed for especial purposes. The size of each TPDU is fixed to 250 bytes because TPDU block could easily fit within a frame of the data link layer. This study made an alignment of the APDU which could be easily assembled within one segment (or TPDU) of the pseudo-transport layer.
Figure 4. Single TPDU block.
Figure 5. Multiple TPDU blocks.
The transport header is composed of three fields: FIR, FIN, and sequence number. Each TPDU is 250 bytes in length, which easily fits into the data link layer frame, called FT3. In Figure 6, the TH contains one byte of information and each bit has a specific function. The last two bits define the start and end of the TPDU sequence and the remaining six bits define the sequence counter.
Figure 6. Transport header field structure.

5. Payload Design and Security Development Using Hashing

Similar to other SCADA protocols, the initial design of the DNP3 protocol was also limited in terms of security, or the security design was associated with the physical parts of the system [,,,]. To fulfill the requirements of industrial processes and automations, SCADA systems are connected to almost all modern networks [,,]. To minimize the security falls that have been associated with communication of the SCADA system, several studies [,,,,,,,] have been conducted that provide node-to-node security protection against various vulnerabilities [,,,,,].The DNP3 application layer and data link layer security have been analyzed and various cryptography techniques have been suggested to enhance the security of these layers, but are still under development [,,]. As a consequence [,,,], security issues have seldom been considered for the pseudo-transport layer. The current research therefore emphasizes the pseudo-transport layer security issues and deploys a cryptography mechanism as the best approach to significantly enhance the security of this layer.
While the security development at the pseudo-transport layer is simple and straightforward, fulfilling the requirements of the pseudo-transport layer design, or its functional specifications, is more complex. However, we employed the C# tool to design and construct the transport layer bytes and employed the security development process using the SHA-2 hashing function. The entire development is also validated through proofs and evaluated through computed results.
This section is divided into three Sub-Sections: Section 5.1 Payload Design and Computation; Section 5.2 Security implementation; and Section 5.3 Proof of development. In Section 5.1, the transport layer payload is computed, and further described in Section 5.2 for the purposes of security computation. Section 5.3 demonstrates the proof of development from Section 5.1 and Section 5.2.

5.1. Payload Design and Computation

In the DNP3 stack, the pseudo-transport layer takes the APDU as the user bytes from the application layer, and assembles the upcoming bytes into TSDU (bytes). In the reassembling process, the transport layer receives each TPDU (bytes) from the data link layer, and the TH is then stripped off and the TSDU bytes are recreated (or reformed) from the tripping process of TPCI. The pseudo-transport layer is also responsible for ensuring the sequence of TPDUs during the TSDU reassembling process. Due to the disassembling/reassembling process of the pseudo-transport layer, the data link layer is able to handle the bulk of the data, but the functionality is finite in the transport layer of the open systems interconnection (OSI) model (as illustrated in Figure 7) [].
Figure 7. Interconnection between OSI model and DNP3 protocol.
The DNP3 protocol is a proprietary protocol and its design is limited for advanced IP based client/server applications; therefore, TCP/IP protocols are employed instead of the DNP3 physical layer, to communicate over networks such as LAN/WAN and over the internet. Figure 8 shows the pseudo-transport layer interrelation and flow of communication.
Figure 8. Logical interrelation and communication flow.
As described above, the overall development has been made in the C# platform and in a few available implicit code libraries. Examples are employed as references [], with user defined codes to validate the approximate and best development, according to the best of our knowledge. The following definitions demonstrated the pseudo-transport layer payload design, and its operations.
Definition 1 (Bytes Assembling): 
The number of user bytes “B” is received by the interaction of variable “Q” and “ f Q ” is an explicit dual non-linear function which assembles the upper layer bytes “ B A P D U ” with the lower layer bytes “ B T S D U ” and vice versa by the interaction of “Q”. However, since “B” is limited, an integer “ * ” (i.e., not negative integer) exists if “B” defines the limit as l i m k , such that,
B A P D U B T S D U f Q :   B A P D U B T S D U
Definition 2 (Bytes Dissembling): 
Assume b B , where “b” refers to the fixed/non-fixed number of user bytes during the disassembling process of “ B T S D U ”. In the case where i = 0 or i 0 is manipulated, then b B , such that,
B T S D U  
B ( b , k ) l i m k b i ( , n ) ,   i = 0 , 1 , 2 , 3 ,   ,   n 1 ,   n , b B l i m
Definition 3 (Payload): 
α ” is a variable that counts the number of bytes “b”, and the explicit user function “ f α ” is employed to manipulate the transport layer (TL) user bytes Q b ( lim , ) T L corresponding to the disassembling process, with header (h) functional bytes Q h , h T L , where Q ( h , b ) T L lim .

5.2. Bytes Alignment and Security Computational Bytes

During the payload design and computation, a keyword “limit” (lim) is defined, the purpose of which is twofold: (1) limit the number of bytes in each TSDU; and (2) limit the number of bytes in each TPDU. However, the size of TSDU is directly proportional to the size of APDU, but the size of each TPDU is limited to 249 bytes, plus 1 byte of header [,]. In this study, we limited the upper bytes (or APDU) size to 1992 bytes in both cases: request and response payload. This would further align with the TPDUs. For example, if we define the size of APDU as 1992 bytes, then eight equal TPDUs are created, as an addition to the transport protocol control information (APCI). This would also significantly protect information from non-legitimate users; fixed sized data is transmitted rather than variable size data.
For the alignment process of APDU and the fixing of TPDUs, the remaining 56 bytes are employed to keep track of security development and to protect sensitive information from unauthorized users. Hence, all remaining 56 bytes are not employed in this development, but are utilized and considered for other parts of the DNP3 protocol security enhancement purposes []. Some functions are deployed by employing the bytes from the total of 56 bytes, while the remaining functions are padded with zeros to be un-padded later for future developments. The functions details are as follows.
  • Payload Counter (Two Bytes): Payload (or TPDU) is created, and 250 bytes are counted in the payload counter. In the case where minimal bytes are defined, the remaining bytes are padded to protect the payload from data modification and reply attacks.
  • Hash Sequence Counter (One Byte): In the case where the number of TPDUs is defined by a single TSDU, the hashing sequence is counted in the range of 0–63, and should be recycled as 63–0 on the remote side. Two bits are used that designate the first and last hashing sequence in the defined range.
  • Security Method (One Byte): In the proposed study, SHA-2 hashing is deployed to protect the sensitive information of the transport layer against integrity attacks. However, this development is also able to test other algorithms such as secret key and public key algorithms. In this case, if multiple algorithms have been deployed, the dynamic selection is made by this functional field.
  • Padding Counter (Two Bytes): Initially, two bytes are defined that accumulate the number of padding bytes in the entire development. The size would be changed as required by this functional field by allocating bytes from dynamic storage (DS).
  • Acknowledge No (Two Bytes): Acknowledge flags are set at both sides of the communication. Therefore, acknowledgement is required at both sides followed by the acknowledgement number.
  • Useful Contents (One Byte): Typically, the payload contents are verified corresponding to the content list before being transmitted to the networks (or remote site).
  • Dynamic Storage (10–46 Bytes): Bytes are dynamically allocated to other fields, if required; or these bytes are reserved for future development.

5.3. Security Implementation

In the DNP3 protocol, the pseudo-transport layer performs a limited functionality of the transport layer and data link layer of the OSI model. As described, the functionality is fairly limited; therefore, the vulnerabilities are also limited, or a limited number of attacks are linked with the pseudo-transport layer [,]. In [,], three commonly potential attacks including Interruption, Modification, and Fabrication, with 32 instances, are counted against the pseudo-transport layer in terms of security, two of which are directly linked with the TPDU flags and their sequence in the DNP3 transmission. However, data modification, fake messaging, and byte interruption are considered as part of the current research. The SHA-2 hashing algorithm is deployed, and is considered in order to enhance the security of the pseudo-transport layer as part of the DNP3 protocol; this development is also able to test the other security algorithms [,].
In security implementation, the remote terminal station (RTU) is responsible for generating and sending responses according to the main controller request. The proposed work is based on a simulated environment and the scope is limited to pseudo-transport layer security; therefore, we do not give a detailed explanation of the phenomenon of the client/server architecture. The following steps are followed to deploy the SHA-2 algorithm, and to enhance the security of the pseudo-transport layer, while Table 3 summarizes the notations that are employed in the development.
Table 3. Security notations.
  • Q h , h T L , Q b ( lim , ) T L Q ( h , b ) T L is the transport layer payload that is being manipulated by security function H d i g e s t ( s , Q ) T L using SHA-2 algorithm. The maximum size of each Q ( h , b ) T L is 250 bytes, if a number of Q ( h , b ) T L are created then the hash sequence is counted to keep the track of each Q ( h , b ) T L . The original payload S e n d e r ( s ) :   Q ( s , h , b ) T L and computed security function H a s h ( H ) :   H d i g e s t ( s , Q ) T L are transmitted, while the parameter, which designates the sender information, is added.
  • Upon receiving at the other side, the receive hash digest H d i g e s t ( R , Q ) T L is computed based on the original payload S e n d e r ( s ) :   Q ( s , h , b ) T L and compared with H d i g e s t ( s , Q ) T L . As a consequence, if H d i g e s t ( R , Q ) T L = H d i g e s t ( s , Q ) T L then the payload would be accepted; otherwise, it is rejected in the case of H d i g e s t ( R , Q ) T L H d i g e s t ( s , Q ) T L .
In security development (or in Figure 9), the number of integrity attacks such as data modification, data detection, and data reply could be verified in the transmission and this would also be concluded in the security (or lack of security) of the pseudo-transport layer. More detail is described in Algorithm 1, in Section 6.
Figure 9. Security development Using hashing function.

6. Algorithm: Pseudo Code Transport Layer Message Construction with Security Design

  Algorithm 1: Transport Layer Security.
  Input: The input of Upper Layer Bytes.
  Output: Transport protocol data unit (TPDU), Hash digest.
  
  • The input of “n” bytes is received from upper layer. In pseudo-transport layer, these bytes are assembled as transport service data unit (TSDU) .Hence, the bytes are limited are upper layer therefore, we defined TSDU corresponding to APDU.

  TranLayer Header TH = 1 byte, TranLayerUserdate UD = 249 byte, TranLayer TPDU = 250 byte;
  Bytes TSDU [ ] = [ ]; Bytes H [ ] = [ ]; Bytes UD [ ] = [ ]; Bytes TPDU [ ] = [ ];
  
2.
TranTPDU ( )
{ Bytes TPDU [ ] = [H [ ] = [ ], UD [ ] = [ ]]; Bytes H [ ] = [Sequence No., FIR, FIN];
}

3.
TranTSDU ( )
{ Bytes TSDU [ ] = [TPDU1 [ ], TPDU2 [ ], TPDU2 [ ] ,………. , TPDUn [ ] ];
Where n = 1,2,3,……….., n and maximum size of each TSDU is equal to APDU size.
If TSDU [ ] = APDU [ ]
Print (“Process transport layer Information”);
else if TSDU [ ] = APCI [ ]
 Print (“Process transport layer Information corresponding to application header or APCI ”);
 Else Print (Unknown Communication);

4.
Cryptography ( )
{ RequestMessage M, j, Hash Digest HD ;
Hash ( ) //Sender function
{ Total Payload = Hash(M)
i = TPDU 0 + TPDU 1 + TPDU 2 + + TPDU n 1 + TPDU n ) , i = 1, 2, 3 ….limit. Here, i = TPDU 0 is defined, if only header bytes are manipulated and limit shows the maximum value, or maximum value of “n”.
Bytes M[ ] = [ ];
For ( i = TPDU 1 ; i <= TPDU n ; i++);
Print (“Add in to Hashing Buffer” +M[ ]);
     Sender : Hashing SHA 2 [ ( TPDU ) i ] = ( TPDU ) i __ Digest

5.
Hash ( ) //Receiver function
{ Total Payload = Hash(M)
Bytes M[ ] =[ ];
For ( i = TPDU n ; i <= TPDU 1 ; i--); Print (“Add in to Hashing Buffer” +M[ ]);
     Receiver : Hashing SHA 2 [ ( TPDU ) i ] = ( TPDU ) i __ Digest
Comparison: Receiver : ( TPDU ) i __ Digest = Sender : ( TPDU ) i _ _ Digest

6.
Conclusion: At sender side, hash function is deployed on TPDU and computed and compared at remote side (or at receiver side) to verify the integrity of payload (or APDU).

7. Attacking Scenarios

In the pseudo-transport layer header or transport protocol control information (TPCI), one byte is designed to represent the header information, six bits define the sequence number counter, and the remaining two bits are employed to designate the FIR and FIN frames of APDU (or fragment) [,]. In the transmission, the number of frames of a payload are sent and counted in sequence, where the FIR and FIN terms define the special meaning in the processing of the payload. In the case where the payload is transmitted with the FIR indication flag set, all the existing fragments (or partially-completed fragments) are then wasted, and are no longer considered. In some scenarios, the sensitive information of the pseudo-transport layer is interrupted.
  • In the reassembling process, the original payloads are disrupted; if a newer payload enters with the FIR flag set, the fragmented payload transmission subsequently starts.
  • The numbers of payload are transmitted and counted in the sequence counter while the sequence should be recycled at the remote side. An interruption is created during the manipulation of the incomplete (or partially completed) payload if the new payload is entered with the FIN indication flag set; as a consequence, the assembling process is closed, as it is untimely.
  • The APCI information is sensitive, and needs to be protected from unauthorized entities. The adversary has many chances to delete the payload information during transmission. The attacker uses sensitive information by using various capturing tools [] and deletes/modifies the flags set such as FIR and FIN, and at the remote side, the receiver assumes that the payload originates from a secure source.
  • In APCI, 6 bits are occupied by a sequence number (field) which ensures the transmission of a fragmented payload (APDU) in a sequence order. Each time, the fragment is created and transmitted, and the corresponding number is added to the sequence counter; thus, the transmitted and transmitting fragmented payloads are recorded with a unique sequence number. However, an attacker could have many chances to change the fragment sequence, monitor the traffic, and capture the fragments. Using a sequence number, an attacker employs various inject tools to change the sequence counter value and to inject a new fabricated fragment instead of an original fragmented payload []. As a consequence, there are many scenarios in which the sensitive information of the pseudo-transport layer can suffer from internal/external adversaries [,,].
Security approaches [,,,] have been proposed to hide sensitive information from attackers [,,,,,,,,,,,,,], but these security approaches are limited in terms of specification design, protocol dependencies, and transmission requirements [,]. To hide the information, cryptography approaches are considered as the best solutions for system security [,]; in a few cases, the encrypted information cannot be satisfied at the remote side, especially during decryption of the header [,,]; therefore, the best solution is to encrypt the user bytes, excluding the header bytes []. On the other hand, if header information is not secured, there is a chance an adversary [,] modifies the header with false information while replying to the message. Therefore, in this research paper, a hashing algorithm was employed that generates a fixed size security code and travels along the original payload that keeps the receiver aware of unauthorized opponents. In the following section, attacking tools are employed to interrupt the normal flow of the pseudo-transport layer as part of the DNP3 protocol, and the corresponding observed measurements are discussed.

8. Setup and Abnormal Communication

In a SCADA wireless network setup, the number of nodes is configured to exchange information with the main controller, although the total number of SCADA nodes is not discussed here because of unicasting communication; the system is designed according to the terminologies of an unbalanced system in which only the main controller is authorized to initial communication with the remote controller(s) []. However, the terms such as balanced and unbalanced, which are defined at the data link layer, are not part of the pseudo-transport layer. Therefore, this study does not specifically emphasize these terms, but we conclude that, to the best of our knowledge, the unbalanced system is more appropriate than the balanced system for this study.
To interrupt the logical normal flow of the pseudo-transport layer, predominated attacking tools such as airpwn, file2air with wireshark, and injection tools, are used which perform traffic monitoring and frames (or fragments) captured as an attacker of the system []. However, security development is limited to an integrity security service; thus, the attacks such as fragment injection, payload replay, and payload deletion are considered as corresponding to the proposed security implementation.

9. Measurement and Discussion

DNP3 protocol unitization has been massively increasing (i.e., 70%) in SCADA systems []. Due to the lack of security precautions in the initial design of the DNP3 protocol, several potential adversaries take advantage of the DNP3 protocol’s vulnerable platform [,]. The current study employs a hashing function to enable awareness between the SCADA and DNP3 nodes, if transmission is interrupted by network adversaries. This research paper also deals with various developments of multimedia based security followed by communication requirements, although the study scope is limited to the pseudo-transport layer, as a layer of the DNP3 protocol.
To compute the performance measurements, random size fragment payloads are generated several times and transmitted between the main controller and the remote controller and vice versa; however, each fragment is limited to 1–250 bytes in length. In the case where no TSDU bytes are assembled from the upper layer, only the TPCI is transmitted with the computed hashing code. In the transmission, each fragment hash digest is calculated before transmitting to the remote side; the fixed hash code (or digest) travels along the original payload and is again computed at the receiver side to verify the contents of the payload. Of all the experiments, 200 are selected as the best experiments according to the best of our knowledge, and further performances such as attacks detection and security assessment, are also based on these selected experiments. Figure 10 shows the 200 successful experiments that are tested with random size payloads (or segments) and received at the remote side, whereby the first half of all the experiments are designated for sending to the payload and the remaining half are designated for the response payload. Each half is separated by a line.
Figure 10. Traffic: (left): Main Controller; (right) Remote Terminal Unit.
Figure 11 and Figure 12 show the 200 successful attacks experiments that are tested with random size payloads (or segments), whereby 100 successful experiments are designated for sending to the payload and the remaining 100 as shown in Figure 12 are designated for the response payload.
Figure 11. Attacks: Main controller traffic.
Figure 12. Attacks: Remote terminal unit traffic.
To evaluate the performances, preliminary packet analyzer tools such as wireshark, dSniff, Kismet, ethereal, and ettercap are employed which analyze the packets (or fragments), as a consequence, and approximately 192 times fragments are intercepted in the transmission. Thus, we can conclude that the DNP3 pseudo-transport layer has a lack of security design, or the DNP3 pseudo-transport layer was designed without considering any security. In [,,], the number of attacks is defined and detected as part of the SCADA system, and security mechanisms are also used that protect the SCADA communication against several potential attacks and ensure the SCADA platform is invulnerable [,,,,]. However, security is accounted in SCADA systems or/and SCADA protocols, with the exception of the deliberation of pseudo-transport layer security.
During the fragments interception shown in Figure 11 and Figure 12, the SCADA nodes are configured without any security paradigms such as firewalls, demilitarized zone (DMZ), antivirus protection, etc., which determine the approximate security level during the transmission of fragmented payloads. However, if payload security was enhanced, the receiver would also be made aware of adversaries by contents verification. The fragmented payload hash digest is computed 200 times and transmitted along the original payload; upon receiving, the receiver also computes the hash digest of the original payload to compare with the sender hash digest. If two hash digest values are matched, then the receiver assumes that the payload came from an original source; otherwise, the payload contents are discarded and the exception (i.e., payload contents have not been verified, there is chanced of adversary in transmission), is generated against the adversary.
In the existing studies [,,,], several limitations of SHA-2 hashing function are analyzed and creaking tools are employed; it is also assumed that the hash code is breakable. However, we did not fully succeed in breaking the computed hashing codes, or the results were captured with zero impact. In the case where the computed hashing values are breakable, we propose a method called a digital signature to resolve these issues. In this method, a fragmented payload hash digest is computed H d i g e s t ( S , Q ) T L and a private key is deployed on the hash digital P r ( k , S ) (   H d i g e s t ( S , Q ) T L ), which acts as a digital signature. The original payload Q ( S , h , b ) T L and digital signature P r ( k , S ) ( h d i g e s t ( S , Q ) T L ) are then encrypted with a public key P u ( k , R ) of the receiver(R) as P u ( k , R ) ( Q ( S , h , b ) T L ,     P r ( k , S ) ( h d i g e s t ( S , Q ) T L )), and transmitted to the remote side. Upon receiving, the receiver uses the sender (S) public key P u ( k , S ) and the private key P r ( k , R ) of the receiver(R) to open (or decrypt) the original payload Q ( S , h , b ) T L and hash digest H d i g e s t ( S , Q ) T L . Subsequently, the hash digest of Q ( S , h , b ) T L is calculated, and is designated as H d i g e s t ( R , Q ) T L and compared with H d i g e s t ( S , Q ) T L . The keys such as private keys and public keys are defined and generated using an RSA algorithm; however, the keys are distributed statistically among the network nodes. As a consequence, we concluded that the hash digest is secured and the payload contents are not altered during transmission, even in cases of adversary. In study [], the attack scenarios were conducted, in which the authentication and confidentiality attacks such as brute force, cryptography key cracking, eavesdropping, and man-in-the-middle are launched 200 times and the numbers of detected attacks are counted and visualized [,]. As a result, minimal impact is computed that is so far able to break the hash digest; also, it is very difficult for an adversary to inject, modify, and delete the sensitive information of the payload.

10. Multimedia Contexts

In this study, various multimedia contexts are employed in the form of text and images. The human machine interface (HMI) is designed and installed at both sides of the transmission. The basic configuration and setup, including the connection type (i.e., TCP/IP), IP addresses, Port numbers, Channel setting, etc. required between the main controller and the remote controller are visualized as part of HMI. During transmission, the total number of bytes fragmented in the case of sending and responding (as part of the pseudo-transport layer), are also visualized which make it convenient for the end user prospective. The fragments flow in sequence and are shown on HMI at both sides of the transmission; the end users or operators can check the flow of fragments during the construction and distribution at both sides using sharing media (i.e., team viewer etc.), which also determines the effects of networks adversaries, in the case where abnormal flows are visualized.
In a few cases, the main controller requires exceptional reports and screen shots (or images) of the physical setup, such as sensors, actuators, PLCs, and hardware devices; the information is then secured from the network adversaries, the images are transmitted in compressed form in order to minimize the memory space, and the security using the SHA-2 algorithm is deployed before responding to the main controller. Normally, SCADA systems are designed and used for low bandwidth; therefore, hashing is considered a secure and reliable approach [,]. In the case where there are potential adversaries that successfully break the hashing value, a digital signature is considered as the best approach according to the best of our knowledge and according to our measurements.

11. Significance of Study

Hashing is a good approach which verifies the payload contents by comparing the computed hashing values of the sender and receiver. In this study, pseudo-transport layer security issues are analyzed and the SHA-2 hashing algorithm is selected and deployed on the fragmented payload; TPDU is made up of user bytes and a header byte, while the FIR, FIN, and sequence number are part of TPCI. In the case where an adversary causes an interruption (i.e., injection, modification, and deletion) by means of FIR, FIN, and sequence number, he/she cannot be successful because the hash digests are computed at both sides and compared at the remote side; if he/she is successful, the digital signature is computed for the hash value(s). As a consequence, the overall transmission is secured from the adversaries. This study also employed various multimedia contexts in the form of text and images, while security development and communication have been demonstrated to make information more convenient and reliable for the user.

12. Conclusions and Future Work

This study used a simulation based environment of water pumping system, and SCADA wireless sensors based network system to deploy the cryptography mechanism while communicating over unsecured network, or over Internet communication. Furthermore, the main security issues realized during the pseudo-transport layer disassembly and reassembling process are highlighted and a security solution using the SHA-2 hashing function is deployed, which ensures the integrity of bytes received/transmitted from/to the data link layer. Therefore, a DNP3 pseudo-transport layer stack has been designed and evaluated from formal evidence, security implementation is employed, and evidence is given of the protection against byte verification issues.
In future work, the SCADA system information will be accessed and monitored via cellular phones; and the SCADA/DNP3 testbed attack (abnormal) setup will be developed and simulation tools or software will be used to test the integrity attacks such as packet/data injection, packet/data replay, and data (byte) deletion and others. The security percentage will be measured based on the attack impact percentage on the overall system (or at the pseudo-transport layer stack). The other cryptography functions such as asymmetric and symmetric will also be deployed and security results will be validated against attacks such as shared key guessing, brute force, cracking key, man-in-the-middle, and others.

Acknowledgments

This paper was supported by research funds of Wonkwang University in 2016. This research was supported by Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2014M3C4A7030503).

Author Contributions

In this research, Aamir Shahzad, Malrey Lee and Neal Naixue Xiong conceived and designed the experiments; Aamir Shahzad, Gisung Jeong and Young-Keun Lee performed the experiments; Aamir Shahzad, Jae-Young Choi and Abdul Wheed Mahesar analyzed the data; Aamir Shahzad, Malrey Lee and Iftikhar Ahmad Khan contributed materials/analysis tools; Aamir Shahzad, Malrey Lee and Neal Naixue Xiong wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheung, R.; Fung, Y. Wireless access to SCADA system. In Proceedings of the 2000 International Conference on Advances in Power System Control, Operation and Management, Hong Kong, China, 30 October–1 November 2000; pp. 553–556.
  2. Flammini, A.; Ferrari, P.; Marioli, D.; Sisinni, E.; Taroni, A. Wired and wireless sensor networks for industrial applications. Microelectron. J. 2009, 40, 1322–1336. [Google Scholar] [CrossRef]
  3. Escudero, J.I.; Rodriguez, J.A.; Romero, M.C.; Luque, J. IDOLO: Multimedia data deployment on SCADA systems. In Proceedings of the Power Systems Conference and Exposition, New York, NY, USA, 10–13 October 2004; pp. 252–257.
  4. Escudero, J.I.; Rodriguez, J.A.; Romero, M.C.; Diaz, S. Deployment of digital video and Audio Over electrical SCADA networks. IEEE Trans. Power Deliv. 2005, 20, 691–695. [Google Scholar] [CrossRef]
  5. Morsi, I.; el Deeb, M.; El Zwawi, A. SCADA/HMI Development for a Multi Stage Desalination Plant. In Proceedings of the Computation world 09. Computation World Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, Athens, Greece, 15–20 November 2009; pp. 67–71.
  6. Laurence, K.; Rémi, B. The synergy between system modelization and HMI modelization: Application on a workbench HMI. In Proceedings of the 2014 Ergonomie et Informatique Avancée Conference—Design, Ergonomie et IHM: Quelle articulation pour la co-conception de l’interaction (Ergo’IA ‘14), New York, NY, USA, 15 October 2014; pp. 122–129.
  7. Adnan, S.; Vlatko, M.; Zoran, C.; Elvedin, K.; Nina, D. Web based multilayered distributed SCADA/HMI system in refinery application. Comput. Stand. Interfaces 2009, 31, 599–612. [Google Scholar]
  8. Mander, T.; Nabhani, F.; Wang, L.; Cheung, R. Data Object Based Security for DNP3 Over TCP/IP for Increased Utility Commercial Aspects Security. In Proceedings of the Power Engineering Society General Meeting, Tampa, FL, USA, 24–28 June 2007; pp. 1–8.
  9. Ortega, A.; Akira Shinoda, A. Simulation in NS-2 of DNP3 protocol encapsulated over TCP/IP in smart grid applications. In Proceedings of the 2013 IEEE PES Conference on Innovative Smart Grid Technologies Latin America (ISGT LA), Chicago, IL, USA, 15–17 April 2013; pp. 1–8.
  10. Haydn, A.T. Wireless and Internet communications technologies for monitoring and control. Control Eng. Pract. 2004, 12, 781–791. [Google Scholar]
  11. Musa, S.; Aborujilah, A. Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, Kota Kinabalu, Malaysia, 17–19 January 2013.
  12. Huitsing, P.; Chandia, R.; Papa, M.; Shenoi, S. Attack taxonomies for the Modbus protocols. Int. J. Crit. Infrastruct. Prot. 2008, 1, 37–44. [Google Scholar] [CrossRef]
  13. East, S.; Butts, J.; Papa, M.; Shenoi, S. A Taxonomy of Attacks on the DNP3 Protocol. Crit. Infrastruct. Prot. 2009, 3, 67–81. [Google Scholar]
  14. Shahzad, A.; Lee, M.; Kim, S.; Kim, K.; Choi, J.-Y.; Cho, Y.; Lee, K.-K. Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors 2016, 16. [Google Scholar] [CrossRef] [PubMed]
  15. Sugwon, H.; Lee, M. Challenges and Direction toward Secure Communication in the SCADA System. In Proceedings of the Communication Networks and Services Research Conference (CNSR), Montreal, QC, Canada, 11–14 May 2010.
  16. Gao, J.; Liu, J.; Rajan, B.; Nori, R.; Fu, B.; Xiao, Y.; Liang, W.; Chen, P. SCADA communication and security issues. Secur. Commun. Netw. 2014, 7, 175–194. [Google Scholar] [CrossRef]
  17. Kim, H. Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2012, 2012. [Google Scholar] [CrossRef]
  18. Lee, D.; HakJu, K.; Kwangjo, K.; Yoo, P.D. Simulated Attack on DNP3 Protocol in SCADA System. In Proceedings of the 31th Symposium on Cryptography and Information Security, Kagoshima, Japan, 21–24 January 2014.
  19. Willig, A.; Matheus, K.; Wolisz, A. Wireless Technology in Industrial Networks. IEEE Proc. 2005. [Google Scholar] [CrossRef]
  20. Gordon, C.; Deon, R.; Edwin, W. Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems; Elsevier: New York, NY, USA, 2004; pp. 73–129. [Google Scholar]
  21. Susanto, I.; Jackson, R.; Paul, D.L. Industrial Process Control System Security. In Wiley Handbook of Science and Technology for Homeland Security; John Wiley & Sons: Hoboken, NJ, USA, 2009; pp. 1–15. [Google Scholar]
  22. Jeffrey, L.; Hieb, J.H.; Graham, S.C. Cyber Security Enhancements for SCADA and DCS Systems. ISRL-TR-07-02, Intelligent Systems Research Laboratory; Technical Report TR-ISRL-07-02; University of Louisville: Louisville, KY, USA, 2007. [Google Scholar]
  23. Steve, G. The SCADA challenge: Securing critical infrastructure. Netw. Secur. 2009, 2009, 18–20. [Google Scholar]
  24. Igor Nai, F.; Andrea, C.; Marcelo, M.; Alberto, T. An experimental investigation of malware attacks on SCADA systems. Int. J. Crit. Infrastruct. Prot. 2009, 2, 139–145. [Google Scholar]
  25. Patel, S.C.; Bhatt, G.D.; Graham, J.H. Improving the cyber security of SCADA communication networks. Commun ACM 2009, 52, 139–142. [Google Scholar] [CrossRef]
  26. Hieb, J.; Graham, J.; Patel, S. Security Enhancements for Distributed Control Systems, Critical Infrastructure Protection. IFIP Int. Fed. Inf. Process. 2008, 253, 133–146. [Google Scholar]
  27. Kim, H.M. A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. In Proceedings of the Future Generation Communication and Networking, Jeju-Island, Korea, 6–8 December 2007.
  28. Azeem, I.; Muhammad, S.; Muhammad, S.F. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Netw. 2014, 7, 1210–1218. [Google Scholar]
  29. Seongan, L.; Eunjeong, L.; Cheol-Min, P. Equivalent public keys and a key substitution attack on the schemes from vector decomposition. Secur. Commun. Netw. 2014, 7, 1274–1282. [Google Scholar]
  30. Vyas, P. Wireless Sensor Networks for Industrial Process Monitoring and Control with Security Architecture: A survey for Research Issues. IJESRT 2013, 2, 930–936. [Google Scholar]
  31. Anupam, S.; Om, P.; Zia, S. Public Key Cryptography Based Approach for Securing SCADA Communications, Computer Networks and Information Technologies. Commun. Comput. Inf. Sci. 2011, 142, 56–62. [Google Scholar]
  32. Martin, D.; Maricel, B. Cipher for Internet-based Supervisory Control and Data Acquisition Architecture. J. Secur. Eng. 2011, 8, 337–348. [Google Scholar]
  33. Shahzad, A.; Musa, S.; Irfan, M. N-Secure Cryptography Solution for SCADA Security Enhancement. Trends Appl. Sci. Res. 2014, 9, 381–395. [Google Scholar] [CrossRef]
  34. Fujisaki, E.; Okamoto, T. Secure integration of asymmetric and symmetric metric encryption schemes. In Advances in Cryptology—CRYPTO’99; LNCS; Spring-Verlag: Berlin, Germany, 1999; pp. 537–554. [Google Scholar]
  35. He, D.; Chen, J.; Chen, Y. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. 2012, 5, 1423–1429. [Google Scholar] [CrossRef]
  36. Robles, R.-J.; Balitanas, J. Comparison of Encryption Schemes as Used in Communication between SCADA Components. Ubiquitous Comput. Mult. Appl. 2011. [Google Scholar] [CrossRef]
  37. Shahzad, A.; Musa, S.; Irfan, M.; Asadullah, S. Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement. J. Appl. Sci. 2014, 14, 2487–2497. [Google Scholar] [CrossRef]
  38. Chen, Y.; Dong, Q. RCCA security for KEM + DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. Secur. Commun. Netw. 2014, 7, 1219–1231. [Google Scholar]
  39. Rosslin, J.R.; Maricel, B.; Tai-hoon, K. Security Encryption Schemes for Internet SCADA: Comparison of the Solutions. Commun. Comput. Inf. Sci. 2011, 223, 19–27. [Google Scholar]
  40. Sandip, C.P. Secure Internet-Based Communication Protocol for Scada Networks. Ph.D. Thesis, University of Louisville, Louisville, KY, USA, 2006. [Google Scholar]
  41. Ralston, P.A.S.; Graham, J.H.; Hieb, J.L. Cyber security risk assessment for SCADA and DCS networks. ISA Trans. 2007, 46, 583–594. [Google Scholar] [CrossRef] [PubMed]
  42. Gilchrist, G. Secure authentication for DNP3. In Proceedings of the Power and Energy Society General Meeting—Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, Pittsburgh, PA, USA, 20–24 July 2008; pp. 1–3.
  43. Majdalawieh, M.; Parisi-Presicce, F.; Wijesekera, D. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. Adv. Comput. Inf. Syst. Sci. Eng. 2006, 3, 227–234. [Google Scholar]
  44. Shahzad, A.; Lee, M. The Protocol Design and New Approach for SCADA Security Enhancement during Sensors Broadcasting System. Multimed. Tools Appl. Springerlink 2015. [Google Scholar] [CrossRef]
  45. Helena, H.; Henri, G. Evaluation Report, Security Level of Cryptography—SHA-256, 2002. Available online: http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1045_IPA-SHA256.pdf (accessed on 1 October 2015).
  46. Somitra, K.S.; Palash, S. A new hash family obtained by modifying the SHA-2 family. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, NSW, Australia, 10–12 March 2009.
  47. Florian, M.; Tomislav, N.; Martin, S. Finding SHA-2 characteristics: Searching through a minefield of contradictions. In Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT′11), Seoul, Korea, 4–8 December 2011; pp. 288–307.
  48. Henri, G.; Helena, H. Security Analysis of SHA-256 and Sisters. Sel. Areas Cryptogr. Lect. Notes Comput. Sci. 2004, 3006, 175–193. [Google Scholar]
  49. Shahzad, A.; Lee, M.; Lee, Y.; Kim, S.; Xiong, K.; Choi, J.; Cho, Y. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information. Symmetry 2015. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.