Next Article in Journal
A Hypothesis for Self-Organization and Symmetry Reduction in the Synchronization of Organ-Level Contractions in the Human Uterus during Labor
Previous Article in Journal
An Application of Equivalence Transformations to Reaction Diffusion Equations
Previous Article in Special Issue
Development of Network Analysis and Visualization System for KEGG Pathways
Open AccessArticle

New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

1
Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chon Buk 561-756, Korea
2
Department of Fire Service Administration, Wonkwang University, Iksan 570-749, Korea
3
JINI Co. Ltd., B-102, Technobill, 109 banryong-load, Deokjin Gu, JeonJu si, Jeollabuk-do 561-756, Korea,
4
School of Computer Science, Colorado Technical University, CO 80907, USA
*
Authors to whom correspondence should be addressed.
Academic Editor: Sergei Odintsov
Symmetry 2015, 7(4), 1945-1980; https://doi.org/10.3390/sym7041945
Received: 30 May 2015 / Revised: 12 October 2015 / Accepted: 13 October 2015 / Published: 23 October 2015
(This article belongs to the Special Issue Advanced Symmetry Modelling and Services in Future IT Environments)
Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA) systems as a part of industrial control systems (ICS). SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment plants, and electricity generation and control stations. On the other hand, these systems have vulnerabilities like other traditional computer networks (or systems), especially when interconnected with open platforms. Many international organizations and researchers have proposed and deployed solutions for SCADA security enhancement, but most of these have been based on node-to-node security, without emphasizing critical sessions that are linked directly with industrial processing and automation. This study concerns SCADA security measures related to critical processing with specified sessions of automated polling, analyzing cryptography mechanisms and deploying the appropriate explicit inclusive security solution in a distributed network protocol version 3 (DNP3) stack, as part of a SCADA system. The bytes flow through the DNP3 stack with security computational bytes within specified critical intervals defined for polling. We took critical processing knowledge into account when designing a SCADA/DNP3 testbed and deploying a cryptography solution that did not affect communications. View Full-Text
Keywords: supervisory control and data acquisition; distributed network protocol; dynamic cryptography buffer; integrity and event polling supervisory control and data acquisition; distributed network protocol; dynamic cryptography buffer; integrity and event polling
Show Figures

Figure 1

MDPI and ACS Style

Shahzad, A.; Lee, M.; Kim, H.D.; Woo, S.-M.; Xiong, N. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions. Symmetry 2015, 7, 1945-1980.

Show more citation formats Show less citations formats

Article Access Map

1
Only visits after 24 November 2015 are recorded.
Back to TopTop