skip to main content
10.1145/2448556.2448587acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Simulation base implementation for placement of security services in real time environment

Published: 17 January 2013 Publication History

Abstract

SCADA (Supervisory Control and Data Acquisition) is a real time systems that are deployed over real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. These systems were connected with local area network or limited networks but now with the latest technology and facilities in real time infrastructure these systems are also moving from local area network to the internet. Using internet communication, these systems are attacked by several attacks therefore these systems need protection from different kinds of attacks/threads to secure communication between devices that are communicating with SCADA environment. The current research takes the Hybrid-based Cryptography solution using "Symmetric AES and Asymmetric RSA algorithms" to secure the SCADA communication by implementing security services such as authentication, confidentiality, and Non- Repudiation. Simulation environment is used to verify propose a solution is implemented properly between Master Terminal Unit (MTU) and Remote Terminal Unit (RTUs) during the transmission of payload (data) in a wireless network.

References

[1]
R. A. Hamid, Wireless LAN: Security Issues and Solutions, SANS, Institute, www.sans.org/wireless/wireless-lan-security-issues.
[2]
James H. Graham, Sandip C. Patel Security, Considerations in SCADA Communication Protocols, September 2004, www.cs.louisville.edu/facilities/ISLab/tech%20papers/ISR
[3]
A. Goel, R. S. Mishra, Remote Data Acquisition Using Wireless - Scada System, International Journal of Engineering (IJE), Volume (3): Issue (1).
[4]
Rosslin John Robles and Min-Kyu Choi, Symmetric-Key Encryption for Wireless Internet SCADA, Springer-Verlag Berlin Heidelberg, Communications in Computer and Information Science, Volume 58, 289--297. 2009, www.springerlink.com/index/h87867t126455l11
[5]
Chengzhi Li Bettati, R. Wei Zhao, Dept. of Compute. Sci., Texas A&M Univ., College Station, TX, Response time analysis for distributed real-time systems with bursty job arrivals, http://ieeexplore.ieee.org/Xplore
[6]
Eduardo B. Fernandez, Jie Wu, M. M. Larrondo-Petrie, Yifeng Shao, On Building Secure SCADA Systems using Security Patterns, ACM conference, April 13--15 2009, http://portal.acm.org/citation.cfm?id=1558627
[7]
M. D. Hadley, K. A. Huston, T. W. Edgar, American Gas Association (AGA), Report No. 12 Part 2. Cryptographic Protection of SCADA Communications: Retrofit Link Encryption for Asynchronous Serial Communications, IEEE, Aug 2007, www.waterresearchfoundation.org/research/.../2969/AGA
[8]
Sandip C. Patel, Ganesh D. Bhatt, and James H. Graham, Improving the cyber security of Scada communication Network, Communication of ACM, Vol 52 No. 7, July 2009, http://portal.acm.org/citation.cfm?id=1538820
[9]
Mahesh Jethanandani and CERT-FI, CERT Vulnerability Report in TCP, April 20, 2004, http://www.us-cert.gov/cas/techalerts/TA04-111A
[10]
DNP3 Organization homepage: http://www.dnp.org/
[11]
Modbus Organization. http://www.modbus.com/

Cited By

View all
  • (2022)Extending the Unified Theory of Acceptance and Use of Technology for COVID-19 Contact Tracing Application by Malaysian UsersSustainability10.3390/su1411681114:11(6811)Online publication date: 2-Jun-2022
  • (2022)Conceptual Model for Automating GDPR Compliance Verification Using Natural Language Approach2022 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)10.1109/ITSS-IoE56359.2022.9990931(1-6)Online publication date: 3-Dec-2022
  • (2015)A SCADA intermediate simulation platform to enhance the system security2015 17th International Conference on Advanced Communication Technology (ICACT)10.1109/ICACT.2015.7224821(368-373)Online publication date: Jul-2015
  • Show More Cited By

Index Terms

  1. Simulation base implementation for placement of security services in real time environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
    January 2013
    772 pages
    ISBN:9781450319584
    DOI:10.1145/2448556
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. SCADA (supervisory control and data acquisition)
    2. cryptography
    3. cryptography algorithms
    4. security issues
    5. security services
    6. simulation base experimentation
    7. wireless network

    Qualifiers

    • Research-article

    Conference

    ICUIMC '13
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Extending the Unified Theory of Acceptance and Use of Technology for COVID-19 Contact Tracing Application by Malaysian UsersSustainability10.3390/su1411681114:11(6811)Online publication date: 2-Jun-2022
    • (2022)Conceptual Model for Automating GDPR Compliance Verification Using Natural Language Approach2022 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)10.1109/ITSS-IoE56359.2022.9990931(1-6)Online publication date: 3-Dec-2022
    • (2015)A SCADA intermediate simulation platform to enhance the system security2015 17th International Conference on Advanced Communication Technology (ICACT)10.1109/ICACT.2015.7224821(368-373)Online publication date: Jul-2015
    • (2014)Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryptionProceedings of the 8th International Conference on Ubiquitous Information Management and Communication10.1145/2557977.2558061(1-6)Online publication date: 9-Jan-2014
    • (2013)Secure Cryptography Testbed Implementation for SCADA Protocols SecurityProceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies10.1109/ACSAT.2013.69(315-320)Online publication date: 23-Dec-2013
    • (2013)A Performance ApproachProceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies10.1109/ACSAT.2013.61(274-277)Online publication date: 23-Dec-2013

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media