HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2014 | Volume: 14 | Issue: 20 | Page No.: 2498-2506
DOI: 10.3923/jas.2014.2498.2506
Key Encryption Method for SCADA Security Enhancement
A. Shahzad, S. Musa, M. Irfan and S. Asadullah

Abstract: With the growing demands of Industrial Control System (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between field devices connected within “networks such as using Local Area Network (LAN)/Wide Area Network (WAN)” or/and over internet to fulfill the requirements of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This is system based on real-time processing infrastructure, system control and design. In existing survey, several mechanisms/solutions were developed for reliable delivery of data without any attack. Several techniques were also implemented “such as using Secure Socket Layer/Transport Layer Security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)” for securing data across internet and overcoming the attacks related with SCADA communication. These techniques have also limitations in terms of data delivery and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solution takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within Distributed Network Protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementation.

Fulltext PDF Fulltext HTML

How to cite this article
A. Shahzad, S. Musa, M. Irfan and S. Asadullah, 2014. Key Encryption Method for SCADA Security Enhancement. Journal of Applied Sciences, 14: 2498-2506.

© Science Alert. All Rights Reserved