Trends in Applied Sciences Research1819-35792151-7908Science International10.3923/tasr.2014.381.395ShahzadA. MusaS. IrfanM. 7201497In the initial structure (or design) of SCADA system, there is no security
mechanism that provides services or solutions for preventing and detecting the
communication attacks over internet. Using
modern communication facilities, SCADA platform is vulnerable from different
types of internet attacks that create major problems
within communication in the terms of security, reliability, scalability and
other performance parameters. The existing study related with SCADA security
implementations have been analyzed and then propose a solution which is based
on asymmetric and symmetric cryptography algorithms. In this proposed implementation,
the prototype for Distributed Network Protocol (DNP3) has been developed which
is based on application layer,
pseudo-transport layer and data link layer
of DNP3 protocol. Current solution takes bytes (user data) from DNP3 layers
and deploys the proposed solution as new security layer within each layer of
DNP3. A dynamic cryptography
buffer has been deployed and
utilized during whole security implementation within DNP3 protocol. When the
proposed implementation has been deployed and the security services (such
as authentication, integrity, confidentiality and non-repudiation)
are tested (verified) successfully between
Master Terminal Unit (MTU) and Remote Terminal Units (RTUs) or/and RTUs and
MTU, then the attacks (related
with security services) such as shared key guessing, brute force, cracking key,
man-in-the-middle, packet/data injection, packet/data replay and deletion have
launched, using built-in tools as attacker and the performance (results) are
measured based on system behavior.]]>Shahzad, A.A., S. Musa, A. Aborujilah and M. Irfan,201410652659Musa, S., A.A. Shahzad and A. Aborujilah,20132013Musa, S., A.A. Shahzad and A. Aborujilah,20132013Ismail, M.N., A. Aborujilah, S. Musa and A. Shahzad,20132013Shahzad, A.A., S. Musa, A. Aborujilah, M.N. Ismail and M. Irfan,201351824Shahzad, A.A. and S. Musa,201262844Stouffer, K., J. Falco and K. Kent,20072007NCS,20042004Permann, M.R. and K. Rohde,20052005Robles, R.J. and T.H. Kim,20118349358Cai, J., J. Wang and X. Yu,20082008pp: 569574