Development and deployment of cyber security measures for legacy SCADA systems usually encounter challenges of limited computation resources in the field devices for supporting the designed cryptography processing. This paper presents a scheme with which the field device performs message authentication and integrity check only on selected critical packets such that it protects the system operation while avoiding high computation workload, and applies the scheme to a transportation SCADA system. The proposed scheme takes into account of the SCADA computation power limitation and real time requirements, and the extreme difficulty of making any changes to hardware or software in the legacy system. AES-CCM and symmetric key methods are applied for providing message authentication and integrity, and a bump-in-the-wire (BITW) implementation approach is adopted to avoid the changes to the legacy system. This lightweight packet authentication scheme is implemented and demonstrated over a testbed of a metro transportation SCADA system. Experiments show the effects of the scheme in blocking malicious packet attack and the comparison with a firewall approach.
[1]
Sean W. Smith,et al.
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems
,
2008,
SEC.
[2]
Tarek N. Saadawi,et al.
Smart Grid DNP3 Vulnerability Analysis and Experimentation
,
2015,
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[3]
Khalil El-Khatib,et al.
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol
,
2013,
2013 Third International Conference on Communications and Information Technology (ICCIT).
[4]
Bruno Sinopoli,et al.
Challenges for Securing Cyber Physical Systems
,
2009
.
[5]
Luying Zhou,et al.
Mind the Gap: Security Analysis of Metro Platform Screen Door System
,
2017,
SG-CRC.
[6]
Hugo Krawczyk,et al.
Keying Hash Functions for Message Authentication
,
1996,
CRYPTO.
[7]
Dale C. Rowe,et al.
A survey SCADA of and critical infrastructure incidents
,
2012,
RIIT '12.
[8]
Karen A. Scarfone,et al.
Guide to Industrial Control Systems (ICS) Security
,
2015
.