A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

[1]  Tai-Hoon Kim,et al.  Security Encryption Schemes for Internet SCADA: Comparison of the Solutions , 2011, SUComS.

[2]  Sandip C. Patel,et al.  Improving the cyber security of SCADA communication networks , 2009, CACM.

[3]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[4]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Naixue Xiong,et al.  The protocol design and New approach for SCADA security enhancement during sensors broadcasting system , 2016, Multimedia Tools and Applications.

[6]  H. Kobayashi,et al.  A SCADA System Using Mobile Agents for a Next-Generation Distribution System , 2013, IEEE Transactions on Power Delivery.

[7]  Soojin Park,et al.  The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission , 2015, Int. J. Distributed Sens. Networks.

[8]  Jin Wang,et al.  A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .

[9]  Francesco Parisi-Presicce,et al.  DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .

[10]  Min-kyu Choi Wireless Communications for SCADA Systems Utilizing Mobile Nodes , 2013 .

[11]  Carina S. González-González,et al.  Standards Evaluation HMI: Application of the guideline GEDIS to the systems SCADA of the NAP (Network Access Point) Canary Islands , 2014, Interacción '14.

[12]  Jeffrey L. Hieb,et al.  Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.

[13]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[14]  Gheorghe-Daniel Andreescu,et al.  SCADA element solutions using Ethernet and mobile phone network , 2011, 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics.

[15]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[16]  Ki-Hyung Kim,et al.  A unified security framework with three key management schemes for wireless sensor networks , 2008, Comput. Commun..

[17]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[18]  Wei Meng,et al.  GPRS based remote data acquisition and forecasting system for long-distance natural Gas pipeline monitoring , 2012, 2012 International Conference on Computational Problem-Solving (ICCP).

[19]  J. B. Morton A Mobility Study. , 1975 .

[20]  Bong-Han Kim,et al.  Network Anomaly Detection for M-Connected SCADA Networks , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[21]  Aamir Shahzad,et al.  N-Secure Cryptography Solution for SCADA Security Enhancement , 2014 .

[22]  Fan Yang,et al.  Design of GPRS Based Interface Parameters Remote Monitoring System for Crude Oil Tank , 2012 .

[23]  Chunlei Wang,et al.  A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.

[24]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[25]  Engin Ozdemir,et al.  Mobile phone based SCADA for industrial automation. , 2006, ISA transactions.

[26]  Sufyan Al-Irhayim,et al.  Implementation of GPRS-Based Positioning System Using PIC Microcontroller , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.

[27]  Naixue Xiong,et al.  New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions , 2015, Symmetry.

[28]  Naixue Xiong,et al.  A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[29]  Naixue Xiong,et al.  A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks , 2016, Sensors.

[30]  Dermot Diamond,et al.  Distributed chemical sensor networks for environmental sensing , 2011 .

[31]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[32]  Paul W. Oman,et al.  Intrusion Detection and Event Monitoring in SCADA Networks , 2007, Critical Infrastructure Protection.

[33]  Jun Zeng,et al.  A Tracking System Supporting Large-Scale Users Based on GPS and G-Sensor , 2015, Int. J. Distributed Sens. Networks.

[34]  Raul Ionel,et al.  GPRS based data acquisition and analysis system with mobile phone control , 2012 .

[35]  Wenfeng Jiang,et al.  A Method of Remote Interactive Control in Electricity SCADA System Based on Internet , 2012 .

[36]  Laurence Kujawa,et al.  The synergy between system modelization and HMI modelization: application on a workbench HMI , 2014, Ergo'IA '14.

[37]  Daniele Marioli,et al.  Wired and wireless sensor networks for industrial applications , 2009, Microelectron. J..

[38]  HyungJun Kim,et al.  Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[39]  Andreas Willig,et al.  Wireless Technology in Industrial Networks , 2005, Proceedings of the IEEE.

[40]  Rayford B. Vaughn,et al.  Discovering vulnerabilities in control system human-machine interface software , 2009, J. Syst. Softw..

[41]  Om Pal,et al.  Public Key Cryptography Based Approach for Securing SCADA Communications , 2011 .

[42]  K. Krishnamurthy,et al.  Design and Implementation of Web Based Remote Supervisory Control and Information System , 2011 .

[43]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[44]  Savaş Şahin Modbus-Based SCADA/HMI Applications , 2013 .

[45]  Qian Wang,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[46]  J.A. Rodriguez,et al.  Deployment of digital video and Audio Over electrical SCADA networks , 2005, IEEE Transactions on Power Delivery.

[47]  E. Chikuni,et al.  Investigating the security of electrical power systems SCADA , 2007, AFRICON 2007.