Challenges and Perspectives in Security Measures for the SCADA System

In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from research communities. The international standard organizations also have published several standard documents for secured SCADA systems. In this paper, we overview the SCADA system architecture and consider the constraints due to the system’s own characteristics. And then, we explain the technological challenges for the SCADA security and summarize the current results which have been brought out by the efforts from the international bodies as well as research communities.

[1]  I.H. Lim,et al.  Applying security algorithms against cyber attacks in the distribution automation system , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition.

[2]  Yongge Wang,et al.  sSCADA: securing SCADA infrastructure communications , 2011, Int. J. Commun. Networks Distributed Syst..

[3]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[4]  L. Pietre-Cambacedes,et al.  Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[5]  Cheryl L. Beaver,et al.  Key Management for SCADA , 2002 .

[6]  Julian L. Rrushi,et al.  Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings , 2008 .

[7]  Ulf Lindqvist,et al.  Using Model-based Intrusion Detection for SCADA Networks , 2006 .

[8]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[9]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[10]  Ed Dawson,et al.  SKMA - A Key Management Architecture for SCADA Systems , 2006 .

[11]  S. Hurd,et al.  Tutorial: Security in Electric Utility Control Systems , 2008, 2008 61st Annual Conference for Protective Relay Engineers.

[12]  Sean W. Smith,et al.  YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems , 2008, SEC.

[13]  Andrew K. Wright,et al.  Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.

[14]  S.J. Lee,et al.  Distributed Restoration system applying Multi-Agent in distribution automation system , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[15]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[16]  F. Cleveland,et al.  IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[17]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.