Cyber Security of Industrial Networks

SCADA stands for Supervisory Control and Data Acquisition, a communication technology which collects data from distant facilities and sends control signals to actuators. There are several factors which increase the risk associated with SCADA systems. SCADA components are considered to be profoundly privileged targets for cyber attacks through which hackers can easily hit the nation's critical infrastructure and economy. This paper investigates security issues of SCADA communication protocols. In order to protect the SCADA networks, we focus on the protocols as they were not designed with inherent security features. Security system through protocol hardening is the main focus of this paper. The goal is to modify the structure of such protocols to provide more integrity and authentication. In the proposed structure, two algorithms are used to enhance the security and integrity of the payload. They are each discussed further in the next six sections. .

[1]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[2]  Sankalp Bagaria,et al.  Flexi-DNP3: Flexible distributed network protocol version 3 (DNP3) for SCADA security , 2011, 2011 International Conference on Recent Trends in Information Systems.

[3]  D.C. Feldmeier,et al.  Fast software implementation of error detection codes , 1995, TNET.

[4]  Dilip V. Sarwate Computation of cyclic redundancy checks via table look-up , 1988, CACM.

[5]  Athar Mahboob,et al.  Intrusion avoidance for SCADA security in industrial plants , 2010, 2010 International Symposium on Collaborative Technologies and Systems.

[6]  Francesco Parisi-Presicce,et al.  DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .

[7]  Marc A. Kaplan,et al.  A new parallel algorithm for CRC generation , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[8]  Om Pal,et al.  Cryptographic Key Management for SCADA System: An Architectural Framework , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[9]  H. Michael Ji,et al.  Fast parallel CRC algorithm and implementation on a configurable processor , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[10]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.