Security issues in SCADA networks

The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. This paper provides an overview of all the crucial research issues that are involved in strengthening the cyber security of SCADA networks. The paper describes the general architecture of SCADA networks and the properties of some of the commonly used SCADA communication protocols. The general security threats and vulnerabilities in these networks are discussed followed by a survey of the research challenges facing SCADA networks. The paper discusses the ongoing work in several SCADA security areas such as improving access control, firewalls and intrusion detection systems, SCADA protocol analyses, cryptography and key management, device and operating system security. Many trade and research organizations are involved in trying to standardize SCADA security technologies. The paper concludes with an overview of these standardization efforts.

[1]  Jeffrey B. Roberts,et al.  ELECTRONIC SECURITY OF REAL-TIME PROTECTION AND SCADA COMMUNICATIONS , 2003 .

[2]  J. Pollet Developing a solid SCADA security strategy , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.

[3]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[4]  Jeffrey B. Roberts,et al.  Safeguarding IEDs, Substations, and SCADA Systems Against Electronic Intrusions , 2001 .

[5]  Sandia Report,et al.  Sandia SCADA Program High-Security SCADA LDRD Final Report , 2002 .

[6]  J. Stamp,et al.  Sustainable Security for Infrastructure SCADA , 2004 .

[7]  Eric James Byres,et al.  NISCC good practice guide on ?rewall de-ployment for SCADA and process control networks , 2005 .

[8]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[9]  Andrew K. Wright,et al.  Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.

[10]  Christian Schwaiger,et al.  Achievement of secure Internet access to fieldbus systems , 2002, Microprocess. Microsystems.

[11]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[12]  Deborah A. Frincke,et al.  CONCERNS ABOUT INTRUSIONS INTO REMOTELY ACCESSIBLE SUBSTATION CONTROLLERS AND SCADA SYSTEMS , 2000 .

[13]  Christian Schwaiger,et al.  Smart card based security for fieldbus systems , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).

[14]  J. Stamp,et al.  Common vulnerabilities in critical infrastructure control systems. , 2003 .

[15]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[16]  Matt Bishop,et al.  About Penetration Testing , 2007, IEEE Security & Privacy.

[17]  J. David Irwin,et al.  The industrial electronics handbook , 1997 .

[18]  Rolf E. Carlson Sandia SCADA Program -- High Surety SCADA LDRD Final Report , 2002 .