کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
6747639 | 1429481 | 2018 | 32 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
موضوعات مرتبط
مهندسی و علوم پایه
مهندسی کامپیوتر
شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله

چکیده انگلیسی
SCADA systems are used across the critical infrastructure to monitor and control vital industrial processes. Traditional firewalls, authentication mechanisms, and cryptographic algorithms and protocols are inadequate to secure SCADA systems and the underlying industrial processes from cyber attacks. This paper describes a novel approach for providing a high level of secrecy to the IEC 60870-5-101 protocol, a non-routable open SCADA communications protocol used in the electric power industry. The proposed approach incorporates a secrecy layer between the physical and link layers of the enhanced performance architecture of the IEC 60870-5-101 protocol. The secrecy layer is an implementation of Shannon's notion of an unconditionally-secure system in which perfect secrecy and strong ideal secrecy are leveraged to guarantee the authenticity, integrity and confidentiality of SCADA data transmission. Experimental results using an industrial control testbed confirm that the proposed approach satisfies the temporal constraints imposed on SCADA systems used in electrical substations.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: International Journal of Critical Infrastructure Protection - Volume 20, March 2018, Pages 68-84
Journal: International Journal of Critical Infrastructure Protection - Volume 20, March 2018, Pages 68-84
نویسندگان
Tarek CHERIFI, Lamia HAMAMI,