Encryption method for SCADA security enhancement

With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks...

Full description

Bibliographic Details
Main Authors: Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah
Format: Article
Language:English
Published: Asian Network for Scientific Information 2014
Subjects:
Online Access:http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf
_version_ 1848781331210698752
author Shahzad, Aamir
Musa, Shahrulniza
Irfan, Muhammad
Shah, Asadullah
author_facet Shahzad, Aamir
Musa, Shahrulniza
Irfan, Muhammad
Shah, Asadullah
author_sort Shahzad, Aamir
building IIUM Repository
collection Online Access
description With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations.
first_indexed 2025-11-14T15:47:52Z
format Article
id iium-36980
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:47:52Z
publishDate 2014
publisher Asian Network for Scientific Information
recordtype eprints
repository_type Digital Repository
spelling iium-369802021-01-25T03:40:32Z http://irep.iium.edu.my/36980/ Encryption method for SCADA security enhancement Shahzad, Aamir Musa, Shahrulniza Irfan, Muhammad Shah, Asadullah T10.5 Communication of technical information With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filed devices connected within "networks such as using Local Area Network (LAN). Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. This novel approach successfully enhanced the security of DNP3 protocol as a part of SCADA system while comparing with end-to-end security implementations. Asian Network for Scientific Information 2014 Article PeerReviewed application/pdf en http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf Shahzad, Aamir and Musa, Shahrulniza and Irfan, Muhammad and Shah, Asadullah (2014) Encryption method for SCADA security enhancement. Journal of Applied Sciences. pp. 1-9. ISSN 1812-5662 (O), 1812-5654 (P) http://iosrjournals.org/
spellingShingle T10.5 Communication of technical information
Shahzad, Aamir
Musa, Shahrulniza
Irfan, Muhammad
Shah, Asadullah
Encryption method for SCADA security enhancement
title Encryption method for SCADA security enhancement
title_full Encryption method for SCADA security enhancement
title_fullStr Encryption method for SCADA security enhancement
title_full_unstemmed Encryption method for SCADA security enhancement
title_short Encryption method for SCADA security enhancement
title_sort encryption method for scada security enhancement
topic T10.5 Communication of technical information
url http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/
http://irep.iium.edu.my/36980/2/amir-scada-paper.pdf