Abstract

Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial control systems. Industrial organizations perform operations remotely through SCADA systems to accelerate their processes. However, this enhancement in network capabilities comes at the cost of exposing the systems to cyber-attacks. Consequently, effective solutions are required to secure industrial infrastructure as cyber-attacks on SCADA systems can have severe financial and/or safety implications. Moreover, SCADA field devices are equipped with microcontrollers for processing information and have limited computational power and resources. This makes the deployment of sophisticated security features challenging. As a result, effective lightweight cryptography solutions are needed to strengthen the security of industrial plants against cyber threats. In this paper, we have proposed a multi-layered framework by combining both symmetric and asymmetric key cryptographic techniques to ensure high availability, integrity, confidentiality, authentication and scalability. Further, an efficient session key management mechanism is proposed by merging random number generation with a hashed message authentication code. Moreover, for each session, we have introduced three symmetric key cryptography techniques based on the concept of Vernam cipher and a pre-shared session key, namely, random prime number generator, prime counter, and hash chaining. The proposed scheme satisfies the SCADA requirements of real-time request response mechanism by supporting broadcast, multicast, and point to point communication.

Highlights

  • There has been a surge in the deployment of Supervisory Control and Data Acquisition (SCADA) systems to control and monitor the industrial infrastructure over the Internet [1]

  • 1) We propose a secure session-key agreement scheme according to SCADA protocol standards to ensure the security amongst MTU, sub-MTUs and Remote Terminal Units (RTUs)

  • 3) We propose a multi-layered framework by integrating the concept of symmetric and asymmetric key cryptography that ensures various security mechanisms, namely, authentication, confidentiality, message integrity, availability, and scalability for SCADA systems

Read more

Summary

Introduction

There has been a surge in the deployment of Supervisory Control and Data Acquisition (SCADA) systems to control and monitor the industrial infrastructure over the Internet [1]. Organizations such as oil and natural gas, power stations, water & sewage systems, chemical plants, manufacturing units, railway, and other transportation use SCADA systems to monitor and control their infrastructure such as oil pipelines, solar panels, water pipelines, boilers, railway tracks, and plant floor components across open access networks [2], [3]. While designing a secure framework for SCADA networks, it is crucial to cover all three types of communication

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call