Preview

Scada Security

Powerful Essays
Open Document
Open Document
7324 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scada Security
International Journal of Research and Reviews in Information Security and Privacy (IJRRISP)
Vol. 1, No. 2, June 2011
ISSN: 2046-5718
Copyright © Science Academy Publisher, United Kingdom www.sciacademypublisher.com Science Academy
Publisher

A Configurable and Efficient Key-Management scheme for
SCADA Communication Networks
Zia Saquib1, Ravi Batra1, Om Pal1, Ashwin Nevangune1, Dhiren Patel2, and M. Rajarajan3
1

Centre for Development of Advanced Computing, Mumbai, India
National Institute of Technology Surat, India
3
City University London, UK
2

Email: (saquib, ravibatra, ompal, ashwin}@cdacmumbai.in, dhiren29p@gmail.com, R.Muttukrishnan@city.ac.uk

Abstract – Key management in SCADA (Supervisory Control And Data Acquisition) networks is a major challenge today.
Due to resource constraints and latency requirements in such networks, it is infeasible to use traditional key management schemes such as RSA based PKC (Public key cryptography). In this paper, we propose a key management scheme, making use of Id-NIKDS (Id-based Non Interactive Key Distribution System) along with Polynomial based Pair -wise Key
Establishment in a manner that the resulting scheme is efficient an d highly secure for large SCADA networks. The level of security provided is configurable and can vary from resilience against compromise of a few nodes to 100 % resilient against node compromise attacks. The protocol achieves energy efficiency by minimizin g the number of communications for key establishment, also provides flexibility for dynamic cluster formation after deployment, easy key updates, node addition and revocation. The scheme has been formulated considering the fact that the remote terminal uni ts & nodes are low range devices and most frequently communicate with only the nearby nodes so as to achieve admissible latencies. Small clusters may be formed in such networks, each responsible for collectively providing sensed data and controlling actuat ors in



References: International Conference on System Sciences-Volume 8, page 8020, Washington, DC, USA, 2000 Nieto: SKMA – A Key Management Architecture for SCADA Systems: Fourth Australasian Information Security Workshop AISWNetSec (2006). Networks, 10th ACM CCS '03, Washington D.C., October, 2003 . Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), pages 119–132, August 2004. 36, North Carolina State University, Department of Computer Science, 2007. Theory, vol. 39, no. 5, pp. 1639–1646, 1993. Computations on Curves with High-Degree Twists, Lecture Notes in Computer Science, 2010, Volume 6056/2010, 224-242 Report 2009/155, 2009. Report 2009/155, 2009. characteristic fields. In ICISC 2004 [27], pages 168–181, 2005 [22] D.E Seminumerical Algorithms. Addison-Wesley, third edition, 1997. Blake, G. Seroussi, and N. Smart, Eds. Cambridge Univ. Press, 2005, vol

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    After the prior meeting, we had talked about several vital matters that are would require additional research to show exactly the safest way to process the transitions of the aforementioned new changes. Also, we had reviewed the different data flow that would function and improve the proper handling between Riordan and their plants, and which would ensure…

    • 938 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    CIS590: Project Plan Paper

    • 4496 Words
    • 18 Pages

    Addressing the need for a network topology that will address security, resiliency and business continuity challenges both day-to-day and in the event of a man-made (i.e., hacker) or natural (earth quake) disaster.…

    • 4496 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    The purpose of this summary is to explain the changes made in the to-be diagram from the previous as-is diagram. Also, to note the protective hardware added, and the justification for the changes made. The to-be diagram has been changed or altered to reflect a defense in depth approach. This diagram is upgraded with the addition of multiple security layers. This diagram has the removal of its wireless access points and the addition of VLAN subnetting for improving network performance and reducing network congestion.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This risk assessment applies to all DoA Non-secured Internet Protocol Router Network (NIPRNET) and Secured Internet Protocol Router Network (SIPRNET) for Regular Army and Reserve Components. This is a major system that is used by millions of Soldiers, contractors and DA civilians worldwide. The DoA’s IT system is…

    • 1633 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This procedure incorporates the formation of a solid secret key and a record lockout strategy is made, logon hours are appointed, a ticket lapse strategy is made, and clock synchronization resilience to anticipate replay assaults is situated just to name some of what this procedure comprise of.…

    • 1465 Words
    • 4 Pages
    Powerful Essays