Abstract
SCADA historically is responsible for monitoring and controlling critical infrastructures and manufacturing processes in an isolated environment. But with the requirement of a timely access of information for making decisions, large and modern companies being in a geographically diverse location take advantage of the internet as an important communication channel to allow the exchange of data. However, with SCADA being in the internet raise the issue of security. With the posted threats and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented. To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ryu, D., Balitanas, M.: Security Management for Distributed Denial of Service Attack. Journal of Security Engineering 7(2) (April 2010) ISSN: 1738-7531
McClanahan, R.H.: SCADA AND IP: Is Network Convergence Really Here? IEEE Industry Applications Magazine (March/April 2003)
GAO-04-628T. Critical infrastructure protection: challenges and efforts to secure control systems. Testimony Before the Subcommittee on Technology Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform. March 30 (2004), http://www.gao.gov/new.items/d04628t.pdf
e-scada.com (2002), www.e-scada.com/why.html (viewed on October 15, 2005)
Bentek Systems (n.d.), Internet and Web-based SCADA, http://www.scadalink.com/technotesIP.htm (viewed on October 15, 2005)
Quinn-Judge, P.: Cracks in the system. TIME Magazine (January 9, 2002)
Reed, T.: At the Abyss: An Insider’s History of the Cold War. Presidio Press (March 2004)
Balitanas, M., Robles, R.J., Kim, N., Kim, T.: Crossed Crypto-scheme in WPA PSK Mode. In: BLISS 2009, IEEE CS, Edinburgh (August 2009) ISBN 978-0-7695-3754-5
Roberts, P.: Zotob, PnP Worms Slam 13 DaimlerChrysler Plants, eweek.com, August 18 (2005), http://www.eweek.com/c/a/Security/Zotob-PnP-Worms-Slam-13-DaimlerChrysler-Plants/
Stallings, W.: Cryptography and Network Security, 2nd edn. Prentice Hall, Upper Saddle River
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Balitanas, M.O., Jeon, SH., Kim, Th. (2011). Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)