[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System

  • Conference paper
Information Security and Assurance (ISA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 200))

Included in the following conference series:

  • 1093 Accesses

Abstract

SCADA historically is responsible for monitoring and controlling critical infrastructures and manufacturing processes in an isolated environment. But with the requirement of a timely access of information for making decisions, large and modern companies being in a geographically diverse location take advantage of the internet as an important communication channel to allow the exchange of data. However, with SCADA being in the internet raise the issue of security. With the posted threats and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented. To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ryu, D., Balitanas, M.: Security Management for Distributed Denial of Service Attack. Journal of Security Engineering 7(2) (April 2010) ISSN: 1738-7531

    Google Scholar 

  2. McClanahan, R.H.: SCADA AND IP: Is Network Convergence Really Here? IEEE Industry Applications Magazine (March/April 2003)

    Google Scholar 

  3. GAO-04-628T. Critical infrastructure protection: challenges and efforts to secure control systems. Testimony Before the Subcommittee on Technology Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform. March 30 (2004), http://www.gao.gov/new.items/d04628t.pdf

  4. e-scada.com (2002), www.e-scada.com/why.html (viewed on October 15, 2005)

  5. Bentek Systems (n.d.), Internet and Web-based SCADA, http://www.scadalink.com/technotesIP.htm (viewed on October 15, 2005)

  6. Quinn-Judge, P.: Cracks in the system. TIME Magazine (January 9, 2002)

    Google Scholar 

  7. Reed, T.: At the Abyss: An Insider’s History of the Cold War. Presidio Press (March 2004)

    Google Scholar 

  8. Balitanas, M., Robles, R.J., Kim, N., Kim, T.: Crossed Crypto-scheme in WPA PSK Mode. In: BLISS 2009, IEEE CS, Edinburgh (August 2009) ISBN 978-0-7695-3754-5

    Google Scholar 

  9. Roberts, P.: Zotob, PnP Worms Slam 13 DaimlerChrysler Plants, eweek.com, August 18 (2005), http://www.eweek.com/c/a/Security/Zotob-PnP-Worms-Slam-13-DaimlerChrysler-Plants/

  10. Stallings, W.: Cryptography and Network Security, 2nd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Balitanas, M.O., Jeon, SH., Kim, Th. (2011). Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23141-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23140-7

  • Online ISBN: 978-3-642-23141-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics