KR20130001767A - Data comunication system for communication security - Google Patents
Data comunication system for communication security Download PDFInfo
- Publication number
- KR20130001767A KR20130001767A KR1020110062609A KR20110062609A KR20130001767A KR 20130001767 A KR20130001767 A KR 20130001767A KR 1020110062609 A KR1020110062609 A KR 1020110062609A KR 20110062609 A KR20110062609 A KR 20110062609A KR 20130001767 A KR20130001767 A KR 20130001767A
- Authority
- KR
- South Korea
- Prior art keywords
- data
- data frame
- area
- terminal device
- security
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/24—Pc safety
- G05B2219/24215—Scada supervisory control and data acquisition
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
According to an embodiment of the present invention, a data communication system for communication security includes an operation server performing a function of a top layer in a network of a SCADA system, and a data frame including control or measurement information connected to the operation server through a communication port. A remote device that transmits / receives, and a terminal device that is connected to the remote device to transmit / receive the data frame, wherein the transmitted / received data frame includes a first area and an unencrypted data. And a second area containing data encrypted by the set security password.
Description
The present invention relates to data protection in a Supervisory Control And Data Acquisition (SCADA) network, and more particularly, to a data communication system for communication security that can implement stable and reliable communication by transmitting and receiving encrypted data frames.
SCADA system is a system for centrally monitoring and controlling devices and equipment installed in a remote place. It is a central control computer or SCADA server that can be centrally monitored and controlled by a central operator, and a remotely controlled central control computer. It is generally composed of remote devices (eg, RTU, MTU, etc.), and wired / wireless communication links that form a data transmission path between the central control computer and the remote devices.
In case of remote equipment, it has functions such as data collection, remote control and remote diagnosis independently, and it is implemented to transmit the situation and details to central control computer.In case of central control computer, it monitors various information reported by remote equipment Display.
As such, the SCADA system enables the central operator to monitor and control the remote situation and the equipment on the remote site in real time, so that the SCADA system has automatic control, monitoring and information processing functions and is widely used in a wide range of fields.
The actual SCADA system is applied to rail management and control, water resource management, transmission and distribution, gas, oil storage and supply, civil air defense, flood alarm system.
The implementation of the SCADA system results in a more effective and cost-saving effect, maximizing the efficiency of investments in equipment management and its operations personnel through the introduction of automation and remote control functions.
However, unlike foreign countries, Korea is operating a SCADA system of a dedicated network system separate from the public Internet network, so security awareness is still insufficient.
That is, due to security vulnerabilities on the SCADA network, security problems of communication, information leakage / leakage, etc. may occur, and thus there is a problem in that it is not possible to protect control measurement information transmitted to remote devices.
1 is a block diagram showing a data communication system according to the prior art.
Referring to FIG. 1, the
The
The
In particular, data communication is performed by establishing a dedicated communication line between the upper SCADA device and the lower SCADA device to configure closed communication.
However, the conventional
That is, as shown in FIG. 2, the data communication system is configured on the premise that the local network configuration is not considered in consideration of the connection of any
However, as shown in FIG. 2, the conventional SCADA protocols can check the type, state, and current value of data when a physical connection is made from the outside, and thus there is a problem that the data can be modulated. .
In addition, conventional SCADAs require high levels of availability (low frequency of failure and rapid recovery), and require very high levels of measurement accuracy and speed. Due to these features, the protocol is simple and highly readable, and thus, in reality, the protocol is exposed to hacking risks in connection with various intranets.
Therefore, there is a need for a device capable of preventing the leakage / leakage of data in the SCADA network.
According to an embodiment of the present invention, a data communication system and a transmission method for communication security capable of performing data communication using a protocol having improved security are provided.
In addition, the embodiment according to the present invention is a method for improving the security of the protocol used for SCADA communication so that other external users who are not authorized using the internal encryption algorithm during data transmission / reception cannot check communication data. .
Technical problems to be achieved in the present invention are not limited to the technical problems mentioned above, and other technical problems not mentioned above are clearly understood by those skilled in the art to which the embodiments proposed from the following description belong. Could be.
According to an embodiment of the present invention, a data communication system for communication security includes an operation server performing a function of a top layer in a network of a SCADA system, and a data frame including control or measurement information connected to the operation server through a communication port. A remote device that transmits / receives, and a terminal device that is connected to the remote device to transmit / receive the data frame, wherein the transmitted / received data frame includes a first area and an unencrypted data. And a second area containing data encrypted by the set security password.
In addition, the data frame is generated in at least one of the operation server and the terminal device.
In addition, the terminal device receives a security password for encrypting the data from the user.
In addition, the input security password is transmitted to the primary server to be shared with each other, or previously promised with the primary server.
In addition, the operation server or the terminal device decrypts the data transmitted from the upper or lower device by using the security password, or generates a data frame including the first area and the second area by using the security password. Or to a lower device.
In addition, the second area of the data frame is encrypted by a predetermined encryption algorithm, and the encryption algorithm can be selected and changed.
Further, the second area of the data frame is compressed based on the secure cipher.
In addition, the data frame is configured based on at least one protocol of DNP (Distributed Network Protocol), Modbus and IEC-60870.
The second area also includes a data field area.
According to the embodiment of the present invention, since the encrypted data frame is transmitted and received, the security of the SCADA power system can be enhanced without additional costs without changing the hardware of the existing SCADA system.
In addition, according to an embodiment of the present invention, it is possible to implement a stable and reliable communication by protecting the data frame transmitted to the network of the SCADA system from external hacking or intrusion.
In addition, the embodiment according to the present invention is compatible with the existing SCADA system because it enhances the security of the data while maintaining the inherent characteristics of the existing protocol.
1 and 2 is a configuration diagram showing a data communication system according to the prior art.
3 is a block diagram showing a data communication system according to an embodiment of the present invention.
4 is a diagram illustrating an MMI screen according to an embodiment of the present invention.
5 is a diagram for describing encryption of a data frame according to a first embodiment of the present invention.
6 is a diagram for describing encryption of a data frame according to a second embodiment of the present invention.
7 and 8 are flowcharts for explaining step-by-step a data communication method of a data communication system according to an embodiment of the present invention.
The proposed embodiment will be described.
Hereinafter, specific embodiments of the present invention will be described in detail with reference to the drawings. However, the spirit of the present invention is not limited to the embodiments presented, and other inventions which are further deteriorated by addition, change, deletion, etc. of other components, or other embodiments included within the scope of the present invention can be easily made. I can suggest.
3 is a block diagram of a data communication system for communication security according to an embodiment of the present invention.
Referring to FIG. 3, the
In the
The
The
In addition, the
The
In this case, the data frame may include information about control and measurement.
The
The
At this time, the data frame transmitted from the
That is, as described above, the monitoring and control data transmitted from the upper system such as the
Similarly, the measurement data transmitted from the terminal 103 to the
In this case, the data frame may be encrypted through an encryption algorithm based on a predetermined security password, or may be compressed using the predetermined security password as a compression key.
In addition, the encryption of the data frame may be performed on all fields constituting the data frame, but only for data fields containing data that are actually important for more efficient data communication. In other words, the data frame includes a first area without a data field and a second area with a data field, thereby encrypting only the second area including the data frame when transmitting the data frame.
In this case, the data frame may be configured based on any one of Modubus, DNP (Distributed Network Protocol) and IEC-60870 protocol.
Hereinafter, the encryption of the data frame as described above will be described in more detail.
4 is a diagram illustrating an MMI screen according to an embodiment of the present invention.
Referring to FIG. 4, the
In this case, the security password input to the security
That is, the user enters a security password to be used in the security
In addition, the security
When the security password is input as described above, the
In addition, the
Similarly, the
In this case, the encryption may be performed by a predetermined encryption algorithm. In addition, the set encryption algorithm may be changed from time to time in order to maintain higher security.
The data scrambling method used in the encryption algorithm may be three methods of substitution, substitution, and arithmetic, or a combination thereof may be used.
In addition, a method of simply compressing the data frame may be applied to the encryption. In this case, the set security cipher may be used as a secret key for decompressing the compressed data frame.
FIG. 5 is a diagram illustrating encryption of a data frame according to a first embodiment of the present invention, and FIG. 6 is a diagram illustrating encryption of a data frame according to a second embodiment of the present invention.
Referring to FIG. 5, the data frame may be configured based on a Modbus protocol.
The data frame based on the Modbus protocol is composed of a start field, an address field, a function field, a data field, a checksum field, and an end field.
In this case, all the fields are referred to as an application data unit (ADU) section, wherein the start field and the address field belong to the header section, the function field and the data field belong to the data section, and the checksum field and the end field are tail. ) Belongs to the section.
Accordingly, when the information to be transmitted is generated, the
In addition, referring to FIG. 6, the data frame may be configured based on the DNP protocol.
The data frame based on the DNP protocol includes a header field, an address field, a checksum field, a data header field, a data field, a data CRC field, and a frame CRC field. Among the fields included in the data frame based on the DNP protocol, a header field, an address field, and a checksum field belong to a data link header section, a data header field and a data field, and a data CRC field belong to a data block section, and a frame CRC field. Belongs to the data link end section.
Accordingly, when information to be transmitted is generated, the
Further, the data frame encrypted as described above is decrypted based on the security cipher used for the encryption at the receiving side.
Accordingly, even if a hacker approaches between the
7 and 8 are flowcharts for explaining step-by-step a data communication method of a data communication system according to an embodiment of the present invention.
Hereinafter, the data communication method will be described based mainly on the operation of the
First, referring to FIG. 7, the
In addition, the first area includes unencrypted data, and the second area includes data encrypted by the
The
That is, the
If it is determined that the data frame is suitable, the
That is, the
When the decoding of the data included in the second area is completed, the
If the data included in the second area is abnormal data, the
In addition, if the data included in the second area is normal data, the
Referring to FIG. 8, the
Thereafter, the
As the data frame is configured, the
Thereafter, the
As described above, according to the embodiment of the present invention, since the encrypted data frame is transmitted and received, the security of the SCADA power system can be enhanced without additional costs without changing the hardware of the existing SCADA system.
In addition, according to an embodiment of the present invention, it is possible to implement a stable and reliable communication by protecting the data frame transmitted to the network of the SCADA system from external hacking or intrusion.
In addition, the embodiment according to the present invention is compatible with the existing SCADA system because it enhances the security of the data while maintaining the inherent characteristics of the existing protocol.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, but, on the contrary, It will be understood that various modifications and applications are possible. For example, each component specifically shown in the embodiments can be modified and implemented. It is to be understood that all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
101: production server
102: remote device
103: terminal device
Claims (8)
A remote device connected to the operation server through a communication port for transmitting / receiving a data frame made of control or measurement information; And
A terminal device connected to the remote device to transmit / receive the data frame;
And transmitting and receiving the data frame comprises a first area including unencrypted data and a second area including data encrypted by a predetermined security password.
The data frame is a data communication system for communication security generated by at least one of the operating server and the terminal device.
The terminal device is a data communication system for communication security that receives a security password for encrypting the data from the user.
The input security password is transmitted to the primary server and shared with each other, or the data communication system for communication security, characterized in that the appointment with the primary server in advance.
The operation server or terminal device
Decrypts data transmitted from an upper or lower device using the security password;
And a data frame including the first area and the second area by using the security password, and transmitting the generated data frame to an upper or lower device.
The second area of the data frame is encrypted by a preset encryption algorithm,
And said encryption algorithm is selectable and modifiable.
And a second area of the data frame is compressed based on the secure cipher.
And said second area comprises a data field area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020110062609A KR20130001767A (en) | 2011-06-28 | 2011-06-28 | Data comunication system for communication security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020110062609A KR20130001767A (en) | 2011-06-28 | 2011-06-28 | Data comunication system for communication security |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20130001767A true KR20130001767A (en) | 2013-01-07 |
Family
ID=47834659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020110062609A KR20130001767A (en) | 2011-06-28 | 2011-06-28 | Data comunication system for communication security |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20130001767A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104914855A (en) * | 2015-06-15 | 2015-09-16 | 洛阳理工学院 | ZigBee-based traditional Chinese medicine warehouse internal environment parameter control system |
CN105242659A (en) * | 2014-06-05 | 2016-01-13 | 北车大连电力牵引研发中心有限公司 | Locomotive running data recording method, TCU (traction control unit) terminal and locomotive running data recording system |
KR20190089493A (en) * | 2018-01-23 | 2019-07-31 | 이장형 | Method of encrypting protocol for programmable logic controller |
-
2011
- 2011-06-28 KR KR1020110062609A patent/KR20130001767A/en not_active Application Discontinuation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105242659A (en) * | 2014-06-05 | 2016-01-13 | 北车大连电力牵引研发中心有限公司 | Locomotive running data recording method, TCU (traction control unit) terminal and locomotive running data recording system |
CN104914855A (en) * | 2015-06-15 | 2015-09-16 | 洛阳理工学院 | ZigBee-based traditional Chinese medicine warehouse internal environment parameter control system |
KR20190089493A (en) * | 2018-01-23 | 2019-07-31 | 이장형 | Method of encrypting protocol for programmable logic controller |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Cyber security and privacy issues in smart grids | |
Gao et al. | SCADA communication and security issues | |
Youssef et al. | IEC 61850: Technology standards and cyber-threats | |
Lim et al. | Security protocols against cyber attacks in the distribution automation system | |
Ferst et al. | Implementation of secure communication with modbus and transport layer security protocols | |
CN104320332A (en) | Multi-protocol industrial communication safety gateway and communication method with gateway applied | |
Stewart et al. | Synchrophasor security practices | |
CN104506500A (en) | GOOSE message authentication method based on transformer substation | |
Fauri et al. | Encryption in ICS networks: A blessing or a curse? | |
KR20090102469A (en) | System and method for data protection and security of scada network based on dnp | |
CN105245329A (en) | Quantum communication-based trusted industrial control network realizing method | |
CN103560911A (en) | Method and system for financial self-service equipment initiative preventive maintenance | |
KR101023708B1 (en) | Data Protection Method and Apparatus for SCADA Network Based on MODBUS Protocol | |
KR101048286B1 (en) | Multi-Cryptographic Apparatus and Method thereof for Securing SCAD Communication | |
KR20130001767A (en) | Data comunication system for communication security | |
KR101959686B1 (en) | L2 switch for network security, and remote supervisory system using the same | |
Kumar et al. | Cyber security threats in synchrophasor system in WAMS | |
O'Raw et al. | IEC 61850 substation configuration language as a basis for automated security and SDN configuration | |
Jung et al. | Design on SCADA test-bed and security device | |
CN111314382B (en) | Network safety protection method suitable for high-frequency emergency control system | |
KR20120074040A (en) | Security system and its operating method for supervisory control and data acquisition system | |
Wang | Smart grid, automation, and scada systems security | |
CN107995086A (en) | A kind of method of business datum encrypted transmission in intelligence manufacture Internet of Things based on VPDN and IPSEC | |
Alsiherov et al. | Research trend on secure SCADA network technology and methods | |
Cagalaban et al. | Scada network insecurity: Securing critical infrastructures through scada security exploitation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |