IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v20y2018icp68-84.html
   My bibliography  Save this article

A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol

Author

Listed:
  • CHERIFI, Tarek
  • HAMAMI, Lamia

Abstract

SCADA systems are used across the critical infrastructure to monitor and control vital industrial processes. Traditional firewalls, authentication mechanisms, and cryptographic algorithms and protocols are inadequate to secure SCADA systems and the underlying industrial processes from cyber attacks. This paper describes a novel approach for providing a high level of secrecy to the IEC 60870-5-101 protocol, a non-routable open SCADA communications protocol used in the electric power industry. The proposed approach incorporates a secrecy layer between the physical and link layers of the enhanced performance architecture of the IEC 60870-5-101 protocol. The secrecy layer is an implementation of Shannon’s notion of an unconditionally-secure system in which perfect secrecy and strong ideal secrecy are leveraged to guarantee the authenticity, integrity and confidentiality of SCADA data transmission. Experimental results using an industrial control testbed confirm that the proposed approach satisfies the temporal constraints imposed on SCADA systems used in electrical substations.

Suggested Citation

  • CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.
  • Handle: RePEc:eee:ijocip:v:20:y:2018:i:c:p:68-84
    DOI: 10.1016/j.ijcip.2017.12.001
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548216301834
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2017.12.001?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Genge, Béla & Graur, Flavius & Haller, Piroska, 2015. "Experimental assessment of network design approaches for protecting industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 11(C), pages 24-38.
    2. Huang, Yu-Lun & Cárdenas, Alvaro A. & Amin, Saurabh & Lin, Zong-Syun & Tsai, Hsin-Yi & Sastry, Shankar, 2009. "Understanding the physical and economic consequences of attacks on control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(3), pages 73-83.
    3. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    4. Huitsing, Peter & Chandia, Rodrigo & Papa, Mauricio & Shenoi, Sujeet, 2008. "Attack taxonomies for the Modbus protocols," International Journal of Critical Infrastructure Protection, Elsevier, vol. 1(C), pages 37-44.
    5. Erez, Noam & Wool, Avishai, 2015. "Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 59-70.
    6. Goldenberg, Niv & Wool, Avishai, 2013. "Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(2), pages 63-75.
    7. Alcaraz, Cristina & Zeadally, Sherali, 2015. "Critical infrastructure protection: Requirements and challenges for the 21st century," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 53-66.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jarmakiewicz, Jacek & Parobczak, Krzysztof & Maślanka, Krzysztof, 2017. "Cybersecurity protection for power grid control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 18(C), pages 20-33.
    2. Rodofile, Nicholas R. & Radke, Kenneth & Foo, Ernest, 2019. "Extending the cyber-attack landscape for SCADA-based critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 25(C), pages 14-35.
    3. Cheng-Hui Chou & Chi-Che Wu & Kuan-Chu Lu & I-Hsien Liu & Tien-Hsiang Chang & Chu-Fen Li & Jung-Shian Li, 2018. "Modbus Packet Analysis and Attack Mode for SCADA System," Journal of ICT, Design, Engineering and Technological Science, Juhriyansyah Dalle, vol. 2(2), pages 30-35.
    4. Vlad Daniel SAVIN & Costel SERBAN, 2019. "Cybersecurity Vulnerabilities And Threats Of Scada Systems In Critical Infrastructures," Proceedings of the INTERNATIONAL MANAGEMENT CONFERENCE, Faculty of Management, Academy of Economic Studies, Bucharest, Romania, vol. 13(1), pages 234-237, November.
    5. SICARD, Franck & ZAMAI, Éric & FLAUS, Jean-Marie, 2019. "An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 584-603.
    6. Yadav, Geeta & Paul, Kolin, 2021. "Architecture and security of SCADA systems: A review," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
    7. Monzer, Mohamad-Houssein & Beydoun, Kamal & Ghaith, Alaa & Flaus, Jean-Marie, 2022. "Model-based IDS design for ICSs," Reliability Engineering and System Safety, Elsevier, vol. 225(C).
    8. Wang, Wei & Cammi, Antonio & Di Maio, Francesco & Lorenzi, Stefano & Zio, Enrico, 2018. "A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 24-37.
    9. Singh, Abhishek Narain & Gupta, M.P. & Ojha, Amitabh, 2014. "Identifying critical infrastructure sectors and their dependencies: An Indian scenario," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 71-85.
    10. Ghaleb, Asem & Zhioua, Sami & Almulhem, Ahmad, 2018. "On PLC network security," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 62-69.
    11. Tomáš Fröhlich & Zdeněk Hon & Martin Staněk & Jiří Slabý, 2023. "Method of Identification and Assessment of Security Needs of a Region against the Threat of a Large Power Outage," Energies, MDPI, vol. 16(11), pages 1-16, May.
    12. Nai Fovino, Igor & Masera, Marcelo & De Cian, Alessio, 2009. "Integrating cyber attacks within fault trees," Reliability Engineering and System Safety, Elsevier, vol. 94(9), pages 1394-1402.
    13. Farsi, Hamed & Fanian, Ali & Taghiyarrenani, Zahra, 2019. "A novel online state-based anomaly detection system for process control networks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 27(C).
    14. Milan Stojkov & Nikola Dalčeković & Branko Markoski & Branko Milosavljević & Goran Sladić, 2021. "Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid," Energies, MDPI, vol. 14(21), pages 1-29, October.
    15. Juntao Chen & Quanyan Zhu & Tamer Başar, 2021. "Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks," Dynamic Games and Applications, Springer, vol. 11(2), pages 294-325, June.
    16. Mohammed Alghassab, 2021. "Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector," Energies, MDPI, vol. 15(1), pages 1-21, December.
    17. Urrea, Claudio & Morales, Claudio & Kern, John, 2016. "Implementation of error detection and correction in the Modbus-RTU serial protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 15(C), pages 27-37.
    18. adepu, Sridhar & Mathur, Aditya, 2021. "SafeCI: Avoiding process anomalies in critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
    19. Erez, Noam & Wool, Avishai, 2015. "Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 59-70.
    20. Hadi Alizadeh & Ayyoob Sharifi, 2020. "Assessing Resilience of Urban Critical Infrastructure Networks: A Case Study of Ahvaz, Iran," Sustainability, MDPI, vol. 12(9), pages 1-20, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:20:y:2018:i:c:p:68-84. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.