Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

  title={Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements},
  author={H. Chae and Aamir Shahzad and Muhammad Irfan and HyangRan Lee and Malrey Lee and Chon Buk},
Massive numbers of applications have been developed to fulfill the requirements of end-users; the world is considered as a cell of communication in which applications are centralized and distributed, and accessed by internet. Like traditional networks, real time networks such as supervisory control and data acquisition (SCADA) systems, distributed controller systems (DCSs) and others have been employing the internet technology to connect their various stations, and with central controller(s… Expand
Sensors Network and Security and Multimedia Enhancement
These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systemsExpand
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information
A new security design was developed with the MODBUS protocol, which was considered to offer phenomenal performance for future development and enhancement of real IT infrastructure and is considered to be a complete development. Expand
Hardware Assisted Security Architecture for Smart Grid
A hardware-assisted framework for secure intra smart grid communication that protects the confidentiality and integrity of data between each node and additionally provides authentication for the communicating parties is proposed. Expand
Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective
ABSTRACT Nowadays, the industrial sector is being challenged by several cybersecurity concerns. Direct attacks by malicious persons and (or) software form part of the severe jeopardies of industrialExpand
ICS/SCADA System Security for CPS
It is crucial to keep ICS/SCADA system safe and secure to prevent any cyberattack causing a physical hazard to the smart grid which might affect the human life, national safety, or economy. Expand
New Threats for Old Manufacturing Problems: Secure IoT-Enabled Monitoring of Legacy Production Machinery
This paper aims to assess and classify the security aspects of integrating IoT technology with monitoring systems in manufacturing environments and propose a systematic view of relevant vulnerabilities and threats by taking an IoT architecture point of view. Expand
A Contribution to Enhance the Panoramic Image Security via Cryptography and Shuffled Methods
Major changes have been accounted in the field’s of information technology(IT), the information that may in the form of audio, video and text, can be transferred anytime, from source to destinationExpand
Tedeschi, Stefano and Emmanouilidis, Christos and Farnsworth, Michael and Mehnen, Jorn and Roy, Rajkumar (2017) New threats for old manufacturing problems : secure IoT-enabled monitoring of legacy production machinery. In: Advances in Production Management
The digitization of manufacturing through the introduction of Industrie 4.0 technologies creates additional business opportunities and technical challenges. The integration of such technologies onExpand


Key Encryption Method for SCADA Security Enhancement
With the growing demands of Industrial Control Systems (ICS) in all over the world, the industries such as water, electric and gas are using real time infrastructures for communication between filedExpand
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
  • Hyungjun Kim
  • Computer Science
  • Int. J. Distributed Sens. Networks
  • 2012
An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed and proper and precise security management methods are proposed. Expand
Security Enhancements for Distributed Control Systems
Three security enhancements for distributed control systems that satisfy end-to-end security for DCS protocol communications, role-based authorization to control access to devices and prevent unauthorized changes to operational parameters, and reduced operating system kernels for enhanced device security are presented. Expand
Challenges and Direction toward Secure Communication in the SCADA System
  • S. Hong, Myungho Lee
  • Computer Science
  • 2010 8th Annual Communication Networks and Services Research Conference
  • 2010
The security protocol which has been proposed in the SCADA cyber security initiatives and implementation issues when the both security function and the communication function are implemented on the embedded system devices in future power grid including theSCADA network are explained. Expand
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security
Hybrid Cryptography Secure Simulation Model is used to discuss and give solutions for putting security services such as authentication, integrity, confidentiality, and non-repudiation in APDU and LPDU within SCADA DNP3 protocol, and solutions to overcome/prevent attacks. Expand
Challenges and Perspectives in Security Measures for the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from researchExpand
Guide to Industrial Control Systems (ICS) Security
This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and otherExpand
A Performance Approach: SCADA System Implementation within Cloud Computing Environment
This research paper reviews the SCADA and cloud computing architectures and deployed the entire SCADA system within cloud computing environment, and measured the performance results during packets (bytes) transmission, finding that cloud computing platform is best approach forSCADA system, in terms of performance and cost. Expand
Deployment of new dynamic cryptography buffer for SCADA security enhancement
A novel solution which deploy the security mechanism, more advance cryptography solution within distributed Network Protocol (DNP3) stack as a part of critical system (or SCADA) system is based on. Expand
Vulnerability of Smart Grids With Variable Generation and Consumption: A System of Systems Perspective
  • E. Zio, G. Sansavini
  • Computer Science
  • IEEE Transactions on Systems, Man, and Cybernetics: Systems
  • 2013
This paper looks into the vulnerabilities of the electric power grid and associated communication network, in the face of intermittent power generation and uncertain demand within a complex networkExpand