Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

@inproceedings{Chae2015IndustrialCS,
  title={Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements},
  author={Hongseok Chae and Aamir Shahzad and Muhammad Irfan and HyangRan Lee and Malrey Lee and Chon Buk},
  year={2015}
}
Massive numbers of applications have been developed to fulfill the requirements of end-users; the world is considered as a cell of communication in which applications are centralized and distributed, and accessed by internet. Like traditional networks, real time networks such as supervisory control and data acquisition (SCADA) systems, distributed controller systems (DCSs) and others have been employing the internet technology to connect their various stations, and with central controller(s… 

Figures from this paper

Sensors Network and Security and Multimedia Enhancement

These fields are integrated to visualize and finalize the proposed development, in simulation environment, and a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site.

Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

A new security design was developed with the MODBUS protocol, which was considered to offer phenomenal performance for future development and enhancement of real IT infrastructure and is considered to be a complete development.

Hardware Assisted Security Architecture for Smart Grid

  • A. SiddiquiYutian Gui F. Saqib
  • Computer Science, Engineering
    IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society
  • 2018
A hardware-assisted framework for secure intra smart grid communication that protects the confidentiality and integrity of data between each node and additionally provides authentication for the communicating parties is proposed.

Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective

This paper offers an insightful review of possible solution path beginning with the understanding of ICS security trends relative to cyber threats, vulnerabilities, attacks and patterns, agents, risks, and the impacts of all these on the industrial environment and entities that depend on it.

ICS/SCADA System Security for CPS

It is crucial to keep ICS/SCADA system safe and secure to prevent any cyberattack causing a physical hazard to the smart grid which might affect the human life, national safety, or economy.

New Threats for Old Manufacturing Problems: Secure IoT-Enabled Monitoring of Legacy Production Machinery

This paper aims to assess and classify the security aspects of integrating IoT technology with monitoring systems in manufacturing environments and propose a systematic view of relevant vulnerabilities and threats by taking an IoT architecture point of view.

A Contribution to Enhance the Panoramic Image Security via Cryptography and Shuffled Methods

Two generic security solutions are proposed which provide a significance security for the information that being travelled in the unsecure networks, which employs a novel shuffling method, which deployed to enhance the security of information while travelling to the unsecured networks.

Tedeschi, Stefano and Emmanouilidis, Christos and Farnsworth, Michael and Mehnen, Jorn and Roy, Rajkumar (2017) New threats for old manufacturing problems : secure IoT-enabled monitoring of legacy production machinery. In: Advances in Production Management

This paper aims to assess and classify the security aspects of integrating IoT technology with monitoring systems in manufacturing environments and propose a systematic view of relevant vulnerabilities and threats by taking an IoT architecture point of view.

References

SHOWING 1-10 OF 16 REFERENCES

Key Encryption Method for SCADA Security Enhancement

The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack to enhance the security of DNP3 protocol as a part of SCADA system.

Security Enhancements for Distributed Control Systems

Three security enhancements for distributed control systems that satisfy end-to-end security for DCS protocol communications, role-based authorization to control access to devices and prevent unauthorized changes to operational parameters, and reduced operating system kernels for enhanced device security are presented.

Challenges and Direction toward Secure Communication in the SCADA System

  • Sugwon HongMyungho Lee
  • Computer Science
    2010 8th Annual Communication Networks and Services Research Conference
  • 2010
The security protocol which has been proposed in the SCADA cyber security initiatives and implementation issues when the both security function and the communication function are implemented on the embedded system devices in future power grid including theSCADA network are explained.

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security

Hybrid Cryptography Secure Simulation Model is used to discuss and give solutions for putting security services such as authentication, integrity, confidentiality, and non-repudiation in APDU and LPDU within SCADA DNP3 protocol, and solutions to overcome/prevent attacks.

Challenges and Perspectives in Security Measures for the SCADA System

The SCADA system architecture is overviewed and the constraints due to the system’s own characteristics are considered, and the technological challenges for the SCADA security are explained.

A Performance Approach: SCADA System Implementation within Cloud Computing Environment

This research paper reviews the SCADA and cloud computing architectures and deployed the entire SCADA system within cloud computing environment, and measured the performance results during packets (bytes) transmission, finding that cloud computing platform is best approach forSCADA system, in terms of performance and cost.

Deployment of new dynamic cryptography buffer for SCADA security enhancement

A novel solution which deploy the security mechanism, more advance cryptography solution within distributed Network Protocol (DNP3) stack as a part of critical system (or SCADA) system is based on.

Vulnerability of Smart Grids With Variable Generation and Consumption: A System of Systems Perspective

  • E. ZioG. Sansavini
  • Engineering
    IEEE Transactions on Systems, Man, and Cybernetics: Systems
  • 2013
This paper looks into the vulnerabilities of the electric power grid and associated communication network, in the face of intermittent power generation and uncertain demand within a complex network