Improving the cyber security of SCADA communication networks
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
On building secure SCADA systems using security patterns
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
SCADA (Supervisory Control and Data Acquisition) is a real time systems that are deployed over real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. These systems were connected with local area network or limited networks but now with the latest technology and facilities in real time infrastructure these systems are also moving from local area network to the internet. Using internet communication, these systems are attacked by several attacks therefore these systems need protection from different kinds of attacks/threads to secure communication between devices that are communicating with SCADA environment. The current research takes the Hybrid-based Cryptography solution using "Symmetric AES and Asymmetric RSA algorithms" to secure the SCADA communication by implementing security services such as authentication, confidentiality, and Non- Repudiation. Simulation environment is used to verify propose a solution is implemented properly between Master Terminal Unit (MTU) and Remote Terminal Unit (RTUs) during the transmission of payload (data) in a wireless network.