EconPapers    
Economics at your fingertips  
 

A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol

Tarek Cherifi and Lamia Hamami

International Journal of Critical Infrastructure Protection, 2018, vol. 20, issue C, 68-84

Abstract: SCADA systems are used across the critical infrastructure to monitor and control vital industrial processes. Traditional firewalls, authentication mechanisms, and cryptographic algorithms and protocols are inadequate to secure SCADA systems and the underlying industrial processes from cyber attacks. This paper describes a novel approach for providing a high level of secrecy to the IEC 60870-5-101 protocol, a non-routable open SCADA communications protocol used in the electric power industry. The proposed approach incorporates a secrecy layer between the physical and link layers of the enhanced performance architecture of the IEC 60870-5-101 protocol. The secrecy layer is an implementation of Shannon’s notion of an unconditionally-secure system in which perfect secrecy and strong ideal secrecy are leveraged to guarantee the authenticity, integrity and confidentiality of SCADA data transmission. Experimental results using an industrial control testbed confirm that the proposed approach satisfies the temporal constraints imposed on SCADA systems used in electrical substations.

Keywords: SCADA System Security; IEC 60870-5-101 Protocol; Unconditional Security; Perfect Secrecy; Ideal Secrecy; Blum–Blum–Shub Cryptographically-Secure Pseudorandom Number Generator; Skein Hash Algorithm (search for similar items in EconPapers)
Date: 2018
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S1874548216301834
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:ijocip:v:20:y:2018:i:c:p:68-84

DOI: 10.1016/j.ijcip.2017.12.001

Access Statistics for this article

International Journal of Critical Infrastructure Protection is currently edited by Leon Strous

More articles in International Journal of Critical Infrastructure Protection from Elsevier
Bibliographic data for series maintained by Catherine Liu ().

 
Page updated 2025-03-19
Handle: RePEc:eee:ijocip:v:20:y:2018:i:c:p:68-84