EconPapers    
Economics at your fingertips  
 

Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol

Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou and Christos Makris
Additional contact information
Despoina Chochtoula: Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece
Aristidis Ilias: Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece
Yannis C. Stamatiou: Department of Business Administration, University of Patras, 26504 Patras, Greece
Christos Makris: Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece

Future Internet, 2022, vol. 14, issue 8, 1-18

Abstract: SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems are, today, vulnerable to attacks such as, among several others, interception of data traffic, malicious modifications of settings and control operations data, malicious modification of measurements and infrastructure data and Denial-of-Service attacks. Our research focuses on strengthening SCADA systems with cryptographic methods and protection mechanisms with emphasis on data and messaging encryption and device identification and authentication. The limited availability of computing power and memory in sensors and embedded devices deployed in SCADA systems make render cryptographic methods with higher resource requirements, such as the use of conventional public key cryptography such as RSA, unsuitable. We, thus, propose Elliptic Curve Cryptography as an alternative cryptographic mechanism, where smaller key sizes are required, with lower resource requirements for cryptographic operations. Accordingly, our approach integrates Modbus, a commonly used SCADA communication protocol, with Elliptic Curve Cryptography. We have, also, developed an experimental set-up in order to demonstrate the performance of our approach and draw conclusions regarding its effectiveness in real SCADA installations.

Keywords: Elliptic Curve Cryptography; SCADA; Modbus protocol; ICT security; TCP/IP protocol (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/14/8/232/pdf (application/pdf)
https://www.mdpi.com/1999-5903/14/8/232/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:14:y:2022:i:8:p:232-:d:874608

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:14:y:2022:i:8:p:232-:d:874608