Skip to Main content Skip to Navigation
Conference papers

Enforcing end-to-end security in scada systems via application-level cryptography

Abstract : Recent technological advances have had a strong impact on performance optimization and the provisioning of flexible supervisory control and data acquisition (SCADA) systems. However, most SCADA communications protocols, as currently implemented, are extremely vulnerable to cyber attacks. Several international organizations have been developing security standards to alleviate these threats. Nevertheless, investigations reveal that the vast majority of high-end control hardware devices do not incorporate security features (i.e., security protocols). Therefore, the enforcement of data security in end-to-end communications flows must be addressed at the application layer. This chapter evaluates the feasibility of performing cryptographic computations at the application layer of a programmable logic controller. It shows that, despite the modest computational resources of modern programmable logic controllers, it is possible to develop efficient cryptographic applications that enforce several data security properties in the application layer. The experimental evaluations compare the performance of AES, SHA1 and HMAC-SHA1 against the performance of the new Speck and Simon lightweight block cipher algorithms executing on a Phoenix Contact ILC 350 PN controller with the control logic of a real SCADA system used in the Romanian gas transportation network.
Document type :
Conference papers
Complete list of metadata

Cited literature [17 references]  Display  Hide  Download

https://hal.inria.fr/hal-01819145
Contributor : Hal Ifip <>
Submitted on : Wednesday, June 20, 2018 - 9:24:19 AM
Last modification on : Wednesday, September 5, 2018 - 3:46:01 PM
Long-term archiving on: : Tuesday, September 25, 2018 - 12:12:19 PM

File

460140_1_En_8_Chapter.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Adrian-Vasile Duka, Bela Genge, Piroska Haller, Bogdan Crainicu. Enforcing end-to-end security in scada systems via application-level cryptography. 11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.139-155, ⟨10.1007/978-3-319-70395-4_8⟩. ⟨hal-01819145⟩

Share

Metrics

Record views

235

Files downloads

78