2010
DOI: 10.4236/wsn.2010.27064
|View full text |Cite
|
Sign up to set email alerts
|

Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries

Abstract: The energy industry and in particular the Oil Refineries are extremely important elements in Iraq's infrastructure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the whole economy. It can also cause serious damage to the environment and even losses of human lives. The security of information systems and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a majo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
(7 reference statements)
0
5
0
Order By: Relevance
“…Data is collected by sensor-device and send via in-house Ethernet to a local server where the necessary computing and memory requirement for using classical IT encryption are presents. The local server is connected to the Internet via a gateway-firewall as part of the strategy of ring of defense [19]. This strategy includes many security measurements such as antivirus, firewall, data encryption and authentication process as shown in the Figure 2.…”
Section: Research Methods 21 Iot-smart Home and Security Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Data is collected by sensor-device and send via in-house Ethernet to a local server where the necessary computing and memory requirement for using classical IT encryption are presents. The local server is connected to the Internet via a gateway-firewall as part of the strategy of ring of defense [19]. This strategy includes many security measurements such as antivirus, firewall, data encryption and authentication process as shown in the Figure 2.…”
Section: Research Methods 21 Iot-smart Home and Security Challengesmentioning
confidence: 99%
“…SAFER+ is a 128-bit block cipher with three optional key lengths; 128-bit key, 192-bit key, or 256-bit and encryption/ decryption rounds (R) equal to 8, 12 and 16 accordingly [19], [27]. The protocol starts by the key schedule to generat a set of 2R keys from the original secret key owned by both sender and receiver sides (K 1 ).…”
Section: Safer+mentioning
confidence: 99%
“…The confrontation of SAFER+ standard with existing encryption algorithms proves its superiority in Bluetooth algorithms, but this encryption system is also used in other fields [11]. Its digital VLSI design and FPGA implementation shows an outstanding performance in terms of minimization of delay which enables this algorithm to be utilized for high-speed applications [12,13]. The software implementation of the algorithm confirms its speed quality for various case studies including speech, image and data in general.…”
Section: Introductionmentioning
confidence: 93%
“…DCS are widely deployed and play increasingly vital roles in petroleum refineries [8], [9]. The dominating DCS products in refineries include Yamatake, Bradley, and Honeywell.…”
Section: Architecture Of Dcs Systemmentioning
confidence: 99%