2015
DOI: 10.3390/sym7041945
|View full text |Cite
|
Sign up to set email alerts
|

New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

Abstract: Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA) systems as a part of industrial control systems (ICS). SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment pla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(33 citation statements)
references
References 52 publications
0
32
0
1
Order By: Relevance
“…In literature [10][11][12][13], traditional security designs and developments were conducted for SCADA systems, but a development is still required that will be more significant in the terms of security enhancements, without various protocols dependencies, and minimal interrupting of normal SCADA/DNP3 traffic. To fulfill these requirements, a cryptography based security enhancement is made in data link layer of DNP3 protocol.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In literature [10][11][12][13], traditional security designs and developments were conducted for SCADA systems, but a development is still required that will be more significant in the terms of security enhancements, without various protocols dependencies, and minimal interrupting of normal SCADA/DNP3 traffic. To fulfill these requirements, a cryptography based security enhancement is made in data link layer of DNP3 protocol.…”
Section: Literature Surveymentioning
confidence: 99%
“…In researches [11,14], simulation based multimedia environments were designed to carry the SCADA communication in industrial environments such as, water pumping station, gas station, electrical station and other SCADA industries, but are limited to specific station, and plant . Meaning that, automation and processing are simulated between sensors and actuators, by mean of programmable logical controllers (PLCs) but fail to display the information that have been occurred in transmission.…”
Section: Proposed Design and Implementationmentioning
confidence: 99%
“…Thereby, the system is considered as a fully automated system and reachable to numerous smart devices, such as cellular devices, laptops, and others, using the Internet access. However, the system is not designed with the considerations of security, that is, Internet security as well as the security protection against the potential system's vulnerabilities [48,49]. So, the comprehensive security design will be a major contribution to this study aimed to draft in nearly future; nevertheless, here in the current stage, this study considers the inclusive smart setup procedure which is useful during the verification process to verify whether or not the vehicle that beings utilizing the parking service is authorized or not.…”
Section: Registration and Primary Featuresmentioning
confidence: 99%
“…And applying our method to different uncoded modulation systems, i.e., MQAM (M-ary quadrature amplitude modulation) and MPSK (M-ary phase shift keying), confirmed its effectiveness. 4 The system model and problem statement…”
Section: Background and Related Workmentioning
confidence: 99%
“…The wireless sensor networks have been developed for a long time [21][22][23][24][25][26]; with the development of wireless portable devices and sensor technology, the application of wireless sensor network in the industrial field becomes the focus of attention [2,4]. Industrial wireless sensor networks (IWSNs) is emerging in this background; it does not require wiring to be deployed at any time and has simple requirements for complex industrial sites; the device is small and easy to deploy and has powerful functions that can be used to detect and monitor a variety of visible and invisible physical phenomena in close range and high precision; and the strong practicality makes it to have broad application prospects in various fields of industrial production [1,2,9,10], especially with the rise of cloud computing [27] and fog computing [28][29][30], to make its development face greater opportunities.…”
Section: Introductionmentioning
confidence: 99%