Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator

被引:1
作者
Upadhyay, Darshana [1 ]
Ghosh, Sagarika [1 ]
Ohno, Hiroyuki [2 ]
Zaman, Marzia [3 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 1W5, Canada
[2] Kanazawa Univ, Grad Sch Nat Sci & Technol, Kanazawa, Ishikawa 9201192, Japan
[3] Cistel Technol, Res & Dev Dept, Ottawa, ON K2E 7V7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
SCADA; ICSs; IoT; Hardware test bench; Cyber-attacks; Lightweight cipher; Raspberry Pi; Modbus; MQTT; VTSCADA; KEY MANAGEMENT ARCHITECTURE; INTRUSION DETECTION; CYBER SECURITY; ISSUES; MODEL;
D O I
10.1016/j.ijcip.2024.100705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyberattacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter & Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.
引用
收藏
页数:20
相关论文
共 44 条
[1]  
Ado K., SHA-1 Has Been Compromised In Practice
[2]  
[Anonymous], 2018, Advisory (ICSA-13-291-01B). DNP3 Implementation Vulnerability (Update B) | ICS-CERT. Advisory Database
[3]   Characteristics of wind power generation in Jeju Island [J].
Baatarbileg, Ankhzaya ;
Ko, Hyukjoo ;
Otgongerel, Zulmandakh ;
Lee, Gaemyoung .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART A-JOURNAL OF POWER AND ENERGY, 2021, 235 (03) :620-628
[4]  
Boyd Colin., 2006, Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Darlinghurst, Australia, P183
[5]  
Byres E, 2013, DNP3 Vulnerabilities Part 1 of 2 - NERC's Electronic Security Perimeter is Swiss Cheese | Tofino Industrial Security Solution
[6]  
Cagalaban G., 2016, Improving SCADA Control Systems Security with Software Vulnerability, DOI [10.1007/978-3-642-22706-6, DOI 10.1007/978-3-642-22706-6]
[7]  
Choi D, 2013, J INF SCI ENG, V29, P281
[8]   Efficient Secure Group Communications for SCADA [J].
Choi, Donghyun ;
Lee, Sungjin ;
Won, Dongho ;
Kim, Seungjoo .
IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (02) :714-722
[9]   Down the Rabbit Hole: Fostering Active Learning through Guided Exploration of a SCADA Cyber Range [J].
Cruz, Tiago ;
Simoes, Paulo .
APPLIED SCIENCES-BASEL, 2021, 11 (20)
[10]  
Delfs H., 2015, Introduction to Cryptography: Principles and Applications, P11