Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems

被引:2
|
作者
Riyadi, Eko Hadiyono [1 ,2 ]
Putra, Agfianto Eko [1 ]
Priyambodo, Tri Kuntoro [1 ]
机构
[1] Univ Gadjah Mada, Dept Comp Sci & Elect, Yogyakarta, Indonesia
[2] Ctr Regulatory Assessment Nucl Installat & Mat, Jakarta, Indonesia
关键词
DNP3; Security; Beaufort; RC4; Super encryption; Poly-alphabetic substitution; Accelerating key generation; COMPRESSION-ENCRYPTION; CYBER-SECURITY; NETWORK; MODEL;
D O I
10.7717/peerj-cs.727
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Background. Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. Methods. This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. Results. Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = -0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity.
引用
收藏
页码:1 / 28
页数:28
相关论文
共 1 条
  • [1] Next Generation Encryption using Security Enhancement Algorithms for End to End Data Transmission in 3G/4G Networks
    Kaul, Vikas
    Nemade, Bhushan
    Bharadi, Vinayak
    Khedkar, S. K. Narayan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 1051 - 1059