Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol

被引:3
作者
Chochtoula, Despoina [1 ]
Ilias, Aristidis [1 ]
Stamatiou, Yannis C. [2 ,3 ]
Makris, Christos [1 ]
机构
[1] Univ Patras, Comp Engn & Informat Dept, Patras 26504, Greece
[2] Univ Patras, Dept Business Adm, Patras 26504, Greece
[3] Comp Technol Inst & Press Diophantus, 25is Martiou, Patras 26504, Greece
来源
FUTURE INTERNET | 2022年 / 14卷 / 08期
关键词
Elliptic Curve Cryptography; SCADA; Modbus protocol; ICT security; TCP; IP protocol; SECURITY;
D O I
10.3390/fi14080232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems are, today, vulnerable to attacks such as, among several others, interception of data traffic, malicious modifications of settings and control operations data, malicious modification of measurements and infrastructure data and Denial-of-Service attacks. Our research focuses on strengthening SCADA systems with cryptographic methods and protection mechanisms with emphasis on data and messaging encryption and device identification and authentication. The limited availability of computing power and memory in sensors and embedded devices deployed in SCADA systems make render cryptographic methods with higher resource requirements, such as the use of conventional public key cryptography such as RSA, unsuitable. We, thus, propose Elliptic Curve Cryptography as an alternative cryptographic mechanism, where smaller key sizes are required, with lower resource requirements for cryptographic operations. Accordingly, our approach integrates Modbus, a commonly used SCADA communication protocol, with Elliptic Curve Cryptography. We have, also, developed an experimental set-up in order to demonstrate the performance of our approach and draw conclusions regarding its effectiveness in real SCADA installations.
引用
收藏
页数:18
相关论文
共 36 条
  • [1] [Anonymous], 2012, Modbus Application Protocol Specification
  • [2] [Anonymous], STEPHANE LIBMODBUS
  • [3] [Anonymous], FLAME MALWARE SCADA
  • [4] [Anonymous], MODBUS TCP SECURITY
  • [5] [Anonymous], SCADA USING ANDROID
  • [6] [Anonymous], MAJOR SCADA ATTACKS
  • [7] Arduino, ARDUINO CC
  • [8] Blake I.F., 1999, ELLIPTIC CURVES CRYP
  • [9] Drury Bill., 2009, Control Techniques: Drives and Controls Handbook, V2nd, P508
  • [10] ECC-LIB, LIB ELL CURV CRYPT