Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols

被引:0
|
作者
Aboulsamh, Rana Mohammed [1 ]
Albugaey, Maryam Tariq [1 ]
Alghamdi, Dana Omar [1 ]
Abujaid, Fatima Hussain [1 ]
Alsubaie, Sarah Nasser [1 ]
Saqib, Nazar Abbas [1 ]
机构
[1] IAU, Network & Commun, Dammam, Saudi Arabia
关键词
SCADA; Modbus; DNP3; Communication protocols; OT; PLC; RTU;
D O I
10.1109/WiDS-PSU61003.2024.00050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pipeline explosions, nuclear reactor shut-downs, power outages, and oxygen supply interruptions in intensive care units; SCADA systems with insecure connections are the main cause of these catastrophic scenarios. In today's world, SCADA systems changed from isolated stand-alone systems to distributed Internet-connected systems. As cyber-attacks against SCADA systems have increased in recent years, security researchers have begun to focus on the security of these systems. This paper's aim is to provide a comparative study of communication protocols used in SCADA systems with the objective of identifying and assessing the various secure communication protocols and whether they provide protection against different cyber threats. Followed by comparing different solutions for securing these systems protocols to overcome these weaknesses.
引用
收藏
页码:209 / 214
页数:6
相关论文
共 50 条
  • [1] Analysis of Network Protocols for Secure Communication
    Caballero, David
    Gonzalez, Francisco
    Islam, Sheikh Ariful
    [J]. 9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [2] Design and implementation of secure communication protocols for Internet of Things systems
    Bassole, Didier
    Kabore, Kisito K.
    Traore, Yaya
    Sie, Oumarou
    Ben Sta, Hatem
    [J]. 2019 5TH IEEE INTERNATIONAL SMART CITIES CONFERENCE (IEEE ISC2 2019), 2019, : 112 - 117
  • [3] A Survey on Secure Communication Protocols for IoT Systems (Invited Paper)
    Dragomir, Dan
    Gheorghe, Laura
    Costea, Sergiu
    Radovici, Alexandru
    [J]. 2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 47 - 62
  • [4] FORMAL SPECIFICATION AND VERIFICATION OF SECURE COMMUNICATION PROTOCOLS
    KNAPSKOG, SJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 58 - 73
  • [5] Research and Implementation of Secure Industrial Communication Protocols
    Wang Jingran
    Liu Mingzhe
    Xu Aidong
    Hu Bo
    Han Xiaojia
    Zhou Xiufang
    [J]. PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 314 - 317
  • [6] Survey on secure communication protocols for the Internet of Things
    Kim Thuat Nguyen
    Laurent, Maryline
    Oualha, Nouha
    [J]. AD HOC NETWORKS, 2015, 32 : 17 - 31
  • [7] Secure protocols or how communication generates correlation
    Gossner, O
    [J]. JOURNAL OF ECONOMIC THEORY, 1998, 83 (01) : 69 - 89
  • [8] Information Assurance Protocols: Efficiency Analysis and Implementation for Secure Communication
    Verkhovsky, Boris S.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (04): : 263 - 269
  • [9] A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics
    Pliatsios, Dimitrios
    Sarigiannidis, Panagiotis
    Lagkas, Thomas
    Sarigiannidis, Antonios G.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1942 - 1976
  • [10] Communication protocols for secure distributed computation of binary functions
    Modiano, E
    Ephremides, A
    [J]. INFORMATION AND COMPUTATION, 2000, 158 (02) : 71 - 97