Security Challenges in Control Network Protocols: A Survey

被引:50
|
作者
Volkova, Anna [1 ]
Niedermeier, Michael [1 ]
Basmadjian, Robert [1 ]
de Meer, Hermann [1 ]
机构
[1] Univ Passau, Dept Comp Sci & Math, Comp Networking Lab, D-94032 Passau, Germany
来源
关键词
Control systems; network protocols; network security; INTRUSION DETECTION; SYSTEM; ATTACKS; DESIGN;
D O I
10.1109/COMST.2018.2872114
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ongoing adoption of remotely communicating and interacting control systems harbored by critical infrastructures, the potential attack surface of such systems also increases drastically. Therefore, not only the need for standardized and manufacturer-agnostic control system communication protocols has grown, but also the requirement to protect those control systems' communication. There have already been numerous security analyses of different control system communication protocols; yet, these have not been combined with each other sufficiently, mainly due to three reasons: First, the life cycles of such protocols are usually much longer than those of other Internet and communication technologies, therefore legacy protocols are often not considered in current security analyses. Second, the usage of certain control system communication protocols is usually restricted to a particular infrastructure domain, which leads to an isolated view on them. Third, with the accelerating pace at which both control system communication protocols and threats against them develop, existing surveys are aging at an increased rate, making their re-investigation a necessity. In this paper, a comprehensive survey on the security of the most important control system communication protocols, namely Modbus, OPC UA, TASE.2, DNP3, IEC 60870-5-101, IEC 60870-5-104, and IEC 61850 is performed. To achieve comparability, a common test methodology based on attacks exploiting well-known control system protocol vulnerabilities is created for all protocols. In addition, the effectiveness of the related security standard IEC 62351 is analyzed by a pre- and post-IEC 62351 comparison.
引用
收藏
页码:619 / 639
页数:21
相关论文
共 50 条
  • [1] Survey on IoV routing protocols: Security and network architecture
    Alouache, Lylia
    Nguyen, Nga
    Aliouat, Makhlouf
    Chelouah, Rachid
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (02)
  • [2] WSN Protocols and Security Challenges for Environmental Monitoring Applications: A Survey
    Adu-Manu, Kofi Sarpong
    Engmann, Felicia
    Sarfo-Kantanka, Godwin
    Baiden, Godwill Enchill
    Dulemordzi, Bernice Akusika
    [J]. JOURNAL OF SENSORS, 2022, 2022
  • [3] Security challenges for routing protocols in mobile ad hoc network
    Kakade, Kiran Shrimant
    Rajesh, C.
    Veena, T.
    Sivakumar, P.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (03)
  • [4] A survey on security challenges and protocols of electric vehicle dynamic charging system
    Babu, Ponnuru Raveendra
    Palaniswamy, Basker
    Reddy, Alavalapati Goutham
    Odelu, Vanga
    Kim, Hyun Sung
    [J]. SECURITY AND PRIVACY, 2022, 5 (03):
  • [5] A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
    Tomic, Ivana
    McCann, Julie A.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1910 - 1923
  • [6] Security Protocols in WSN: A Survey
    Ayyappan, B.
    Kumar, P. Mohan
    [J]. 2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 301 - 304
  • [7] Challenges on Digital Cyber-Security and Network Forensics: A Survey
    Al-Sanjary, Omar Ismael
    Ahmed, Ahmed Abdullah
    Mohammed, M. N.
    Aik, Kevin Loo Teow
    [J]. ADVANCES ON INTELLIGENT INFORMATICS AND COMPUTING: HEALTH INFORMATICS, INTELLIGENT SYSTEMS, DATA SCIENCE AND SMART COMPUTING, 2022, 127 : 524 - 537
  • [8] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [9] Challenges in the automated verification of security protocols
    Comon-Lundh, Hubert
    [J]. AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
  • [10] Security Mechanisms in Network Protocols
    Kolodziejczyk, Marcin
    Ogiela, Marek R.
    [J]. UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 427 - 430