Secured cloud SCADA system implementation for industrial applications

被引:0
|
作者
Fawzy A. Osman
Mohamed Y. M. Hashem
Mostafa A. R. Eltokhy
机构
[1] Benha University,Electrical Engineering Department, Faculty of Engineering
[2] Helwan University,Electronics Technology Department, Faculty of Technology and Education
来源
关键词
Remote SCADA System; RSS; RSA and CBC encryption algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
The proposed Remote SCADA System (RSS) is a smarter, faster and more reliable way to control high power machines and monitor their sensors, data, and failures. The proposed system focuses mainly on building our own complete SCADA software and not using open-source SCADA software. The proposed RSS can use unlimited number of added Remote Terminal Units (RTU) nodes and each of them can handling unlimited number of input/output and can be used under different operating systems like Windows and Android. Using RSS all machines can be monitored and controlled by a single click from anywhere at any time. By doing this a real-time response from RSS system can be achieved. It’s mainly based on standard communication techniques between remote nodes and single server-side application that talk to each node with its own ID and modify its instant database. So that every time accessing this web application, a real-time access to these nodes data and a virtual control room controls each General Purpose Input/Output (GPIO) in the selected node can be gotten. When a new event is happened in server-side program, it will be broadcasted to all related. On RSS there are two main points to deal with, the request latency and security of the system. This paper studied how the system latency and security are improved to obtain the needed values. The proposed RSS is a very secure program which have 4 security levels; authentication, authorization, RSA and CBC encryption system. Also, the encryption algorithms used in RSS are RSA and CBC block cipher encryption system. It is mixed way to prevent any attacker from breaking the cipher. First of all, RSA generates the public and private keys, and then CBC generates its Initialization vector and a random encryption key. Then a special function sends all of these keys encrypted with a pre-stored token in the data base and node memory which varied from node to another. Finally, node generates its private key from loaded public key. With this combination the speed of symmetric encryption system and the security of asymmetric encryption system can be achieved. On the other hand, the level of security firewalls needed to be Brocken by the attacker to brock the cipher is increased. The proposed system achieved low cost comparing with reported work; it is lower than Arduino + WIFI method by five times and 13 times lower than Raspberry-PI method. The proposed system is applied in educational systems, where it is used for teaching unlimited number of students Online.
引用
收藏
页码:9989 / 10005
页数:16
相关论文
共 50 条
  • [1] Secured cloud SCADA system implementation for industrial applications
    Osman, Fawzy A.
    Hashem, Mohamed Y. M.
    Eltokhy, Mostafa A. R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (07) : 9989 - 10005
  • [2] A Performance Approach: SCADA System Implementation within Cloud Computing Environment
    Shahzad, AAmir
    Musa, Shahrulniza
    Aborujilah, Abdulaziz
    Irfan, Muhammad
    2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2014, : 274 - 277
  • [3] SCADA Implementation of Industrial Temperature Automation
    Ali, Haider
    Ali, Ahmed
    Syed, Riaz Ul Hassnain
    Khan, Ajmal
    Khan, Ihsanullah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 145 - 150
  • [4] Framework for Implementation of AGA 12 for Secured SCADA Operation in Oil and Gas Industry
    Parvez, Bilal
    Ali, Junaid
    Ahmed, Usman
    Farhan, Muhammad
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1281 - 1284
  • [5] ZigBee Based Design of Low Cost SCADA System for Industrial Process Applications
    Rajkumar, R. Immanuel
    Alexander, T. Jerry
    Devi, Ponni
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 885 - 888
  • [6] Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications
    Leekha, Alka
    Shaikh, Alam
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (02): : 323 - 335
  • [7] Secured Cloud Storage for Strategic Applications - A case study
    Aravindh, T.
    Chander, S. Shyam
    Rukmani, R.
    Kalaichelvi, G.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 292 - 296
  • [8] Secured Cloud System Using Deep Learning
    Kumar, Surya Bhushan
    Mukherjee, Kuntal
    Dwivedi, Rajiv Kumar
    COMPUTATIONAL INTELLIGENCE IN PATTERN RECOGNITION, CIPR 2020, 2020, 1120 : 503 - 510
  • [9] TokenVote: Secured Electronic Voting System in the Cloud
    Alsolami, Fahad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 595 - 599
  • [10] iAttend: Secured Fingerprint Attendance System in the Cloud
    Alsolami, Fahad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (11): : 49 - 54