Secured cloud SCADA system implementation for industrial applications

被引:0
|
作者
Fawzy A. Osman
Mohamed Y. M. Hashem
Mostafa A. R. Eltokhy
机构
[1] Benha University,Electrical Engineering Department, Faculty of Engineering
[2] Helwan University,Electronics Technology Department, Faculty of Technology and Education
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Remote SCADA System; RSS; RSA and CBC encryption algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
The proposed Remote SCADA System (RSS) is a smarter, faster and more reliable way to control high power machines and monitor their sensors, data, and failures. The proposed system focuses mainly on building our own complete SCADA software and not using open-source SCADA software. The proposed RSS can use unlimited number of added Remote Terminal Units (RTU) nodes and each of them can handling unlimited number of input/output and can be used under different operating systems like Windows and Android. Using RSS all machines can be monitored and controlled by a single click from anywhere at any time. By doing this a real-time response from RSS system can be achieved. It’s mainly based on standard communication techniques between remote nodes and single server-side application that talk to each node with its own ID and modify its instant database. So that every time accessing this web application, a real-time access to these nodes data and a virtual control room controls each General Purpose Input/Output (GPIO) in the selected node can be gotten. When a new event is happened in server-side program, it will be broadcasted to all related. On RSS there are two main points to deal with, the request latency and security of the system. This paper studied how the system latency and security are improved to obtain the needed values. The proposed RSS is a very secure program which have 4 security levels; authentication, authorization, RSA and CBC encryption system. Also, the encryption algorithms used in RSS are RSA and CBC block cipher encryption system. It is mixed way to prevent any attacker from breaking the cipher. First of all, RSA generates the public and private keys, and then CBC generates its Initialization vector and a random encryption key. Then a special function sends all of these keys encrypted with a pre-stored token in the data base and node memory which varied from node to another. Finally, node generates its private key from loaded public key. With this combination the speed of symmetric encryption system and the security of asymmetric encryption system can be achieved. On the other hand, the level of security firewalls needed to be Brocken by the attacker to brock the cipher is increased. The proposed system achieved low cost comparing with reported work; it is lower than Arduino + WIFI method by five times and 13 times lower than Raspberry-PI method. The proposed system is applied in educational systems, where it is used for teaching unlimited number of students Online.
引用
收藏
页码:9989 / 10005
页数:16
相关论文
共 50 条
  • [21] ELECTRICAL TRACTION SYSTEM IMPLEMENTATION IN A SCADA ENVIRONMENT
    Abul Hasnat, Md
    Zivanovic, Rastko
    Al-Sarawi, Said F.
    2019 29TH AUSTRALASIAN UNIVERSITIES POWER ENGINEERING CONFERENCE (AUPEC), 2019,
  • [22] Design and implementation of a photogrammetric system for close range industrial applications
    Ergün, B
    OPTICAL MEASUREMENT SYSTEMS FOR INDUSTRIAL INSPECTION III, 2003, 5144 : 307 - 310
  • [23] Multi-Cloud Based Secured Storage System
    Bramhe, M. V.
    Sarode, M. V.
    HELIX, 2018, 8 (05): : 4019 - 4023
  • [24] Implementation of Industrial Cloud Applications as Controlled Local Systems (CLS) in a Smart Grid Context
    Henneke, Dominik
    Freudenmann, Christian
    Wisniewski, Lukasz
    Jasperneite, Juergen
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [25] Design Private Cloud of Oil and Gas SCADA System
    Miao, Liu
    Yuan, Mancang
    Li, Guodong
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2014, 1 (03): : 1 - 5
  • [26] Availability Study of the Italian Electricity SCADA System in the Cloud
    Sebastio, Stefano
    Scala, Antonio
    D'Agostino, Gregorio
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 : 201 - 212
  • [27] Implementation of a novel secured authentication protocol for cyber security applications
    Suresh Kumar, V.
    Ibrahim Khalaf, Osamah
    Raman Chandan, Radha
    Bsoul, Qusay
    Kant Gupta, Shashi
    Zawaideh, Firas
    Mohammed Alsekait, Deema
    Salama AbdElminaam, Diaa
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [28] Cloud Security Can the cloud be secured?
    Karnad, Kiran
    Nagenthram, Saravanan
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 208 - 210
  • [29] Applications of HACCP: Industrial implementation
    Sveum, WH
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1996, 211 : 39 - AGFD
  • [30] Secured Information System for Concurrent Engineering Applications
    Hartescu, Florin
    LEADING THE WEB IN CONCURRENT ENGINEERING: NEXT GENERATION CONCURRENT ENGINEERING, 2006, 143 : 389 - +