Secured cloud SCADA system implementation for industrial applications

被引:0
|
作者
Fawzy A. Osman
Mohamed Y. M. Hashem
Mostafa A. R. Eltokhy
机构
[1] Benha University,Electrical Engineering Department, Faculty of Engineering
[2] Helwan University,Electronics Technology Department, Faculty of Technology and Education
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Remote SCADA System; RSS; RSA and CBC encryption algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
The proposed Remote SCADA System (RSS) is a smarter, faster and more reliable way to control high power machines and monitor their sensors, data, and failures. The proposed system focuses mainly on building our own complete SCADA software and not using open-source SCADA software. The proposed RSS can use unlimited number of added Remote Terminal Units (RTU) nodes and each of them can handling unlimited number of input/output and can be used under different operating systems like Windows and Android. Using RSS all machines can be monitored and controlled by a single click from anywhere at any time. By doing this a real-time response from RSS system can be achieved. It’s mainly based on standard communication techniques between remote nodes and single server-side application that talk to each node with its own ID and modify its instant database. So that every time accessing this web application, a real-time access to these nodes data and a virtual control room controls each General Purpose Input/Output (GPIO) in the selected node can be gotten. When a new event is happened in server-side program, it will be broadcasted to all related. On RSS there are two main points to deal with, the request latency and security of the system. This paper studied how the system latency and security are improved to obtain the needed values. The proposed RSS is a very secure program which have 4 security levels; authentication, authorization, RSA and CBC encryption system. Also, the encryption algorithms used in RSS are RSA and CBC block cipher encryption system. It is mixed way to prevent any attacker from breaking the cipher. First of all, RSA generates the public and private keys, and then CBC generates its Initialization vector and a random encryption key. Then a special function sends all of these keys encrypted with a pre-stored token in the data base and node memory which varied from node to another. Finally, node generates its private key from loaded public key. With this combination the speed of symmetric encryption system and the security of asymmetric encryption system can be achieved. On the other hand, the level of security firewalls needed to be Brocken by the attacker to brock the cipher is increased. The proposed system achieved low cost comparing with reported work; it is lower than Arduino + WIFI method by five times and 13 times lower than Raspberry-PI method. The proposed system is applied in educational systems, where it is used for teaching unlimited number of students Online.
引用
收藏
页码:9989 / 10005
页数:16
相关论文
共 50 条
  • [31] A Survey on SCADA Security and Honeypot in Industrial Control System
    Lu, Kuan-Chu
    Liu, I-Hsien
    Sun, Meng-Wei
    Li, Jung-Shian
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 598 - 604
  • [32] Industrial applications, technologies, challenges and trends for industrial cloud
    Xu Q.
    Wang L.
    Liu C.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2018, 24 (08): : 1887 - 1901
  • [33] The design of the graphical interface for the SCADA system on an industrial platform
    Hoarca, Joan Cristian
    Bizon, Nicu
    Enescu, Florentina Magda
    PROCEEDINGS OF THE 2020 12TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2020), 2020,
  • [34] An industrial virus propagation model based on SCADA system
    Zhu Q.
    Zhang G.
    Luo X.
    Gan C.
    Information Sciences, 2023, 630 : 546 - 566
  • [35] A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems
    Khan, Rafiullah
    McLaughlin, Kieran
    Kang, BooJoong
    Laverty, David
    Sezer, Sakir
    2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2020,
  • [36] An industrial virus propagation model based on SCADA system
    Zhu, Qingyi
    Zhang, Gang
    Luo, Xuhang
    Gan, Chenquan
    INFORMATION SCIENCES, 2023, 630 : 546 - 566
  • [37] Cloud applications monitoring: An industrial study
    Tamburri, Damian A.
    Miglierina, Marco
    Di Nitto, Elisabetta
    INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 127
  • [38] Deterministic Local Cloud for Industrial Applications
    Maliosz, Markosz
    Moldovan, Istvan
    Mate, Miklos
    Simon, Csaba
    Harmatos, Janos
    2023 IEEE 19TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS, 2023, : 134 - 141
  • [39] A Secured Event Log Storage Management System In Cloud Computing
    Vinitha, D. Esther Grace
    Duela, J. Shiny
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [40] Secured Pulse Rate Monitoring System using IoT and Cloud
    Ray, Aritra
    Ray, Hena
    2020 INTERNATIONAL CONFERENCE ON EMERGING FRONTIERS IN ELECTRICAL AND ELECTRONIC TECHNOLOGIES (ICEFEET 2020), 2020,