24
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing critical infrastructures and manufacturing plants. The evolution towards interconnection and interoperability has expanded the vulnerabilities of these systems, especially in the context of the widely spread legacy standard protocols, by exposing the data to the outside network. After gaining access to the system data by launching a variety of attacks, an intruder can cause severe damage to the industrial process in place. Hence, this paper attempts to respond to the security issue caused by legacy structures using insecure communication protocols (e.g., Modbus TCP, DNP3, S7), presenting a different perspective focused on the capabilities of a trusted platform module (TPM). Furthermore, the intent is to assure the authenticity of the data transmitted between two entities on the same (horizontal interoperation) or different (vertical interoperation) hierarchical levels communicating through Modbus TCP protocol based on functionalities obtained by integrating trusted platform modules. From the experimental results perspective, the paper aims to show the advantages of integrating TPMs in automation/SCADA systems in terms of security. Two methods are proposed in order to assure the authenticity of the messages which are transmitted, respectively the study presents the measurements related to the increased time latency introduced due to the proposed concept.

          Related collections

          Most cited references55

          • Record: found
          • Abstract: not found
          • Article: not found

          What Drives the Implementation of Industry 4.0? The Role of Opportunities and Challenges in the Context of Sustainability

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Distributed Blockchain-Based Data Protection Framework for Modern Power Systems against Cyber Attacks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                27 September 2019
                October 2019
                : 19
                : 19
                : 4191
                Affiliations
                Department of Automation and Applied Informatics, Faculty of Automation and Computers, University Politehnica Timisoara, 300223 Timisoara, Romania; alexandra.tidrea@ 123456gmail.com (A.T.); ioan.silea@ 123456upt.ro (I.S.)
                Author notes
                [* ]Correspondence: adrian.korodi@ 123456upt.ro
                Author information
                https://orcid.org/0000-0003-2519-7578
                Article
                sensors-19-04191
                10.3390/s19194191
                6806326
                31569636
                4423d22b-5e5f-46a9-9e98-ef4374e97c55
                © 2019 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 18 August 2019
                : 25 September 2019
                Categories
                Article

                Biomedical engineering
                security,scada,automation systems,tpm,modbus tcp,hmac,ecdsa,cryptography,industrial internet of things

                Comments

                Comment on this article