18
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Design and Development of Layered Security: Future Enhancements and Directions in Transmission

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

          Related collections

          Most cited references73

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          The Past, Present and Future of Cyber-Physical Systems: A Focus on Models

          This paper is about better engineering of cyber-physical systems (CPSs) through better models. Deterministic models have historically proven extremely useful and arguably form the kingpin of the industrial revolution and the digital and information technology revolutions. Key deterministic models that have proven successful include differential equations, synchronous digital logic and single-threaded imperative programs. Cyber-physical systems, however, combine these models in such a way that determinism is not preserved. Two projects show that deterministic CPS models with faithful physical realizations are possible and practical. The first project is PRET, which shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction. The second project is Ptides (programming temporally-integrated distributed embedded systems), which shows that deterministic models for distributed cyber-physical systems have practical faithful realizations. These projects are existence proofs that deterministic CPS models are possible and practical.
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            SCADA Cyber Security Testbed Development

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring

              The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.
                Bookmark

                Author and article information

                Contributors
                Role: Academic Editor
                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                06 January 2016
                January 2016
                : 16
                : 1
                : 37
                Affiliations
                [1 ]Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea; aamirshahzad@ 123456gmail.com
                [2 ]Department of Software Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea; stkim@ 123456jbnu.ac.kr
                [3 ]Division of Biotechnology, College of Environmental & Bioresource Sciences, Chonbuk National University, Iksan 570-752, Korea
                [4 ]College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea; choyh2285@ 123456skku.edu
                [5 ]Department of Beauty Arts Care, Koguryeo College, Naju 520-930, Korea; kklee7410@ 123456hanmail.net
                Author notes
                [* ]Correspondence: mrlee@ 123456chonbuk.ac.kr (M.L.); activase@ 123456jbnu.ac.kr (K.K.); jaeychoi@ 123456skku.edu (J.-Y.C.); Tel.: +82-10-3611-8004 (M.L.); +82-63-850-0836 (K.K.); +82-63-270-3993 (J.-Y.C.)
                Article
                sensors-16-00037
                10.3390/s16010037
                4732070
                26751443
                7a14007d-c166-4f5d-8a09-2c3de4bb87ec
                © 2016 by the authors; licensee MDPI, Basel, Switzerland.

                This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 05 October 2015
                : 12 December 2015
                Categories
                Article

                Biomedical engineering
                supervisory control and data acquisition,distributed network protocol,dynamic cryptography buffer

                Comments

                Comment on this article