Your browser doesn't support javascript.
loading
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang.
Afiliação
  • Shahzad A; Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea. aamirshahzad@gmail.com.
  • Lee M; Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea. mrlee@chonbuk.ac.kr.
  • Kim S; Department of Software Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea. stkim@jbnu.ac.kr.
  • Kim K; Division of Biotechnology, College of Environmental & Bioresource Sciences, Chonbuk National University, Iksan 570-752, Korea. activase@jbnu.ac.kr.
  • Choi JY; College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea. jaeychoi@skku.edu.
  • Cho Y; College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea. choyh2285@skku.edu.
  • Lee KK; Department of Beauty Arts Care, Koguryeo College, Naju 520-930, Korea. kklee7410@hanmail.net.
Sensors (Basel) ; 16(1)2016 Jan 06.
Article em En | MEDLINE | ID: mdl-26751443
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Assuntos
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Assunto principal: Redes de Comunicação de Computadores / Segurança Computacional Idioma: En Ano de publicação: 2016 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Assunto principal: Redes de Comunicação de Computadores / Segurança Computacional Idioma: En Ano de publicação: 2016 Tipo de documento: Article