A Security and Authentication Layer for SCADA/DCS Applications

Journal article


Homay, A., Chrysoulas, C., Boudani, B.E., de Sousa, M. and Wollschlaeger, M. (2020). A Security and Authentication Layer for SCADA/DCS Applications. Microprocessors and Microsystems. p. 103479. https://doi.org/10.1016/j.micpro.2020.103479
AuthorsHomay, A., Chrysoulas, C., Boudani, B.E., de Sousa, M. and Wollschlaeger, M.
AbstractMid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control system. After this attack, the whole ICS industry security was thrust into spotlight. Automation suppliers have already started to re-think their business approach to cyber security. The OPC foundation have made also significant changes and improvements on its new design OPC-UA to increase security of automation applications but, what is still missing and seems to be not resolved any time soon is having security in depth for industrial automation applications. In this paper, we propose a simple but strong security control solution to be implemented as a logic level security on SCADA and DCS systems. The method presented in this work enforces message integrity to build trusts between DCS system components, but it should not be viewed as the main nor the only protection layer implemented on an industrial automation system. The proposed solution can be viewed as a low-level security procedure to avoid malicious attacks such as Stuxnet.
Year2020
JournalMicroprocessors and Microsystems
Journal citationp. 103479
PublisherElsevier
ISSN01419331
Digital Object Identifier (DOI)https://doi.org/10.1016/j.micpro.2020.103479
Publication dates
Online15 Nov 2020
Publication process dates
Accepted13 Nov 2020
Deposited25 Nov 2020
Accepted author manuscript
License
File Access Level
Open
Page range103479
Permalink -

https://openresearch.lsbu.ac.uk/item/8v62x

Download files


Accepted author manuscript
1-s2.0-S0141933120306323-main.pdf
License: CC BY-NC-ND 4.0
File access level: Open

  • 82
    total views
  • 117
    total downloads
  • 0
    views this month
  • 2
    downloads this month

Export as

Related outputs

Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap
El Boudani, B., Dagiuklas, A., Kanaris, L., Iqbal, M. and Chrysoulas, C. (2023). Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap. Electronics. 12 (19), p. 4150. https://doi.org/10.3390/electronics12194150
SO-KDN: A Self-Organised Knowledge Defined Networks Architecture for Reliable Routing
Ghosh, S., El Boudani, B., Dagiuklas, A. and Iqbal, M. (2021). SO-KDN: A Self-Organised Knowledge Defined Networks Architecture for Reliable Routing. 2021 The 4th International Conference on Information Science and Systems. https://doi.org/10.1145/3459955.3460617