A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants
Supervisory control and data acquisition (SCADA) is a widely implemented structure to achieve remote measurement and control in many iron and steel plants. In traditional consideration, more attention on physical network separation methods is paid to isolate the SCADA system from management network...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8681037/ |
id |
doaj-ba7f860242dc40969e002f277c52055a |
---|---|
record_format |
Article |
spelling |
doaj-ba7f860242dc40969e002f277c52055a2021-03-29T22:32:33ZengIEEEIEEE Access2169-35362019-01-017469474695810.1109/ACCESS.2019.29090118681037A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel PlantsJunlei Qian0https://orcid.org/0000-0003-4952-9880Changchun Hua1Xinping Guan2Tiefeng Xin3Limin Zhang4Institute of Electrical Engineering, Yanshan University, Qinhuangdao, ChinaInstitute of Electrical Engineering, Yanshan University, Qinhuangdao, ChinaSchool of Electronics, Information and Electric Engineering, Shanghai Jiao Tong University, Shanghai, ChinaChina Electric Power Hwaray Technology Co., Ltd., Beijing, ChinaDepartment of Mathematics and Computer Science, Hengshui University, Hengshui, ChinaSupervisory control and data acquisition (SCADA) is a widely implemented structure to achieve remote measurement and control in many iron and steel plants. In traditional consideration, more attention on physical network separation methods is paid to isolate the SCADA system from management network to keep SCADA in a considered ”safe” state. In addition, lots of security solution providers are focusing on the network side security assurance without involving the SCADA communication level protection. This paper investigates a new trusted-ID referenced key scheme for securing SCADA communications efficiently. The advanced encryption standard algorithm is used in the data transmission for its fast calculating speed, and the elliptic curve cryptography digital signature algorithm is used to confirm the data package that is from the right ID which can avoid the measured values and the control instructions to be maliciously modified by attacker. This solution for securing SCADA communication provides an efficient way to protect the data and protocol between the controllers and the remote terminal units (RTUs), and offers an authentication for the communication, which can avoid Man-In-The-Middle attack. Random numbers are used as a session key that can avoid the replay attack. cipher-block chaining mode message authentication code calculation is used to meet the data integrity requirement. Gong Needham Yahalom logic is used to prove the security of this solution, and an example is given to verify its validity.https://ieeexplore.ieee.org/document/8681037/SCADAcommunication securitykey schemetrusted-ID referenced schemeECCdigital signature |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Junlei Qian Changchun Hua Xinping Guan Tiefeng Xin Limin Zhang |
spellingShingle |
Junlei Qian Changchun Hua Xinping Guan Tiefeng Xin Limin Zhang A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants IEEE Access SCADA communication security key scheme trusted-ID referenced scheme ECC digital signature |
author_facet |
Junlei Qian Changchun Hua Xinping Guan Tiefeng Xin Limin Zhang |
author_sort |
Junlei Qian |
title |
A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants |
title_short |
A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants |
title_full |
A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants |
title_fullStr |
A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants |
title_full_unstemmed |
A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants |
title_sort |
trusted-id referenced key scheme for securing scada communication in iron and steel plants |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Supervisory control and data acquisition (SCADA) is a widely implemented structure to achieve remote measurement and control in many iron and steel plants. In traditional consideration, more attention on physical network separation methods is paid to isolate the SCADA system from management network to keep SCADA in a considered ”safe” state. In addition, lots of security solution providers are focusing on the network side security assurance without involving the SCADA communication level protection. This paper investigates a new trusted-ID referenced key scheme for securing SCADA communications efficiently. The advanced encryption standard algorithm is used in the data transmission for its fast calculating speed, and the elliptic curve cryptography digital signature algorithm is used to confirm the data package that is from the right ID which can avoid the measured values and the control instructions to be maliciously modified by attacker. This solution for securing SCADA communication provides an efficient way to protect the data and protocol between the controllers and the remote terminal units (RTUs), and offers an authentication for the communication, which can avoid Man-In-The-Middle attack. Random numbers are used as a session key that can avoid the replay attack. cipher-block chaining mode message authentication code calculation is used to meet the data integrity requirement. Gong Needham Yahalom logic is used to prove the security of this solution, and an example is given to verify its validity. |
topic |
SCADA communication security key scheme trusted-ID referenced scheme ECC digital signature |
url |
https://ieeexplore.ieee.org/document/8681037/ |
work_keys_str_mv |
AT junleiqian atrustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT changchunhua atrustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT xinpingguan atrustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT tiefengxin atrustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT liminzhang atrustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT junleiqian trustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT changchunhua trustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT xinpingguan trustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT tiefengxin trustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants AT liminzhang trustedidreferencedkeyschemeforsecuringscadacommunicationinironandsteelplants |
_version_ |
1724191425579450368 |