Abstract
Several security mechanisms have been investigated and deployed that provide protection for real time platforms. Each security mechanism is contributed to enhance the SCADA system security, but at the same time, the mechanism is limited and depended on the other protocols for the purposes of message security, and its delivery. Few researches are conducted on security for SCADA broadcasting system, but these are limited to end-to-end designs and developments. The security developments for multicasting and broadcasting systems are much complicated, time consumed and/or overloaded with the cryptography mechanisms. After conducting the detail survey, a simulation environment for SCADA water pumping system is designed in-which number of nodes is configured and well known cryptography algorithms are selected, and deployed as an inclusive development for SCADA/DNP3 broadcasting system. The inclusive security development is considered with the best performance, and with predominant weakness in mind, which are present in SCADA/DNP3 broadcasting system. However, overall communication is initiated, monitored and controlled at main controller side with the user defined human machine interface (HMI).
| Original language | English |
|---|---|
| Pages (from-to) | 14641-14668 |
| Number of pages | 28 |
| Journal | Multimedia Tools and Applications |
| Volume | 75 |
| Issue number | 22 |
| DOIs | |
| State | Published - 2016.11.1 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
-
SDG 10 Reduced Inequalities
Keywords
- Cryptography dynamic buffer
- Cryptography mechanisms
- Distributed network protocol
- SCADA Broadcasting system
- Supervisory control and data acquisition
Quacquarelli Symonds(QS) Subject Topics
- Computer Science & Information Systems
- Engineering - Electrical & Electronic
Fingerprint
Dive into the research topics of 'The protocol design and New approach for SCADA security enhancement during sensors broadcasting system'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver