Abstract
Securing SCADA systems against cyber-attackers is one of the most important elements of critical infrastructure protection. It requires specific techniques different from those used by IT systems. This paper proposes a new approach to secure the IEC 60870-5-101 SCADA transmission protocols against external cyber-attacks targeting cooperate network segments, especially passive attacks and modification and fabrication attacks. Our approach is based on using a new real-time perfect secrecy crypt-system implementation to secure T-101 frames.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aghaee, S.: Random Stream Cipher. Ph.D. thesis, Växjö University, School of Mathematics and Systems Engineering (2007)
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364–383 (1986). https://doi.org/10.1137/0215025
Cherifi, T.: Developpement d un protocole scada temps reel securise a base de l iec 60870-5-101. Ph.D thesis.Ecole Nationale Polytechnique d Alger (2019)
Cherifi, T., Hamami, L.: A practical implementation of unconditional security for THE IEC 60780–5-101 SCADA protocol. Int. J. Crit. Infrastruct. Prot. 20C, 68–84 (2018). https://doi.org/10.1016/j.ijcip.2017.12.001
Clarke, G.R., Reynders, D., Wright, E.: Practical modern SCADA protocols: DNP3, 60870.5 and related systems. Newnes (2004)
Ferguson, N., Schneier, B.: Practical Cryptography, vol. 23. Wiley, New York (2003)
Kelsey, J., Schneier, B., Ferguson, N.: Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: International Workshop on Selected Areas in Cryptography, pp. 13–33. Springer (1999)
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P., Jones, K.: A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 9, 52–80 (2015). https://doi.org/10.1016/j.ijcip.2015.02.002
Kraft, M.B., Marks, E.: US Government Counterterrorism: A Guide to Who Does What. CRC Press, Boca Raton (2016)
Markoff, J.: Cyberwar: Old trick threatens the newest weapons, 26 October 2009
MIIT, P.: Guide to industrial control systems information security protection (2016)
Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436–454 (2017)
Robinson, M., Jones, K., Janicke, H.: Cyber warfare: issues and challenges. Comput. Secur. 49, 70–94 (2015). https://doi.org/10.1016/j.cose.2014.11.007
Sidorenko, A., Schoenmakers, B.: Concrete security of the Blum-Blum-Shub pseudorandom generator. In: IMA International Conference on Cryptography and Coding, pp. 355–375. Springer (2005)
Smaiah, S., Khellaf, A., Cherifi, T.: The implementation of SCADA open protocol IEC60870-5-101 on ARDUINO UNO board. In: 2015 4th International Conference on Electrical Engineering (ICEE), pp. 1–6. IEEE (2015). https://doi.org/10.1109/INTEE.2015.7416844
Smaiah, S., Khellaf, A., Cherifi, T.: The implementation of SCADA open protocol PUR 2.4. In: 2015 First International Conference on New Technologies of Information and Communication (NTIC), pp. 1–6 (2015). https://doi.org/10.1109/NTIC.2015.7368746
Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Special Publication 800(82), 16–16 (2011)
TC57, I.: Transmission protocol - section 101: Companion standard for basic telecontrol tasks (1995)
Zhou, X., Xu, Z., Wang, L., Chen, K.: What should we do? A structured review of SCADA system cyber security standards. In: 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT), pp. 0605–0614. IEEE (2017). https://doi.org/10.1109/CoDIT.2017.8102661
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cherifi, T., Challal, K., Cherifi, W. (2021). HST-101: A New Secure SCADA Transport Protocol. In: Senouci, M.R., Boudaren, M.E.Y., Sebbak, F., Mataoui, M. (eds) Advances in Computing Systems and Applications. CSA 2020. Lecture Notes in Networks and Systems, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-030-69418-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-69418-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69417-3
Online ISBN: 978-3-030-69418-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)