Skip to main content

HST-101: A New Secure SCADA Transport Protocol

  • Conference paper
  • First Online:
Advances in Computing Systems and Applications (CSA 2020)

Abstract

Securing SCADA systems against cyber-attackers is one of the most important elements of critical infrastructure protection. It requires specific techniques different from those used by IT systems. This paper proposes a new approach to secure the IEC 60870-5-101 SCADA transmission protocols against external cyber-attacks targeting cooperate network segments, especially passive attacks and modification and fabrication attacks. Our approach is based on using a new real-time perfect secrecy crypt-system implementation to secure T-101 frames.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aghaee, S.: Random Stream Cipher. Ph.D. thesis, Växjö University, School of Mathematics and Systems Engineering (2007)

    Google Scholar 

  2. Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364–383 (1986). https://doi.org/10.1137/0215025

    Article  MathSciNet  MATH  Google Scholar 

  3. Cherifi, T.: Developpement d un protocole scada temps reel securise a base de l iec 60870-5-101. Ph.D thesis.Ecole Nationale Polytechnique d Alger (2019)

    Google Scholar 

  4. Cherifi, T., Hamami, L.: A practical implementation of unconditional security for THE IEC 60780–5-101 SCADA protocol. Int. J. Crit. Infrastruct. Prot. 20C, 68–84 (2018). https://doi.org/10.1016/j.ijcip.2017.12.001

    Article  Google Scholar 

  5. Clarke, G.R., Reynders, D., Wright, E.: Practical modern SCADA protocols: DNP3, 60870.5 and related systems. Newnes (2004)

    Google Scholar 

  6. Ferguson, N., Schneier, B.: Practical Cryptography, vol. 23. Wiley, New York (2003)

    MATH  Google Scholar 

  7. Kelsey, J., Schneier, B., Ferguson, N.: Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: International Workshop on Selected Areas in Cryptography, pp. 13–33. Springer (1999)

    Google Scholar 

  8. Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P., Jones, K.: A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 9, 52–80 (2015). https://doi.org/10.1016/j.ijcip.2015.02.002

    Article  Google Scholar 

  9. Kraft, M.B., Marks, E.: US Government Counterterrorism: A Guide to Who Does What. CRC Press, Boca Raton (2016)

    Google Scholar 

  10. Markoff, J.: Cyberwar: Old trick threatens the newest weapons, 26 October 2009

    Google Scholar 

  11. MIIT, P.: Guide to industrial control systems information security protection (2016)

    Google Scholar 

  12. Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436–454 (2017)

    Article  Google Scholar 

  13. Robinson, M., Jones, K., Janicke, H.: Cyber warfare: issues and challenges. Comput. Secur. 49, 70–94 (2015). https://doi.org/10.1016/j.cose.2014.11.007

    Article  Google Scholar 

  14. Sidorenko, A., Schoenmakers, B.: Concrete security of the Blum-Blum-Shub pseudorandom generator. In: IMA International Conference on Cryptography and Coding, pp. 355–375. Springer (2005)

    Google Scholar 

  15. Smaiah, S., Khellaf, A., Cherifi, T.: The implementation of SCADA open protocol IEC60870-5-101 on ARDUINO UNO board. In: 2015 4th International Conference on Electrical Engineering (ICEE), pp. 1–6. IEEE (2015). https://doi.org/10.1109/INTEE.2015.7416844

  16. Smaiah, S., Khellaf, A., Cherifi, T.: The implementation of SCADA open protocol PUR 2.4. In: 2015 First International Conference on New Technologies of Information and Communication (NTIC), pp. 1–6 (2015). https://doi.org/10.1109/NTIC.2015.7368746

  17. Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Special Publication 800(82), 16–16 (2011)

    Google Scholar 

  18. TC57, I.: Transmission protocol - section 101: Companion standard for basic telecontrol tasks (1995)

    Google Scholar 

  19. Zhou, X., Xu, Z., Wang, L., Chen, K.: What should we do? A structured review of SCADA system cyber security standards. In: 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT), pp. 0605–0614. IEEE (2017). https://doi.org/10.1109/CoDIT.2017.8102661

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarek Cherifi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cherifi, T., Challal, K., Cherifi, W. (2021). HST-101: A New Secure SCADA Transport Protocol. In: Senouci, M.R., Boudaren, M.E.Y., Sebbak, F., Mataoui, M. (eds) Advances in Computing Systems and Applications. CSA 2020. Lecture Notes in Networks and Systems, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-030-69418-0_21

Download citation

Publish with us

Policies and ethics