Cargando…
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution to...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10006913/ https://www.ncbi.nlm.nih.gov/pubmed/36904888 http://dx.doi.org/10.3390/s23052686 |
_version_ | 1784905388567560192 |
---|---|
author | Tidrea, Alexandra Korodi, Adrian Silea, Ioan |
author_facet | Tidrea, Alexandra Korodi, Adrian Silea, Ioan |
author_sort | Tidrea, Alexandra |
collection | PubMed |
description | Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard protocols need to be protected. Hence, this paper attempts to offer a solution for securing the legacy insecure communication protocols based on elliptic curve cryptography while fulfilling the time constraints of a real SCADA network. Elliptic curve cryptography is chosen to respond to the low memory resources available for the low level devices of a SCADA network (e.g., PLCs), and also because it can achieve the same level of security as other cryptographic algorithms using smaller sizes for the secure keys. Furthermore, the proposed security methods have the purpose of assuring that the data transmitted between entities of a SCADA and automation system are authentic and confidential. The experimental results showed good timing performance for the cryptographic operations executed on Industruino and MDUINO PLCs, demonstrating that our proposed concept is deployable for Modbus TCP communication in a real automation/SCADA network on existing devices from the industry. |
format | Online Article Text |
id | pubmed-10006913 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100069132023-03-12 Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems Tidrea, Alexandra Korodi, Adrian Silea, Ioan Sensors (Basel) Article Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard protocols need to be protected. Hence, this paper attempts to offer a solution for securing the legacy insecure communication protocols based on elliptic curve cryptography while fulfilling the time constraints of a real SCADA network. Elliptic curve cryptography is chosen to respond to the low memory resources available for the low level devices of a SCADA network (e.g., PLCs), and also because it can achieve the same level of security as other cryptographic algorithms using smaller sizes for the secure keys. Furthermore, the proposed security methods have the purpose of assuring that the data transmitted between entities of a SCADA and automation system are authentic and confidential. The experimental results showed good timing performance for the cryptographic operations executed on Industruino and MDUINO PLCs, demonstrating that our proposed concept is deployable for Modbus TCP communication in a real automation/SCADA network on existing devices from the industry. MDPI 2023-03-01 /pmc/articles/PMC10006913/ /pubmed/36904888 http://dx.doi.org/10.3390/s23052686 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tidrea, Alexandra Korodi, Adrian Silea, Ioan Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems |
title | Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems |
title_full | Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems |
title_fullStr | Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems |
title_full_unstemmed | Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems |
title_short | Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems |
title_sort | elliptic curve cryptography considerations for securing automation and scada systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10006913/ https://www.ncbi.nlm.nih.gov/pubmed/36904888 http://dx.doi.org/10.3390/s23052686 |
work_keys_str_mv | AT tidreaalexandra ellipticcurvecryptographyconsiderationsforsecuringautomationandscadasystems AT korodiadrian ellipticcurvecryptographyconsiderationsforsecuringautomationandscadasystems AT sileaioan ellipticcurvecryptographyconsiderationsforsecuringautomationandscadasystems |