Cargando…

Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems

Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution to...

Descripción completa

Detalles Bibliográficos
Autores principales: Tidrea, Alexandra, Korodi, Adrian, Silea, Ioan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10006913/
https://www.ncbi.nlm.nih.gov/pubmed/36904888
http://dx.doi.org/10.3390/s23052686
_version_ 1784905388567560192
author Tidrea, Alexandra
Korodi, Adrian
Silea, Ioan
author_facet Tidrea, Alexandra
Korodi, Adrian
Silea, Ioan
author_sort Tidrea, Alexandra
collection PubMed
description Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard protocols need to be protected. Hence, this paper attempts to offer a solution for securing the legacy insecure communication protocols based on elliptic curve cryptography while fulfilling the time constraints of a real SCADA network. Elliptic curve cryptography is chosen to respond to the low memory resources available for the low level devices of a SCADA network (e.g., PLCs), and also because it can achieve the same level of security as other cryptographic algorithms using smaller sizes for the secure keys. Furthermore, the proposed security methods have the purpose of assuring that the data transmitted between entities of a SCADA and automation system are authentic and confidential. The experimental results showed good timing performance for the cryptographic operations executed on Industruino and MDUINO PLCs, demonstrating that our proposed concept is deployable for Modbus TCP communication in a real automation/SCADA network on existing devices from the industry.
format Online
Article
Text
id pubmed-10006913
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100069132023-03-12 Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems Tidrea, Alexandra Korodi, Adrian Silea, Ioan Sensors (Basel) Article Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard protocols need to be protected. Hence, this paper attempts to offer a solution for securing the legacy insecure communication protocols based on elliptic curve cryptography while fulfilling the time constraints of a real SCADA network. Elliptic curve cryptography is chosen to respond to the low memory resources available for the low level devices of a SCADA network (e.g., PLCs), and also because it can achieve the same level of security as other cryptographic algorithms using smaller sizes for the secure keys. Furthermore, the proposed security methods have the purpose of assuring that the data transmitted between entities of a SCADA and automation system are authentic and confidential. The experimental results showed good timing performance for the cryptographic operations executed on Industruino and MDUINO PLCs, demonstrating that our proposed concept is deployable for Modbus TCP communication in a real automation/SCADA network on existing devices from the industry. MDPI 2023-03-01 /pmc/articles/PMC10006913/ /pubmed/36904888 http://dx.doi.org/10.3390/s23052686 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tidrea, Alexandra
Korodi, Adrian
Silea, Ioan
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
title Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
title_full Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
title_fullStr Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
title_full_unstemmed Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
title_short Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
title_sort elliptic curve cryptography considerations for securing automation and scada systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10006913/
https://www.ncbi.nlm.nih.gov/pubmed/36904888
http://dx.doi.org/10.3390/s23052686
work_keys_str_mv AT tidreaalexandra ellipticcurvecryptographyconsiderationsforsecuringautomationandscadasystems
AT korodiadrian ellipticcurvecryptographyconsiderationsforsecuringautomationandscadasystems
AT sileaioan ellipticcurvecryptographyconsiderationsforsecuringautomationandscadasystems