Cargando…

Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems

BACKGROUND: Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from...

Descripción completa

Detalles Bibliográficos
Autores principales: Riyadi, Eko Hadiyono, Putra, Agfianto Eko, Priyambodo, Tri Kuntoro
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8594588/
https://www.ncbi.nlm.nih.gov/pubmed/34825054
http://dx.doi.org/10.7717/peerj-cs.727
_version_ 1784600020668907520
author Riyadi, Eko Hadiyono
Putra, Agfianto Eko
Priyambodo, Tri Kuntoro
author_facet Riyadi, Eko Hadiyono
Putra, Agfianto Eko
Priyambodo, Tri Kuntoro
author_sort Riyadi, Eko Hadiyono
collection PubMed
description BACKGROUND: Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. METHODS: This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. RESULTS: Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = −0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity.
format Online
Article
Text
id pubmed-8594588
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-85945882021-11-24 Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems Riyadi, Eko Hadiyono Putra, Agfianto Eko Priyambodo, Tri Kuntoro PeerJ Comput Sci Algorithms and Analysis of Algorithms BACKGROUND: Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. METHODS: This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. RESULTS: Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = −0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity. PeerJ Inc. 2021-11-04 /pmc/articles/PMC8594588/ /pubmed/34825054 http://dx.doi.org/10.7717/peerj-cs.727 Text en ©2021 Riyadi et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Algorithms and Analysis of Algorithms
Riyadi, Eko Hadiyono
Putra, Agfianto Eko
Priyambodo, Tri Kuntoro
Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_full Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_fullStr Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_full_unstemmed Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_short Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_sort improvement of nuclear facilities dnp3 protocol data transmission security using super encryption brc4 in scada systems
topic Algorithms and Analysis of Algorithms
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8594588/
https://www.ncbi.nlm.nih.gov/pubmed/34825054
http://dx.doi.org/10.7717/peerj-cs.727
work_keys_str_mv AT riyadiekohadiyono improvementofnuclearfacilitiesdnp3protocoldatatransmissionsecurityusingsuperencryptionbrc4inscadasystems
AT putraagfiantoeko improvementofnuclearfacilitiesdnp3protocoldatatransmissionsecurityusingsuperencryptionbrc4inscadasystems
AT priyambodotrikuntoro improvementofnuclearfacilitiesdnp3protocoldatatransmissionsecurityusingsuperencryptionbrc4inscadasystems