Skip to main content

SCADA System Security, Complexity, and Security Proof

  • Conference paper
Book cover Pervasive Computing and the Networked World (ICPCA/SWS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7719))

Abstract

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems were designed without security functionality. Nowadays, as a demand for connecting the SCADA system to the open network growths, the study of SCADA system security is an issue. A key-management scheme is critical for securing SCADA communications. Numerous key-management structures for SCADA also have been suggested. 11770-2 Mechanism 9 Key establishment Protocol has been used in SCADA communication however a security proof for the 11770-2 Mechanism 9 protocol is needed. The purpose of this paper is to provide a general overview about SCADA system, and its related security issues. Furthermore, we try to investigate the importance of key management protocol and the need of formal security poof.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ning, C., et al.: SCADA system security: Complexity, history and new developments. In: 6th IEEE International Conference on Industrial Informatics, INDIN 2008, pp. 569–574 (2008)

    Google Scholar 

  2. Gold, S.: The SCADA challenge: securing critical infrastructure. Network Security 2009, 18–20 (2009)

    Article  Google Scholar 

  3. Johnson, R.E.: Survey of SCADA security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1–5 (2010)

    Google Scholar 

  4. Donghyun, C., et al.: Efficient Secure Group Communications for SCADA. IEEE Transactions on Power Delivery 25, 714–722 (2010)

    Google Scholar 

  5. Rautmare, S.: SCADA system security: Challenges and recommendations. In: 2011 Annual IEEE India Conference (INDICON), pp. 1–4 (2011)

    Google Scholar 

  6. Stouffer, K., et al.: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. In: The National Institute of Standards and Technology, NIST (2006)

    Google Scholar 

  7. C. Office, The UK Cyber Security Strategy Protecting and promoting the UK in a digital world (2011)

    Google Scholar 

  8. Brewer, R.: Protecting critical control systems. Network Security 2012, 7–10 (2012)

    Article  Google Scholar 

  9. Igure, V.M., et al.: Security issues in SCADA networks. Computers & Security 25, 498–506 (2006)

    Article  Google Scholar 

  10. Goubault-Larrecq, J.: Towards Producing Formally Checkable Security Proofs, Automatically. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 224–238 (2008)

    Google Scholar 

  11. Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: Scada Malware, a Proof of Concept. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 211–222. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Bresciani, R., Butterfield, A.: A formal security proof for the ZRTP Protocol. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6 (2009)

    Google Scholar 

  13. ISO, Information technology — Security techniques — Key management, ISO/IEC (2008)

    Google Scholar 

  14. Stolbunov, A.: Reductionist Security Arguments for Public-KeyCryptographic Schemes Based on Group Action. Presented at the NISK (2009)

    Google Scholar 

  15. Koblitz, N.: Another Look of Provable Security. Journal of Cryptography 20, 37 (2007)

    MathSciNet  Google Scholar 

  16. Dawson, R.: Secure Scada Communication (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shbib, R., Zhou, S., Alkadhimi, K. (2013). SCADA System Security, Complexity, and Security Proof. In: Zu, Q., Hu, B., Elçi, A. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2012. Lecture Notes in Computer Science, vol 7719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37015-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37015-1_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37014-4

  • Online ISBN: 978-3-642-37015-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics