Abstract
Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems were designed without security functionality. Nowadays, as a demand for connecting the SCADA system to the open network growths, the study of SCADA system security is an issue. A key-management scheme is critical for securing SCADA communications. Numerous key-management structures for SCADA also have been suggested. 11770-2 Mechanism 9 Key establishment Protocol has been used in SCADA communication however a security proof for the 11770-2 Mechanism 9 protocol is needed. The purpose of this paper is to provide a general overview about SCADA system, and its related security issues. Furthermore, we try to investigate the importance of key management protocol and the need of formal security poof.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ning, C., et al.: SCADA system security: Complexity, history and new developments. In: 6th IEEE International Conference on Industrial Informatics, INDIN 2008, pp. 569–574 (2008)
Gold, S.: The SCADA challenge: securing critical infrastructure. Network Security 2009, 18–20 (2009)
Johnson, R.E.: Survey of SCADA security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1–5 (2010)
Donghyun, C., et al.: Efficient Secure Group Communications for SCADA. IEEE Transactions on Power Delivery 25, 714–722 (2010)
Rautmare, S.: SCADA system security: Challenges and recommendations. In: 2011 Annual IEEE India Conference (INDICON), pp. 1–4 (2011)
Stouffer, K., et al.: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. In: The National Institute of Standards and Technology, NIST (2006)
C. Office, The UK Cyber Security Strategy Protecting and promoting the UK in a digital world (2011)
Brewer, R.: Protecting critical control systems. Network Security 2012, 7–10 (2012)
Igure, V.M., et al.: Security issues in SCADA networks. Computers & Security 25, 498–506 (2006)
Goubault-Larrecq, J.: Towards Producing Formally Checkable Security Proofs, Automatically. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 224–238 (2008)
Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: Scada Malware, a Proof of Concept. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 211–222. Springer, Heidelberg (2009)
Bresciani, R., Butterfield, A.: A formal security proof for the ZRTP Protocol. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6 (2009)
ISO, Information technology — Security techniques — Key management, ISO/IEC (2008)
Stolbunov, A.: Reductionist Security Arguments for Public-KeyCryptographic Schemes Based on Group Action. Presented at the NISK (2009)
Koblitz, N.: Another Look of Provable Security. Journal of Cryptography 20, 37 (2007)
Dawson, R.: Secure Scada Communication (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shbib, R., Zhou, S., Alkadhimi, K. (2013). SCADA System Security, Complexity, and Security Proof. In: Zu, Q., Hu, B., Elçi, A. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2012. Lecture Notes in Computer Science, vol 7719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37015-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-37015-1_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37014-4
Online ISBN: 978-3-642-37015-1
eBook Packages: Computer ScienceComputer Science (R0)