Skip to main content

Advertisement

Log in

A Novel Security Scheme for the Smart Grid and SCADA Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Finkle, J. (2012). US probes cyber attack on water system, http://www.reuters.com/article/2011/11/21/us-cybersecurity-attack-idUSTRE7AH2C320111121. May 24, 2012.

  2. McMillan, R. (2012). Was Stuxnet built to attack Iran’s nuclear program? http://www.pcworld.com/businesscenter/article/205827/was_stuxnet_built_to_attack_irans_nuclear_program.html. May 24, 2012.

  3. Espiner, T. (2012). CIA: Cyberattack caused multiple-city blackout, http://news.cnet.com/CIA-Cyberattack-caused-multiple-city-blackout/2100-7349_3-6227090.html. May 24, 2012.

  4. Sommestad, T., Ericsson, G. N., & Nordlander, J. (2010). SCADA system cyber security: A comparison of standards, IEEE power and energy society general meeting, 25–29 July 2010, pp. 1–8.

  5. Huang, H. D., Lee, C. S., Kao, H. Y., Tsai, Y. L., & Chang, J. G. (2011). Malware behavioral analysis system: TWMAN, IEEE symposium on intelligent agent (IA), 11–15, April 2011, pp. 1–8.

  6. Hong, Junho, Wu, Shinn-Shyan, Stefanov, A., Fshosha, A., Liu, Chen-Ching, Gladyshev, P., & Govindarasu, M. (2011). An intrusion and defense testbed in a cyber-power system environment, IEEE power and energy society general meeting, 24–29, July 2011, pp. 1–5.

  7. Davis, C. M., Tate, J. E., Okhravi, H., Grier, C., Overbye, T. J., & Nicol, D. (2006). SCADA cyber security testbed development. In 38th North American power symposium, NAPS 2006, (pp. 483–488). Sept 17–19, 2006.

  8. PowerWorld Corporation (2012). http://www.powerworld.com/DemoSoftware/Simdwnld.asp. May 24, 2012.

  9. Rinse (2012). http://download.cnet.com/Rinse/3000-2141_4-75453396.html. May 24, 2012.

  10. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2011). PASS: Privacy-preserving authentication scheme for smart grid network. In IEEE international conference on smart grid, communications (SmartGridComm), (pp. 196–201). Oct 17–20, 2011.

  11. Bringer, J., & Chabanne, H. (2012). Embedding edit distance to enable private keyword search. Human-Centric Computing and Information Sciences (HCIS 2012), 2(2), 1–12.

  12. Silas, S., Ezra, K., & Rajsingh, E. B. (2012). A novel fault tolerant service selection framework for pervasive computing. Human-centric computing and information sciences (HCIS 2012), 2(5), 1–5.

  13. Lim, D., Lee, J. W., Gassend, B., Suh, G. E., van Dijk, M., & Devadas, S. (2005). Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 13(10), 1200–1205.

    Article  Google Scholar 

  14. Liou, J.-C., & Bhashyam, S. (2010). A feasible and cost effective two-factor authentication for online transactions, 2nd international conference on software engineering and data mining (SEDM), (pp. 47–51). June 23–25, 2010.

  15. Hsu, P.-H., Tang, W., Tsai, C., & Cheng, B.-C. (2011). Two-layer security scheme for AMI system in Taiwan. Journal of Convergence, 2(1), 47–52.

    Google Scholar 

  16. Peters, M., & Rogaar, P. (2011). A review of ProVerif as an automatic security protocol verifier, http://www.yumpu.com/en/document/view/4074700/a-review-of-proverif-as-an-automatic-security-protocol-verifier. A review of ProVerif as an automatic security protocol verifier.pdf. Sept 13, 2011.

  17. Ling, A. P. A., & Masao, M. (2011). Selection of model in developing information security criteria on smart grid security system. Journal of Convergence, 2(1), 39–46.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hussam M. N. Al Hamadi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Al Hamadi, H.M.N., Yeun, C.Y. & Zemerly, M.J. A Novel Security Scheme for the Smart Grid and SCADA Networks. Wireless Pers Commun 73, 1547–1559 (2013). https://doi.org/10.1007/s11277-013-1265-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1265-y

Keywords

Navigation