Open Access Open Access  Restricted Access Subscription or Fee Access

IoT-Based SCADA Systems Security: Detecting and Preventing Cyber- Attacks on Power Systems

Dr. N. Rajeshkumar, D. Narmatha, R. Manjuladevi, A. Vinothini

Abstract


This Paper Presents a Scaled model For Supervisory Control and Data Acquisition (SCADA) communication network, which monitors and controls power distribution in Critical Infrastructure (CI). The existing power delivery system is vulnerable to both natural disasters and intentional attack. A successful terrorist attempt to disrupt the power delivery system could have adverse effects on national security, the economy, and the lives of every citizen. Secure and reliable operation of the electric system is fundamental to national and international economic systems, security, and quality of life. The Cyber Physical System (CPS)   can be considered as "smart industrial systems," with their most prevalent applications in smart transportation, smart grids, smart medical and e Healthcare systems, and many more. These industrial CPSs mostly utilize Supervisory Control and Data Acquisition (SCADA) systems to control and monitor their Critical Infrastructure (CI). For example, Web SCADA is an application used for smart medical technologies, making improved patient monitoring and more timely decisions possible. The focus of the study presented in this paper is to highlight the security challenges that industrial SCADA systems face in an IoT -cloud environment. The cyber attacks on smart meter are detected using data mapping analysis. We have tried to implement intrusion detection system to protect the database systems with the use of hash map. Hashing technique performs faster than other techniques and results in high performance and high efficiency in detecting the database attacks. Finally, the paper briefly describes future research direction to secure these critical CPSs and results   demonstrate that the proposed MDR approach helps in detecting and preventing the malicious nodes in the network effectively.


Keywords


Internet of Things (IoT), Cyber-Attacks, Hashing Technique, SCADA, Critical Infrastructure (CI).

Full Text:

PDF

References


. T. Lojka and I. Zolotová, "Improvement of Human-Plant Interactivity via Industrial Cloud-Based Supervisory Control and Data Acquisition System", IFIP

. “Smart Grid: How does it work and why do we need it”, Environmental and energy study institute, January 8, 2009.[Online]http://www.eesi.org/briefings/view/smart ridhowdoes-it-work-and-why-do-we-need-it?/smart-grid-how-does-itwork-and-why-do-we-need-it-08-jan-2009.

. V. Sridharan, “Cyber Security in Power Systems”, Thesis diss., Georgia Institute of Technology, May 2012.

. G.K. Chalamasetty, P. Mandal, and B. Tseng, “Cyber security model for power system based on game theory”, 5th Southwest Energy Science and Engineering Symposium, 2014.

. Dr. N. Rajesh Kumar, P. Mohanapriya, and M. Kalaiselvi, “Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet”, International Journal of Advanced Computer Research Vol. 4, No. 2, pp. 627, 2014.

. T.H. Kim, “SCADA architecture with mobile remote components”, WSEAS Transactions on Systems and Control Vol.5, No. 8, pp. 611-622, 2010.

. C. Alcaraz, J. Lopez, J. Zhou, and R. Roman, “Secure SCADA framework for the protection of energy control systems”, Concurrency and Computation: Practice and Experience, Vol.23, No. 12, pp. 1431-1442, 2011.

. J.D. Fernandez, and A. E. Fernandez, “SCADA systems: vulnerabilities and remediation”, Journal of Computing Sciences in Colleges, Vol. 20, No. 4, pp. 160-168, 2005.

. M. Wei, and Z. Chen, “Reliability analysis of cyber security in an electrical power system associated WAN”, In Proc. Power and Energy Society General Meeting, IEEE,

. I.N. Fovino, L. Guidi, M. Masera, and A. Stefanini, “Cyber security assessment of a power plant”, Electric Power Systems Research, Vol. 81, No. 2, pp.518-526, 2011.

. S. Rudrapattana, “Cyber-security analysis in smart grid SCADA systems: A game theoretic approach”, PhD diss., Texas Tech University, 2013.

. A. Flammini, P. Ferrari, D. Marioli, E. Sisinni, and A. Taroni, “Wired and wireless sensor networks for industrial applications”, Microelectronics Journal Vol. 40, No. 9, pp. 1322-1336, 2009.

. D. Helen, and D. Arivazhagan, “Applications, Advantages and Challenges of Ad Hoc Networks”, JAIR, Vol. 2, No. 8, pp. 453-7, 2014.

. A.M. Grilo, J.J. Chen, M. Diaz, D. Garrido, and A. Casaca, “An integrated WSAN and SCADA system for monitoring a critical infrastructure”, IEEE Transactions on Industrial Informatics, Vol. 10, No. 3, pp. 1755-1764, 2014.

. P. Goyal, S. Batra, and A. Singh, “A literature review of security attack in mobile ad-hoc networks”, International Journal of Computer Applications,

. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, In Advances in Cryptology—CRYPTO 2001, pp. 213-229. Springer Berlin Heidelberg, 2001.

. M. Abdelhaq, S. Serhan, R. Alsaqour, and A. Satria, “Security routing mechanism for black hole attack over AODV MANET routing protocol”, Australian Journal of Basic and Applied Sciences.

. D. De Judicibus, S. Leopardi, L. Modeo, and N. Pergola, “System for secured transactions over a wireless network”, U.S. Patent 8,583,499, issued November 12, 2013.

. S. Musa, A. Shahzad, and A. Aborujilah, “Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security”, In Proc. 7th International Conference on Ubiquitous Information Management and Communication, pp. 32. ACM, 2013.

. A. Shahzad, and S. Musa, “Cryptography and authentication placement to provide secure channel for SCADA communication”, International Journal of Security (IJS),


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.