Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information

作者: Aamir Shahzad , Malrey Lee , Young-Keun Lee , Suntae Kim , Naixue Xiong

DOI: 10.3390/SYM7031176

关键词:

摘要: Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications various types running on modern IT infrastructure. How been taken into account which paradigms are necessary minimize issues while increasing efficiency, reducing influence transmissions, ensuring protocol independency achieving substantial performance? We have found cryptography be an absolute mechanism architectures, in this study, new design was developed with MODBUS protocol, is considered offer phenomenal performance future enhancement real This study also complete because tested almost all ways communication. The computed measurements evaluated validate overall development, results indicate improvement that differentiated from conventional methods.

参考文章(77)
Rodrigo Chandia, Jesus Gonzalez, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi, Security Strategies for SCADA Networks international conference on critical infrastructure protection. pp. 117- 131 ,(2007) , 10.1007/978-0-387-75462-8_9
Abdelmajid Khelil, Daniel Germanus, Neeraj Suri, Protection of SCADA communication channels Critical Infrastructure Protection. pp. 177- 196 ,(2012) , 10.1007/978-3-642-28920-0_9
Reda Shbib, Shikun Zhou, Khalil Alkadhimi, SCADA system security, complexity, and security proof international conference on pervasive computing. pp. 405- 410 ,(2012) , 10.1007/978-3-642-37015-1_35
Munir Majdalawieh, Francesco Parisi-Presicce, Duminda Wijesekera, DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework Springer, Dordrecht. pp. 227- 234 ,(2007) , 10.1007/1-4020-5261-8_36
Janica Edmonds, Mauricio Papa, Sujeet Shenoi, Security Analysis of Multilayer SCADA Protocols international conference on critical infrastructure protection. pp. 205- 221 ,(2007) , 10.1007/978-0-387-75462-8_15
CHERYL L BEAVER, DONALD R GALLUP, WILLIAM D NEUMANN, MARK D TORGERSON, Key Management for SCADA Other Information: PBD: 1 Mar 2002. ,(2002) , 10.2172/792866
Robert Dawson, Colin Boyd, Edward Dawson, Juan Gonzalez Nieto, SKMA: a key management architecture for SCADA systems grid computing. pp. 183- 192 ,(2006)
Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang, C. L. Philip Chen, SCADA communication and security issues Security and Communication Networks. ,vol. 7, pp. 175- 194 ,(2014) , 10.1002/SEC.698
Chen Yuan, Dong Qingkuan, RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions Security and Communication Networks. ,vol. 7, pp. 1219- 1231 ,(2014) , 10.1002/SEC.853
Tadeusz Pietraszek, Chris Vanden Berghe, Defending Against Injection Attacks Through Context-Sensitive String Evaluation Lecture Notes in Computer Science. pp. 124- 145 ,(2006) , 10.1007/11663812_7