Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information
Open Access
- 1 July 2015
- Vol. 7 (3), 1176-1210
- https://doi.org/10.3390/sym7031176
Abstract
Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.Keywords
This publication has 53 references indexed in Scilit:
- Secure SCADA communication by using a modified key management schemeISA Transactions, 2013
- Development of an automatic subsea blowout preventer stack control system using PLC based SCADAISA Transactions, 2012
- Secure Integration of Asymmetric and Symmetric Encryption SchemesJournal of Cryptology, 2011
- Proposal strategies of key management for data encryption in SCADA network of electric power systemsInternational Journal of Electrical Power & Energy Systems, 2011
- Challenges and Direction toward Secure Communication in the SCADA SystemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Attack taxonomies for the Modbus protocolsInternational Journal of Critical Infrastructure Protection, 2008
- Security Analysis of Multilayer SCADA ProtocolsPublished by Springer Science and Business Media LLC ,2007
- Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees2007 IEEE Power Engineering Society General Meeting, 2007
- Security issues in SCADA networksComputers & Security, 2006
- A failure to communicate: next generation communication requirements, technologies, and architecture for the electric power gridIEEE Power and Energy Magazine, 2005