Security Analysis and Comparison of SCADA System Using Advance Cryptography Approaches

AAMIR, SHAHZAD and KIM, GEON and MALREY, LEE and MUHAMMAD, IRFAN (2015) Security Analysis and Comparison of SCADA System Using Advance Cryptography Approaches. In: Third International Conference on Advances in Applied Science and Environmental Engineering - ASEE 2015, 11-12 APRIL 2015, Kuala Lumpur, Malaysia.

20150414_080240.pdf - Published Version

Download (437kB) | Preview
Official URL:


The SCADA (Supervisory control and data acquisition) system cyber in-security has been increasing dayby- day, due to larger interconnectivity with other open networks (and protocols). Like traditional networks, SCADA system has been also facing several security challenges, which warming the communication, and become disaster for the industrial processing. Therefore, strong security solution is required that has potential to secure the communication of SCADA system, against cyber attacks and vulnerabilities. After conducting the detail review, cryptography based security approaches are chosen as best solutions against SCADA insecurity. This study analyzed, measured and made comparison between cryptography approaches, while deployments in various communications, followed by SCADA system acquirements. The security via cryptography has been implemented, and comparison is observed during SCADA abnormal transmission, with the specifications of SCADA system communication, in mind

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: SCADA System, DNP3 Stack, Cryptography Approaches, Security Attacks, Attacks and Tools
Depositing User: Mr. John Steve
Date Deposited: 07 May 2019 10:15
Last Modified: 07 May 2019 10:15

Actions (login required)

View Item View Item