Font Size: a A A

Design And Implementation Of Cryptographic Protection For SCADA Communication

Posted on:2015-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2308330452455713Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
In recent years, the security of Supervisory Control and Data Acquisition (SCADA)system is becoming one of the hot topics in industry control area and information securityarea. SCADA systems are used in some industries which make a difference in nationaleconomy and national security, such as power, oil, gas, and water. The security of SCADAsystem plays a key role in the running of these industries. The communication link ofSCADA system goes across vast geographical scope, and it was designed without securityconsideration, so it’s vulnerable to various kinds of attacks. The attack can sniff messages,construct messages, modifying messages, replay messages, and destroy messages.Based on previous work, this paper puts forward a strategy used for protecting SCADAcommunication link. The factors which are considered in the design of the strategy containsecurity, latency, cost, and compatibility. This paper introduces SCADA CryptographicModule (SCM). The sending SCM encrypts the plain message, and generates the MessageAuthentication Code (MAC). The receiving SCM decrypts the cipher message, and verifiesthe MAC. The SCM can protect the confidentiality and integrity of messages in thecommunication link. The SCM will introduce relative low latency. The SCM is abump-in-the-wire (BITW) solution. It’s apparent to the host and the slave in the SCADAsystem. The SCM is suitable for Modbus communication protocol, and suitable for differentbaud rates.This paper uses Verilog to finish the Register Transfer Level (RTL) description, use ISEto finish the synthesis, and use Xilinx Spartan6to implement SCM. This paper finishes thefunction simulation and the performance test. What’s more, this paper builds a test platformto finish hardware test. The simulation result and the test result indicate that the SCM meetsthe design target.
Keywords/Search Tags:SCADA, SCM, High security, Low latency
PDF Full Text Request
Related items