Random network coding for secure packet transmission in SCADA networks

Sajid Nazir, Mohammad Kaleem

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
206 Downloads (Pure)

Abstract

Industrial control systems were designed as closed systems without any consideration or need for Internet connectivity. This design choice resulted in most SCADA protocol implementations being plain text with little security against attackers. Information on SCADA systems and protocols is readily available in public domain, making them a target for malicious attacks. Network coding is a lightweight technique based on simple XOR operations for error correction that can also help secure the message. This paper proposes use of network coding for protection of message interchanges with the field devices in an industrial network. The results show that the proposed method effectively protects the communications against a malicious adversary.
Original languageEnglish
Title of host publication2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)
PublisherIEEE
Number of pages4
ISBN (Electronic)9781538682494
ISBN (Print)9781538682500
DOIs
Publication statusPublished - 18 Feb 2019
Event2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology - Karachi, Pakistan
Duration: 21 Dec 201822 Dec 2018

Conference

Conference2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology
Abbreviated titleICEEST 2018
Country/TerritoryPakistan
CityKarachi
Period21/12/1822/12/18

Keywords

  • security , industrial control systems , cyber-attack , SCADA , communication protocol
  • security
  • cyber-Attack
  • industrial control systems
  • communication protocol
  • SCADA

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Random network coding for secure packet transmission in SCADA networks'. Together they form a unique fingerprint.

Cite this