SECURITY ANALYSIS AND COMPARISON OF SCADA SYSTEM USING ADVANCE CRYPTOGRAPHY APPROACHES
Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN APPLIED SCIENCE AND ENVIRONMENTAL ENGINEERING
Author(s): MUHAMMAD IRFAN , AAMIR SHAHZAD , KIM GEON , MALREY LEE
Abstract: The SCADA (Supervisory control and data acquisition) system cyber in-security has been increasing dayby- day, due to larger interconnectivity with other open networks (and protocols). Like traditional networks, SCADA system has been also facing several security challenges, which warming the communication, and become disaster for the industrial processing. Therefore, strong security solution is required that has potential to secure the communication of SCADA system, against cyber attacks and vulnerabilities. After conducting the detail review, cryptography based security approaches are chosen as best solutions against SCADA insecurity. This study analyzed, measured and made comparison between cryptography approaches, while deployments in various communications, followed by SCADA system acquirements. The security via cryptography has been implemented, and comparison is observed during SCADA abnormal transmission, with the specifications of SCADA system communication, in mind
- Publication Date: 12-Apr-2015
- DOI: 10.15224/978-1-63248-055-2-18
- Views: 0
- Downloads: 0
NEW MODELING APPROACH: TO ENHANCE THE NETWORKS PERFORMANCE BASED ON COMMUNICATION ISSUES AND RELATED SECURITY
Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN APPLIED SCIENCE AND ENVIRONMENTAL ENGINEERING
Author(s): MUHAMMAD IRFAN , AAMIR SHAHZAD , KIM GEON , MALREY LEE
Abstract: The new technology demands and rapid utilization of Information technology (IT) have been increasing day by day, in all over the world. The growing demands of advance Information technology (IT) infrastructures within several Industries and organizations, and the implementation of non-propriety protocols with propriety protocols , caused major performance issues in the terms of communication, data exchange and security. In this proposal, detail survey has been conducted that is based on several computer or/and Information technology (IT) networks deployment with their security requirements and issues. The proposed research thoroughly study the implementations related with communication networks included local area network (LAN) and wide area network (WAN) as part of traditional networks, mobile networks, real time networks and cloud computing networks. Also study the existing Implementations of common protocols that have been used during communication (network communication). This rese
- Publication Date: 12-Apr-2015
- DOI: 10.15224/978-1-63248-055-2-19
- Views: 0
- Downloads: 0