Next Article in Journal
Research on a Lamb Wave and Particle Filter-Based On-Line Crack Propagation Prognosis Method
Next Article in Special Issue
Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility
Previous Article in Journal
Signal-Conditioning Block of a 1 × 200 CMOS Detector Array for a Terahertz Real-Time Imaging System
Previous Article in Special Issue
Joint Prior Learning for Visual Sensor Network Noisy Image Super-Resolution
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

1
Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea
2
School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China
3
Department of Business and Computer Science, Southwestern Oklahoma State University, Oklahoma, OK 73096, USA
4
Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea
5
Department of Orthopedic Surgery, Chonbuk National University Hospital, Jeonju 561-756, Korea
6
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Korea
7
Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia
8
Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Sensors 2016, 16(3), 322; https://doi.org/10.3390/s16030322
Submission received: 10 December 2015 / Revised: 22 January 2016 / Accepted: 25 January 2016 / Published: 3 March 2016
(This article belongs to the Special Issue Mobile Sensor Computing: Theory and Applications)

Abstract

:
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

1. Introduction

In the last two decades, a number of enhancements have been made in industrial sectors such as Water, Oil, Gas, and Electric. The communication methods have been changed from standalone systems to network based systems; furthermore, to fulfill the current communication demands of industries, there is also a requirement to connect the industrial remote (geographical) located stations to one or more centralized station. To connect several remote located stations, the best, most efficient and cost effective way is to use the wireless technologies (i.e., cellular, satellite, and others). Through the deployment of wireless technology, the industrial systems or the SCADA systems are able to access, monitor, and control their remotely located networked stations from a control center in minimal time; the wireless technology also overcomes the costs required with wired technology [1,2].
Human machine interface (HMI) is part of the SCADA system that provides interaction between supervisory control and data acquisition (SCADA) operators and devices. SCADA/HMIs are highly designed graphics-based interfaces in which a SCADA monitor and controlling systems are visualized; SCADA system operators use the HMI to manage the overall network structure and communication is usually displayed in the form of text (or text stream) and graphic symbols. SCADA systems are highly distributed network systems in which a number of field devices are located graphically and controlled for the main center; multimedia audio/video contents are employed at a remote location, embedded with processes, and monitored from the control center in case there is no operator available at that site [3,4]. Typically, SCADA field devices are designed for low bandwidth transmission over serial channels and the SCADA communication links and employed protocols are also limited for low bandwidth access, and are inadequate to accomplish the requirements of advance multimedia components such as audio/video. Thus, the SCADA system components need to be integrated with advanced communication networks to enable the employment or integration of advanced multimedia applications into the SCADA systems [1,4,5,6,7].
With the arrival of new technology, SCADA systems are also connected to numbers of advanced networks such as LAN/WAN and cellular networks; significant changes have also been observed in SCADA protocol designs and network supported specifications, which are connected to the internet for faster multimedia information delivery via non-proprietary transport control protocol (TCP). This means that the SCADA messages are constructed then passed to lower layered protocols (e.g., TCP/IP and UDP), which are usually designed to manage and meet the needs of a high bandwidth corresponding to the transmission of SCADA multimedia applications [1,8,9,10,11]. For example, the delivery time of SCADA messaging may typically be in the range of 10 ms to 100 ms, while the reliable and sequential delivery of messages (or packets) is also an important factor in the SCADA system. If we transmit the packets using SCADA serial protocols (e.g., DNP3 protocol and Modbus protocol) over Ethernet LAN using 100 Mbps transmission link, then a SCADA message (or multimedia message) can be sent in less than or within the range of 10 ms. However, converters and/or gateways such as 5201-DFNT-DNPM, Moxa NPort 6110, VLINX MODBUS, and PLX31-MBTCP-MBS are used during the transmitting of a message from SCADA serial protocols to TCP/IP protocols and vice versa. Nowadays, SCADA predominated protocols such as the DNP3 protocol and Modbus protocol are also available in TCP/IP versions as the DNP3 TCP/IP protocol and Modbus TCP/IP protocol, respectively; the frames are constructed according to protocol specifications and directly encapsulated into TCP/IP packets to ensure reliable transmission over LAN/WAN [1,11,12,13]. Moreover, the network architecture of the SCADA system is illustrated in Figure 1.
In SCADA system, DNP3 protocol has been considered as an major protocol due to its functionalities and reliable communication over the physical channels, but at the same time it has several security issues while travelling over the open networks and/or Internet [11,13]. As a consequence, the proposed study focuses on the DNP3 pseudo-transport layer security issues that most often occur during the transmission of fragments and a corresponding security mechanism or hashing function is deployed as a strong security wall that provides protection against adversaries (i.e., integrity attacks); however, this development is also able to test the other cryptography algorithms according to security demands. In addition, attack scenarios are defined in which attackers gain access to the fragments, user defined attacks are launched by employing various built-in tools for performance evaluation purposes, formal proofs are employed for validation purposes, and approximate communication is visualized as part of the multimedia technology.
The remainder of this research paper is organized as follows. Section 2 reviews the related works of study. Simulation Design and Environment is explained in Section 3, Section 4 describes the Pseudo-Transport layer message structure, Section 5 describes the Payload Design and Security Development, and Section 6 explains the Algorithm. In Section 7, Attacking Scenarios are defined, while the Setup and Abnormal Communication, as well as Measurement and Discussion are explained in Section 8 and Section 9. Multimedia Contexts are highlighted in Section 10. The significance of the study is discussed in Section 11 and Section 12 provides the conclusion and suggestions for future research.

2. Related Work

SCADA system security issues [14,15,16,17,18,19] have been considered as the most prominent and important counter measures of communication [11,12,13]. Therefore, an evaluated potential method is proposed that would be significant to fight against SCADA security challenges; however, security enhancement is limited to specified goals (or security goals). Typically, SCADA system networks and their components are distributed in various locations including in one specific place, in many cities in a country, and around the world. To connect the several networks points, SCADA has been employed in various wired/wireless communication media and the transmission can be accessed over modern technology platforms such as cellular phones using 2G, 3G, 4G, and general packet radio service (GPRS) [20,21,22]. However, overall SCADA communication is carried out by non-proprietary protocols which are ranked above the SCADA proprietary protocols [11,12,13,14].
The larger SCADA system defines the communication structure between the master terminal unit (MTU) and the remote terminal unit (RTU) or/and RTU and MTU. Each station is identified as a master or client/slave station in the SCADA network. However, in a SCADA hierarchical structure, some field devices perform the function of master and slave together. Two terms are defined within the data link layer such as balanced and unbalanced communication. In the application layer, the application protocol control information (APCI) defines data/message that is requested/responded; and response header differs by two additional bytes designated as internal indications (IIN). In the case of an unsolicited response, message is received from the terminal station to the master station and the master station responds to the terminal station. Therefore, different forms of header are added during message construction in the application layer, while the data link layer link protocol data unit (LPDU) bytes remain unchanged in either the message sent from the master station or the terminal station [20,21]. In an unbalanced system, only the master station is able to send the request and will respond according to the request slave station. This means that the master station works as a primary station and other stations work as terminals in an unbalanced system. Whenever the master station sends a request, the substation will then be able to send a response to the master station. However, in a balanced system, each station in the SCADA hierarchical structure acts as a master or slave at the same time. To distinguish between the master and the outstation in the balance system, a direction bit or DIR is set within the message from the master station to the terminal station or from one station to another station. Therefore, any station can initialize or send a request to other stations in the SCADA network. As part of the link layer, a cyclic redundancy check (CRC) is employed which performs the function of detecting errors in the transmission, while the detection mechanism is limited for information authentication and authorization [20,21]. Figure 2 illustrates the DNP3 protocol model and data link layer design [20].
Taxonomy of DNP3 protocol attacks is developed, in which attacks are categorized into three main groups: (i) DNP3 specifications attacks; (ii) DNP3 vendor based attacks; and (iii) DNP3 underlying infrastructure attacks [13]. The DNP3 specifications attacks are more prominent and harmful among the other attack groups; The SCADA system is targeted, which then suffers, and in this case, transmission is carried out by the DNP3 protocol [12,13]. The initial DNP3 protocol was designed without considering security; on the other hand, the DNP3 protocol resides in non-proprietary protocols (i.e., TCP and UDP) for the purpose of information delivery on the internet [12,13,18]. As analyzed, three issues of interception, interruption, and modification always interact with the SCADA system and/or its component paths, including the main controller, outstation (or sub-controller), and communication network [11,12,13]. Typically, the DNP3 protocol design does not deploy the potential security mechanisms such as authentication, encryption, and authorization. Due to security limitations, outside attackers can easily interrupt the DNP3 transmission, or directly target the DNP3 layers including the application layer, the pseudo-transport layer, and the data link layer; and the configured DNP3 nodes are also not able to analyze that the incoming message, and its contents are valid, or have not been changed during transmission [11,13,14]. The attack taxonomies for the DNP3 pseudo-transport layer and data link layer are depicted in Table 1 and Table 2 [13].
DNP3 protocol layers such as the application layer and link layers are considered more vulnerable to security threats than the pseudo-transport layer. This is because the pseudo-transport layer provides fewer functionalities than the other layers of the DNP3 protocol; therefore, a limited number of attacks are linked with the pseudo-transport layer [11,13,23,24,25]. However, two potential attacks account for the pseudo-transport layer: first frame (FIR) and final frame (FIN) flags interruption and sequence number modification [11,12,13]. In the DNP3 original design, there is no defined mechanism that detects abnormal entities in the transmission; therefore, DNP3 devices (or nodes) are unaware in cases where unauthorized entities are successful in transmission by attacks such as interruption, modification, and fake reply [11,12,13,16,17,18,19,20,21,22,23,24,25]. However, the major explained pseudo-transport layer attacks fall under the category of integrity attacks and should be resolved by employing cryptography based integrity functions.
In [26,27,28,29], cryptography based end-to-end security mechanisms are used for SCADA systems, and various cryptography algorithms such as symmetric (i.e., AES and DES), asymmetric (i.e., RSA, Diffie-Hellman, and DSS), and hashing (i.e., MD5 and SHA2) algorithms are deployed to secure the SCADA communication from networks adversaries such as message sniffers, man-in-the-middle attackers, eavesdroppers and password crackers, data interruption, and modification attackers, and others. As a consequence, cryptography based developments are considered more reliable and secure developments for SCADA systems [11,25,26,30,31,32,33,34,35,36,37,38,39,40]. In symmetric encryption, while the desired message is encrypted, this does not ensure that the message contents are not modified during transmission because a single secret can be shared between the sender and the receiver. Therefore, public key encryptions are considered to be better approaches than symmetric encryptions; in addition, a non-repudiation security service should be achieved while employing the public key encryption with hashing function, or by employing the digital signature technique [11,25]. In [25], an end-to-end security solution was implemented in the transmission of the SCADA system. The SCADA nodes such as the master terminal unit (MTU) and the remote terminal unit (RTU) were installed with DNP3 protocol, and were configured in the SCADA testbed setup. In the testbed, communication is initiated from the MTU and the desired message is treated with a hash algorithm and public key encryption before transmitting to the destination. The message hash digest is computed by employing a hashing function and the computed hash value is then encrypted with a private key for the received message (or RTU). The message does not encrypt itself, and this minimizes the computation time of the encryption process. At the RTU side, the MTU public and RTU private keys are deployed and the MTU/RTU hash values are compared to verify the message contents. In the testbed, each node is installed with a snort tool that monitors the traffic and a snort analyzer is used to detect the intrusions and generate corresponding alerts during communication between the MTU and RTU and vice versa [11,25,37,40].

3. Simulation Design and Environment

To measure the desired goals of current study, a simulation environment is designed for water pumping system as a part of wireless SCADA system. In wireless SCADA system, the field devices’ (or field sensors) are configured and directly connected with the sub-controllers, which are designated to carry the real time information from the sensors, or to monitor the real time information, as required by the main controller. The main controller is superior in the whole system design and network setup and is authorized to send the commands to the field sensors through the sub-controller(s). In water pumping system, as shown in Figure 3, only its two functional parts are considered: pumping for the cooler and pumping for the heater, the heating/cooling points are measured in-accordance to the normal set points that added at the time of configuration; and alarms are generated in-case the abnormal points or critical points will be measured from the field sensors. In wireless SCADA systems, each network node, such as sub-controller and main controller, is installed and configured using of DNP3 protocol as a part of SCADA system. Each time communication has occurrs between the nodes, the message is generated by deploying of DNP3 specified message structure and transmitted between the networked nodes, through employment of WAP (Wireless Application Protocol), the SCADA/DNP3 system would able to made the connection and to communicate wirelessly, to its remote located terminals (or remote field devices). In conclusion, the proposed study uses the SCADA/DNP3 protocol for messaging, the TCP/IP protocols to communicate over the Internet, and WAP for wireless communication; and moreover to secure the communication of wireless SCADA system, the cryptography hashing algorithm is deployed and tested at the pseudo-transport layer of SCADA/DNP3 protocol. The details for: message design, security design, security implementation, and security testing, are described in the below sections, of this study.

4. DNP3 Pseudo-Transport Layer

The pseudo-transport layer is the second layer of DNP3 after the application layer. The pseudo-transport layer takes the application protocol data units (APDUs) from the application layer of the DNP3 protocol and the upper layer bytes are treated as a transport service data unit (TSDU) or user bytes in the lower layer (or in the pseudo-transport layer). The main function performed by the transport layer is the disassembling and reassembling of bytes. The disassembling and reassembling processes allow a larger block of user data from the application layer to be handled easily by a data link layer [20]. In this research, transport protocol data units (TPDUs) are constructed as part of the DNP3 transport layer. Subsequently, control should be passed to the security development process where the hash function is applied using the SHA-2 hashing algorithm, as part of the cryptography mechanism.

Message Structure

The pseudo-transport layer breaks the TSDU into a number of units called transport protocol data unit (TPDUs) and each TPDU is made up of 250 bytes including 1 header byte. In Figure 4, 249 bytes are added with 1 byte of transport header (TH) information; this TH was originally named transport protocol control information (TPCI). In the case where a complete payload (or 2048 bytes information) has been received from the upper layer, the APDUs are then generated according to the payload size. In Figure 5, a total of eight TPDUs are generated and the remaining 56 bytes of the Application Protocol Data Unit (APDU) or 32 bytes of the cyclic redundancy check (CRC) from Link Protocol Data Unit (LPDU) would be employed for especial purposes. The size of each TPDU is fixed to 250 bytes because TPDU block could easily fit within a frame of the data link layer. This study made an alignment of the APDU which could be easily assembled within one segment (or TPDU) of the pseudo-transport layer.
The transport header is composed of three fields: FIR, FIN, and sequence number. Each TPDU is 250 bytes in length, which easily fits into the data link layer frame, called FT3. In Figure 6, the TH contains one byte of information and each bit has a specific function. The last two bits define the start and end of the TPDU sequence and the remaining six bits define the sequence counter.

5. Payload Design and Security Development Using Hashing

Similar to other SCADA protocols, the initial design of the DNP3 protocol was also limited in terms of security, or the security design was associated with the physical parts of the system [11,12,13,14]. To fulfill the requirements of industrial processes and automations, SCADA systems are connected to almost all modern networks [20,21,22]. To minimize the security falls that have been associated with communication of the SCADA system, several studies [25,26,27,28,29,30,31,32] have been conducted that provide node-to-node security protection against various vulnerabilities [12,13,14,41,42,43].The DNP3 application layer and data link layer security have been analyzed and various cryptography techniques have been suggested to enhance the security of these layers, but are still under development [11,22,23]. As a consequence [12,13,22,23], security issues have seldom been considered for the pseudo-transport layer. The current research therefore emphasizes the pseudo-transport layer security issues and deploys a cryptography mechanism as the best approach to significantly enhance the security of this layer.
While the security development at the pseudo-transport layer is simple and straightforward, fulfilling the requirements of the pseudo-transport layer design, or its functional specifications, is more complex. However, we employed the C# tool to design and construct the transport layer bytes and employed the security development process using the SHA-2 hashing function. The entire development is also validated through proofs and evaluated through computed results.
This section is divided into three Sub-Sections: Section 5.1 Payload Design and Computation; Section 5.2 Security implementation; and Section 5.3 Proof of development. In Section 5.1, the transport layer payload is computed, and further described in Section 5.2 for the purposes of security computation. Section 5.3 demonstrates the proof of development from Section 5.1 and Section 5.2.

5.1. Payload Design and Computation

In the DNP3 stack, the pseudo-transport layer takes the APDU as the user bytes from the application layer, and assembles the upcoming bytes into TSDU (bytes). In the reassembling process, the transport layer receives each TPDU (bytes) from the data link layer, and the TH is then stripped off and the TSDU bytes are recreated (or reformed) from the tripping process of TPCI. The pseudo-transport layer is also responsible for ensuring the sequence of TPDUs during the TSDU reassembling process. Due to the disassembling/reassembling process of the pseudo-transport layer, the data link layer is able to handle the bulk of the data, but the functionality is finite in the transport layer of the open systems interconnection (OSI) model (as illustrated in Figure 7) [20].
The DNP3 protocol is a proprietary protocol and its design is limited for advanced IP based client/server applications; therefore, TCP/IP protocols are employed instead of the DNP3 physical layer, to communicate over networks such as LAN/WAN and over the internet. Figure 8 shows the pseudo-transport layer interrelation and flow of communication.
As described above, the overall development has been made in the C# platform and in a few available implicit code libraries. Examples are employed as references [44], with user defined codes to validate the approximate and best development, according to the best of our knowledge. The following definitions demonstrated the pseudo-transport layer payload design, and its operations.
Definition 1 (Bytes Assembling): 
The number of user bytes “B” is received by the interaction of variable “Q” and “ f Q ” is an explicit dual non-linear function which assembles the upper layer bytes “ B A P D U ” with the lower layer bytes “ B T S D U ” and vice versa by the interaction of “Q”. However, since “B” is limited, an integer “ * ” (i.e., not negative integer) exists if “B” defines the limit as l i m k , such that,
B A P D U B T S D U f Q :   B A P D U B T S D U
Definition 2 (Bytes Dissembling): 
Assume b B , where “b” refers to the fixed/non-fixed number of user bytes during the disassembling process of “ B T S D U ”. In the case where i = 0 or i 0 is manipulated, then b B , such that,
B T S D U  
B ( b , k ) l i m k b i ( , n ) ,   i = 0 , 1 , 2 , 3 ,   ,   n 1 ,   n , b B l i m
Definition 3 (Payload): 
α ” is a variable that counts the number of bytes “b”, and the explicit user function “ f α ” is employed to manipulate the transport layer (TL) user bytes Q b ( lim , ) T L corresponding to the disassembling process, with header (h) functional bytes Q h , h T L , where Q ( h , b ) T L lim .

5.2. Bytes Alignment and Security Computational Bytes

During the payload design and computation, a keyword “limit” (lim) is defined, the purpose of which is twofold: (1) limit the number of bytes in each TSDU; and (2) limit the number of bytes in each TPDU. However, the size of TSDU is directly proportional to the size of APDU, but the size of each TPDU is limited to 249 bytes, plus 1 byte of header [20,21]. In this study, we limited the upper bytes (or APDU) size to 1992 bytes in both cases: request and response payload. This would further align with the TPDUs. For example, if we define the size of APDU as 1992 bytes, then eight equal TPDUs are created, as an addition to the transport protocol control information (APCI). This would also significantly protect information from non-legitimate users; fixed sized data is transmitted rather than variable size data.
For the alignment process of APDU and the fixing of TPDUs, the remaining 56 bytes are employed to keep track of security development and to protect sensitive information from unauthorized users. Hence, all remaining 56 bytes are not employed in this development, but are utilized and considered for other parts of the DNP3 protocol security enhancement purposes [37]. Some functions are deployed by employing the bytes from the total of 56 bytes, while the remaining functions are padded with zeros to be un-padded later for future developments. The functions details are as follows.
  • Payload Counter (Two Bytes): Payload (or TPDU) is created, and 250 bytes are counted in the payload counter. In the case where minimal bytes are defined, the remaining bytes are padded to protect the payload from data modification and reply attacks.
  • Hash Sequence Counter (One Byte): In the case where the number of TPDUs is defined by a single TSDU, the hashing sequence is counted in the range of 0–63, and should be recycled as 63–0 on the remote side. Two bits are used that designate the first and last hashing sequence in the defined range.
  • Security Method (One Byte): In the proposed study, SHA-2 hashing is deployed to protect the sensitive information of the transport layer against integrity attacks. However, this development is also able to test other algorithms such as secret key and public key algorithms. In this case, if multiple algorithms have been deployed, the dynamic selection is made by this functional field.
  • Padding Counter (Two Bytes): Initially, two bytes are defined that accumulate the number of padding bytes in the entire development. The size would be changed as required by this functional field by allocating bytes from dynamic storage (DS).
  • Acknowledge No (Two Bytes): Acknowledge flags are set at both sides of the communication. Therefore, acknowledgement is required at both sides followed by the acknowledgement number.
  • Useful Contents (One Byte): Typically, the payload contents are verified corresponding to the content list before being transmitted to the networks (or remote site).
  • Dynamic Storage (10–46 Bytes): Bytes are dynamically allocated to other fields, if required; or these bytes are reserved for future development.

5.3. Security Implementation

In the DNP3 protocol, the pseudo-transport layer performs a limited functionality of the transport layer and data link layer of the OSI model. As described, the functionality is fairly limited; therefore, the vulnerabilities are also limited, or a limited number of attacks are linked with the pseudo-transport layer [12,13]. In [13,18], three commonly potential attacks including Interruption, Modification, and Fabrication, with 32 instances, are counted against the pseudo-transport layer in terms of security, two of which are directly linked with the TPDU flags and their sequence in the DNP3 transmission. However, data modification, fake messaging, and byte interruption are considered as part of the current research. The SHA-2 hashing algorithm is deployed, and is considered in order to enhance the security of the pseudo-transport layer as part of the DNP3 protocol; this development is also able to test the other security algorithms [11,25].
In security implementation, the remote terminal station (RTU) is responsible for generating and sending responses according to the main controller request. The proposed work is based on a simulated environment and the scope is limited to pseudo-transport layer security; therefore, we do not give a detailed explanation of the phenomenon of the client/server architecture. The following steps are followed to deploy the SHA-2 algorithm, and to enhance the security of the pseudo-transport layer, while Table 3 summarizes the notations that are employed in the development.
  • Q h , h T L , Q b ( lim , ) T L Q ( h , b ) T L is the transport layer payload that is being manipulated by security function H d i g e s t ( s , Q ) T L using SHA-2 algorithm. The maximum size of each Q ( h , b ) T L is 250 bytes, if a number of Q ( h , b ) T L are created then the hash sequence is counted to keep the track of each Q ( h , b ) T L . The original payload S e n d e r ( s ) :   Q ( s , h , b ) T L and computed security function H a s h ( H ) :   H d i g e s t ( s , Q ) T L are transmitted, while the parameter, which designates the sender information, is added.
  • Upon receiving at the other side, the receive hash digest H d i g e s t ( R , Q ) T L is computed based on the original payload S e n d e r ( s ) :   Q ( s , h , b ) T L and compared with H d i g e s t ( s , Q ) T L . As a consequence, if H d i g e s t ( R , Q ) T L = H d i g e s t ( s , Q ) T L then the payload would be accepted; otherwise, it is rejected in the case of H d i g e s t ( R , Q ) T L H d i g e s t ( s , Q ) T L .
In security development (or in Figure 9), the number of integrity attacks such as data modification, data detection, and data reply could be verified in the transmission and this would also be concluded in the security (or lack of security) of the pseudo-transport layer. More detail is described in Algorithm 1, in Section 6.

6. Algorithm: Pseudo Code Transport Layer Message Construction with Security Design

  Algorithm 1: Transport Layer Security.
  Input: The input of Upper Layer Bytes.
  Output: Transport protocol data unit (TPDU), Hash digest.
  
  • The input of “n” bytes is received from upper layer. In pseudo-transport layer, these bytes are assembled as transport service data unit (TSDU) .Hence, the bytes are limited are upper layer therefore, we defined TSDU corresponding to APDU.

  TranLayer Header TH = 1 byte, TranLayerUserdate UD = 249 byte, TranLayer TPDU = 250 byte;
  Bytes TSDU [ ] = [ ]; Bytes H [ ] = [ ]; Bytes UD [ ] = [ ]; Bytes TPDU [ ] = [ ];
  
2.
TranTPDU ( )
{ Bytes TPDU [ ] = [H [ ] = [ ], UD [ ] = [ ]]; Bytes H [ ] = [Sequence No., FIR, FIN];
}

3.
TranTSDU ( )
{ Bytes TSDU [ ] = [TPDU1 [ ], TPDU2 [ ], TPDU2 [ ] ,………. , TPDUn [ ] ];
Where n = 1,2,3,……….., n and maximum size of each TSDU is equal to APDU size.
If TSDU [ ] = APDU [ ]
Print (“Process transport layer Information”);
else if TSDU [ ] = APCI [ ]
 Print (“Process transport layer Information corresponding to application header or APCI ”);
 Else Print (Unknown Communication);

4.
Cryptography ( )
{ RequestMessage M, j, Hash Digest HD ;
Hash ( ) //Sender function
{ Total Payload = Hash(M)
i = TPDU 0 + TPDU 1 + TPDU 2 + + TPDU n 1 + TPDU n ) , i = 1, 2, 3 ….limit. Here, i = TPDU 0 is defined, if only header bytes are manipulated and limit shows the maximum value, or maximum value of “n”.
Bytes M[ ] = [ ];
For ( i = TPDU 1 ; i <= TPDU n ; i++);
Print (“Add in to Hashing Buffer” +M[ ]);
     Sender : Hashing SHA 2 [ ( TPDU ) i ] = ( TPDU ) i __ Digest

5.
Hash ( ) //Receiver function
{ Total Payload = Hash(M)
Bytes M[ ] =[ ];
For ( i = TPDU n ; i <= TPDU 1 ; i--); Print (“Add in to Hashing Buffer” +M[ ]);
     Receiver : Hashing SHA 2 [ ( TPDU ) i ] = ( TPDU ) i __ Digest
Comparison: Receiver : ( TPDU ) i __ Digest = Sender : ( TPDU ) i _ _ Digest

6.
Conclusion: At sender side, hash function is deployed on TPDU and computed and compared at remote side (or at receiver side) to verify the integrity of payload (or APDU).

7. Attacking Scenarios

In the pseudo-transport layer header or transport protocol control information (TPCI), one byte is designed to represent the header information, six bits define the sequence number counter, and the remaining two bits are employed to designate the FIR and FIN frames of APDU (or fragment) [13,20]. In the transmission, the number of frames of a payload are sent and counted in sequence, where the FIR and FIN terms define the special meaning in the processing of the payload. In the case where the payload is transmitted with the FIR indication flag set, all the existing fragments (or partially-completed fragments) are then wasted, and are no longer considered. In some scenarios, the sensitive information of the pseudo-transport layer is interrupted.
  • In the reassembling process, the original payloads are disrupted; if a newer payload enters with the FIR flag set, the fragmented payload transmission subsequently starts.
  • The numbers of payload are transmitted and counted in the sequence counter while the sequence should be recycled at the remote side. An interruption is created during the manipulation of the incomplete (or partially completed) payload if the new payload is entered with the FIN indication flag set; as a consequence, the assembling process is closed, as it is untimely.
  • The APCI information is sensitive, and needs to be protected from unauthorized entities. The adversary has many chances to delete the payload information during transmission. The attacker uses sensitive information by using various capturing tools [11] and deletes/modifies the flags set such as FIR and FIN, and at the remote side, the receiver assumes that the payload originates from a secure source.
  • In APCI, 6 bits are occupied by a sequence number (field) which ensures the transmission of a fragmented payload (APDU) in a sequence order. Each time, the fragment is created and transmitted, and the corresponding number is added to the sequence counter; thus, the transmitted and transmitting fragmented payloads are recorded with a unique sequence number. However, an attacker could have many chances to change the fragment sequence, monitor the traffic, and capture the fragments. Using a sequence number, an attacker employs various inject tools to change the sequence counter value and to inject a new fabricated fragment instead of an original fragmented payload [11]. As a consequence, there are many scenarios in which the sensitive information of the pseudo-transport layer can suffer from internal/external adversaries [12,13,18].
Security approaches [26,27,28,29] have been proposed to hide sensitive information from attackers [1,2,3,4,5,6,7,8,9,10,11,12,13,18], but these security approaches are limited in terms of specification design, protocol dependencies, and transmission requirements [11,25]. To hide the information, cryptography approaches are considered as the best solutions for system security [26,37]; in a few cases, the encrypted information cannot be satisfied at the remote side, especially during decryption of the header [11,37,43]; therefore, the best solution is to encrypt the user bytes, excluding the header bytes [43]. On the other hand, if header information is not secured, there is a chance an adversary [12,13] modifies the header with false information while replying to the message. Therefore, in this research paper, a hashing algorithm was employed that generates a fixed size security code and travels along the original payload that keeps the receiver aware of unauthorized opponents. In the following section, attacking tools are employed to interrupt the normal flow of the pseudo-transport layer as part of the DNP3 protocol, and the corresponding observed measurements are discussed.

8. Setup and Abnormal Communication

In a SCADA wireless network setup, the number of nodes is configured to exchange information with the main controller, although the total number of SCADA nodes is not discussed here because of unicasting communication; the system is designed according to the terminologies of an unbalanced system in which only the main controller is authorized to initial communication with the remote controller(s) [20]. However, the terms such as balanced and unbalanced, which are defined at the data link layer, are not part of the pseudo-transport layer. Therefore, this study does not specifically emphasize these terms, but we conclude that, to the best of our knowledge, the unbalanced system is more appropriate than the balanced system for this study.
To interrupt the logical normal flow of the pseudo-transport layer, predominated attacking tools such as airpwn, file2air with wireshark, and injection tools, are used which perform traffic monitoring and frames (or fragments) captured as an attacker of the system [11]. However, security development is limited to an integrity security service; thus, the attacks such as fragment injection, payload replay, and payload deletion are considered as corresponding to the proposed security implementation.

9. Measurement and Discussion

DNP3 protocol unitization has been massively increasing (i.e., 70%) in SCADA systems [13]. Due to the lack of security precautions in the initial design of the DNP3 protocol, several potential adversaries take advantage of the DNP3 protocol’s vulnerable platform [11,13]. The current study employs a hashing function to enable awareness between the SCADA and DNP3 nodes, if transmission is interrupted by network adversaries. This research paper also deals with various developments of multimedia based security followed by communication requirements, although the study scope is limited to the pseudo-transport layer, as a layer of the DNP3 protocol.
To compute the performance measurements, random size fragment payloads are generated several times and transmitted between the main controller and the remote controller and vice versa; however, each fragment is limited to 1–250 bytes in length. In the case where no TSDU bytes are assembled from the upper layer, only the TPCI is transmitted with the computed hashing code. In the transmission, each fragment hash digest is calculated before transmitting to the remote side; the fixed hash code (or digest) travels along the original payload and is again computed at the receiver side to verify the contents of the payload. Of all the experiments, 200 are selected as the best experiments according to the best of our knowledge, and further performances such as attacks detection and security assessment, are also based on these selected experiments. Figure 10 shows the 200 successful experiments that are tested with random size payloads (or segments) and received at the remote side, whereby the first half of all the experiments are designated for sending to the payload and the remaining half are designated for the response payload. Each half is separated by a line.
Figure 11 and Figure 12 show the 200 successful attacks experiments that are tested with random size payloads (or segments), whereby 100 successful experiments are designated for sending to the payload and the remaining 100 as shown in Figure 12 are designated for the response payload.
To evaluate the performances, preliminary packet analyzer tools such as wireshark, dSniff, Kismet, ethereal, and ettercap are employed which analyze the packets (or fragments), as a consequence, and approximately 192 times fragments are intercepted in the transmission. Thus, we can conclude that the DNP3 pseudo-transport layer has a lack of security design, or the DNP3 pseudo-transport layer was designed without considering any security. In [11,18,33], the number of attacks is defined and detected as part of the SCADA system, and security mechanisms are also used that protect the SCADA communication against several potential attacks and ensure the SCADA platform is invulnerable [12,13,25,27,29]. However, security is accounted in SCADA systems or/and SCADA protocols, with the exception of the deliberation of pseudo-transport layer security.
During the fragments interception shown in Figure 11 and Figure 12, the SCADA nodes are configured without any security paradigms such as firewalls, demilitarized zone (DMZ), antivirus protection, etc., which determine the approximate security level during the transmission of fragmented payloads. However, if payload security was enhanced, the receiver would also be made aware of adversaries by contents verification. The fragmented payload hash digest is computed 200 times and transmitted along the original payload; upon receiving, the receiver also computes the hash digest of the original payload to compare with the sender hash digest. If two hash digest values are matched, then the receiver assumes that the payload came from an original source; otherwise, the payload contents are discarded and the exception (i.e., payload contents have not been verified, there is chanced of adversary in transmission), is generated against the adversary.
In the existing studies [45,46,47,48], several limitations of SHA-2 hashing function are analyzed and creaking tools are employed; it is also assumed that the hash code is breakable. However, we did not fully succeed in breaking the computed hashing codes, or the results were captured with zero impact. In the case where the computed hashing values are breakable, we propose a method called a digital signature to resolve these issues. In this method, a fragmented payload hash digest is computed H d i g e s t ( S , Q ) T L and a private key is deployed on the hash digital P r ( k , S ) (   H d i g e s t ( S , Q ) T L ), which acts as a digital signature. The original payload Q ( S , h , b ) T L and digital signature P r ( k , S ) ( h d i g e s t ( S , Q ) T L ) are then encrypted with a public key P u ( k , R ) of the receiver(R) as P u ( k , R ) ( Q ( S , h , b ) T L ,     P r ( k , S ) ( h d i g e s t ( S , Q ) T L )), and transmitted to the remote side. Upon receiving, the receiver uses the sender (S) public key P u ( k , S ) and the private key P r ( k , R ) of the receiver(R) to open (or decrypt) the original payload Q ( S , h , b ) T L and hash digest H d i g e s t ( S , Q ) T L . Subsequently, the hash digest of Q ( S , h , b ) T L is calculated, and is designated as H d i g e s t ( R , Q ) T L and compared with H d i g e s t ( S , Q ) T L . The keys such as private keys and public keys are defined and generated using an RSA algorithm; however, the keys are distributed statistically among the network nodes. As a consequence, we concluded that the hash digest is secured and the payload contents are not altered during transmission, even in cases of adversary. In study [49], the attack scenarios were conducted, in which the authentication and confidentiality attacks such as brute force, cryptography key cracking, eavesdropping, and man-in-the-middle are launched 200 times and the numbers of detected attacks are counted and visualized [11,49]. As a result, minimal impact is computed that is so far able to break the hash digest; also, it is very difficult for an adversary to inject, modify, and delete the sensitive information of the payload.

10. Multimedia Contexts

In this study, various multimedia contexts are employed in the form of text and images. The human machine interface (HMI) is designed and installed at both sides of the transmission. The basic configuration and setup, including the connection type (i.e., TCP/IP), IP addresses, Port numbers, Channel setting, etc. required between the main controller and the remote controller are visualized as part of HMI. During transmission, the total number of bytes fragmented in the case of sending and responding (as part of the pseudo-transport layer), are also visualized which make it convenient for the end user prospective. The fragments flow in sequence and are shown on HMI at both sides of the transmission; the end users or operators can check the flow of fragments during the construction and distribution at both sides using sharing media (i.e., team viewer etc.), which also determines the effects of networks adversaries, in the case where abnormal flows are visualized.
In a few cases, the main controller requires exceptional reports and screen shots (or images) of the physical setup, such as sensors, actuators, PLCs, and hardware devices; the information is then secured from the network adversaries, the images are transmitted in compressed form in order to minimize the memory space, and the security using the SHA-2 algorithm is deployed before responding to the main controller. Normally, SCADA systems are designed and used for low bandwidth; therefore, hashing is considered a secure and reliable approach [1,4]. In the case where there are potential adversaries that successfully break the hashing value, a digital signature is considered as the best approach according to the best of our knowledge and according to our measurements.

11. Significance of Study

Hashing is a good approach which verifies the payload contents by comparing the computed hashing values of the sender and receiver. In this study, pseudo-transport layer security issues are analyzed and the SHA-2 hashing algorithm is selected and deployed on the fragmented payload; TPDU is made up of user bytes and a header byte, while the FIR, FIN, and sequence number are part of TPCI. In the case where an adversary causes an interruption (i.e., injection, modification, and deletion) by means of FIR, FIN, and sequence number, he/she cannot be successful because the hash digests are computed at both sides and compared at the remote side; if he/she is successful, the digital signature is computed for the hash value(s). As a consequence, the overall transmission is secured from the adversaries. This study also employed various multimedia contexts in the form of text and images, while security development and communication have been demonstrated to make information more convenient and reliable for the user.

12. Conclusions and Future Work

This study used a simulation based environment of water pumping system, and SCADA wireless sensors based network system to deploy the cryptography mechanism while communicating over unsecured network, or over Internet communication. Furthermore, the main security issues realized during the pseudo-transport layer disassembly and reassembling process are highlighted and a security solution using the SHA-2 hashing function is deployed, which ensures the integrity of bytes received/transmitted from/to the data link layer. Therefore, a DNP3 pseudo-transport layer stack has been designed and evaluated from formal evidence, security implementation is employed, and evidence is given of the protection against byte verification issues.
In future work, the SCADA system information will be accessed and monitored via cellular phones; and the SCADA/DNP3 testbed attack (abnormal) setup will be developed and simulation tools or software will be used to test the integrity attacks such as packet/data injection, packet/data replay, and data (byte) deletion and others. The security percentage will be measured based on the attack impact percentage on the overall system (or at the pseudo-transport layer stack). The other cryptography functions such as asymmetric and symmetric will also be deployed and security results will be validated against attacks such as shared key guessing, brute force, cracking key, man-in-the-middle, and others.

Acknowledgments

This paper was supported by research funds of Wonkwang University in 2016. This research was supported by Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2014M3C4A7030503).

Author Contributions

In this research, Aamir Shahzad, Malrey Lee and Neal Naixue Xiong conceived and designed the experiments; Aamir Shahzad, Gisung Jeong and Young-Keun Lee performed the experiments; Aamir Shahzad, Jae-Young Choi and Abdul Wheed Mahesar analyzed the data; Aamir Shahzad, Malrey Lee and Iftikhar Ahmad Khan contributed materials/analysis tools; Aamir Shahzad, Malrey Lee and Neal Naixue Xiong wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheung, R.; Fung, Y. Wireless access to SCADA system. In Proceedings of the 2000 International Conference on Advances in Power System Control, Operation and Management, Hong Kong, China, 30 October–1 November 2000; pp. 553–556.
  2. Flammini, A.; Ferrari, P.; Marioli, D.; Sisinni, E.; Taroni, A. Wired and wireless sensor networks for industrial applications. Microelectron. J. 2009, 40, 1322–1336. [Google Scholar] [CrossRef]
  3. Escudero, J.I.; Rodriguez, J.A.; Romero, M.C.; Luque, J. IDOLO: Multimedia data deployment on SCADA systems. In Proceedings of the Power Systems Conference and Exposition, New York, NY, USA, 10–13 October 2004; pp. 252–257.
  4. Escudero, J.I.; Rodriguez, J.A.; Romero, M.C.; Diaz, S. Deployment of digital video and Audio Over electrical SCADA networks. IEEE Trans. Power Deliv. 2005, 20, 691–695. [Google Scholar] [CrossRef]
  5. Morsi, I.; el Deeb, M.; El Zwawi, A. SCADA/HMI Development for a Multi Stage Desalination Plant. In Proceedings of the Computation world 09. Computation World Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, Athens, Greece, 15–20 November 2009; pp. 67–71.
  6. Laurence, K.; Rémi, B. The synergy between system modelization and HMI modelization: Application on a workbench HMI. In Proceedings of the 2014 Ergonomie et Informatique Avancée Conference—Design, Ergonomie et IHM: Quelle articulation pour la co-conception de l’interaction (Ergo’IA ‘14), New York, NY, USA, 15 October 2014; pp. 122–129.
  7. Adnan, S.; Vlatko, M.; Zoran, C.; Elvedin, K.; Nina, D. Web based multilayered distributed SCADA/HMI system in refinery application. Comput. Stand. Interfaces 2009, 31, 599–612. [Google Scholar]
  8. Mander, T.; Nabhani, F.; Wang, L.; Cheung, R. Data Object Based Security for DNP3 Over TCP/IP for Increased Utility Commercial Aspects Security. In Proceedings of the Power Engineering Society General Meeting, Tampa, FL, USA, 24–28 June 2007; pp. 1–8.
  9. Ortega, A.; Akira Shinoda, A. Simulation in NS-2 of DNP3 protocol encapsulated over TCP/IP in smart grid applications. In Proceedings of the 2013 IEEE PES Conference on Innovative Smart Grid Technologies Latin America (ISGT LA), Chicago, IL, USA, 15–17 April 2013; pp. 1–8.
  10. Haydn, A.T. Wireless and Internet communications technologies for monitoring and control. Control Eng. Pract. 2004, 12, 781–791. [Google Scholar]
  11. Musa, S.; Aborujilah, A. Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, Kota Kinabalu, Malaysia, 17–19 January 2013.
  12. Huitsing, P.; Chandia, R.; Papa, M.; Shenoi, S. Attack taxonomies for the Modbus protocols. Int. J. Crit. Infrastruct. Prot. 2008, 1, 37–44. [Google Scholar] [CrossRef]
  13. East, S.; Butts, J.; Papa, M.; Shenoi, S. A Taxonomy of Attacks on the DNP3 Protocol. Crit. Infrastruct. Prot. 2009, 3, 67–81. [Google Scholar]
  14. Shahzad, A.; Lee, M.; Kim, S.; Kim, K.; Choi, J.-Y.; Cho, Y.; Lee, K.-K. Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors 2016, 16. [Google Scholar] [CrossRef] [PubMed]
  15. Sugwon, H.; Lee, M. Challenges and Direction toward Secure Communication in the SCADA System. In Proceedings of the Communication Networks and Services Research Conference (CNSR), Montreal, QC, Canada, 11–14 May 2010.
  16. Gao, J.; Liu, J.; Rajan, B.; Nori, R.; Fu, B.; Xiao, Y.; Liang, W.; Chen, P. SCADA communication and security issues. Secur. Commun. Netw. 2014, 7, 175–194. [Google Scholar] [CrossRef]
  17. Kim, H. Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2012, 2012. [Google Scholar] [CrossRef]
  18. Lee, D.; HakJu, K.; Kwangjo, K.; Yoo, P.D. Simulated Attack on DNP3 Protocol in SCADA System. In Proceedings of the 31th Symposium on Cryptography and Information Security, Kagoshima, Japan, 21–24 January 2014.
  19. Willig, A.; Matheus, K.; Wolisz, A. Wireless Technology in Industrial Networks. IEEE Proc. 2005. [Google Scholar] [CrossRef]
  20. Gordon, C.; Deon, R.; Edwin, W. Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems; Elsevier: New York, NY, USA, 2004; pp. 73–129. [Google Scholar]
  21. Susanto, I.; Jackson, R.; Paul, D.L. Industrial Process Control System Security. In Wiley Handbook of Science and Technology for Homeland Security; John Wiley & Sons: Hoboken, NJ, USA, 2009; pp. 1–15. [Google Scholar]
  22. Jeffrey, L.; Hieb, J.H.; Graham, S.C. Cyber Security Enhancements for SCADA and DCS Systems. ISRL-TR-07-02, Intelligent Systems Research Laboratory; Technical Report TR-ISRL-07-02; University of Louisville: Louisville, KY, USA, 2007. [Google Scholar]
  23. Steve, G. The SCADA challenge: Securing critical infrastructure. Netw. Secur. 2009, 2009, 18–20. [Google Scholar]
  24. Igor Nai, F.; Andrea, C.; Marcelo, M.; Alberto, T. An experimental investigation of malware attacks on SCADA systems. Int. J. Crit. Infrastruct. Prot. 2009, 2, 139–145. [Google Scholar]
  25. Patel, S.C.; Bhatt, G.D.; Graham, J.H. Improving the cyber security of SCADA communication networks. Commun ACM 2009, 52, 139–142. [Google Scholar] [CrossRef]
  26. Hieb, J.; Graham, J.; Patel, S. Security Enhancements for Distributed Control Systems, Critical Infrastructure Protection. IFIP Int. Fed. Inf. Process. 2008, 253, 133–146. [Google Scholar]
  27. Kim, H.M. A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. In Proceedings of the Future Generation Communication and Networking, Jeju-Island, Korea, 6–8 December 2007.
  28. Azeem, I.; Muhammad, S.; Muhammad, S.F. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Netw. 2014, 7, 1210–1218. [Google Scholar]
  29. Seongan, L.; Eunjeong, L.; Cheol-Min, P. Equivalent public keys and a key substitution attack on the schemes from vector decomposition. Secur. Commun. Netw. 2014, 7, 1274–1282. [Google Scholar]
  30. Vyas, P. Wireless Sensor Networks for Industrial Process Monitoring and Control with Security Architecture: A survey for Research Issues. IJESRT 2013, 2, 930–936. [Google Scholar]
  31. Anupam, S.; Om, P.; Zia, S. Public Key Cryptography Based Approach for Securing SCADA Communications, Computer Networks and Information Technologies. Commun. Comput. Inf. Sci. 2011, 142, 56–62. [Google Scholar]
  32. Martin, D.; Maricel, B. Cipher for Internet-based Supervisory Control and Data Acquisition Architecture. J. Secur. Eng. 2011, 8, 337–348. [Google Scholar]
  33. Shahzad, A.; Musa, S.; Irfan, M. N-Secure Cryptography Solution for SCADA Security Enhancement. Trends Appl. Sci. Res. 2014, 9, 381–395. [Google Scholar] [CrossRef]
  34. Fujisaki, E.; Okamoto, T. Secure integration of asymmetric and symmetric metric encryption schemes. In Advances in Cryptology—CRYPTO’99; LNCS; Spring-Verlag: Berlin, Germany, 1999; pp. 537–554. [Google Scholar]
  35. He, D.; Chen, J.; Chen, Y. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. 2012, 5, 1423–1429. [Google Scholar] [CrossRef]
  36. Robles, R.-J.; Balitanas, J. Comparison of Encryption Schemes as Used in Communication between SCADA Components. Ubiquitous Comput. Mult. Appl. 2011. [Google Scholar] [CrossRef]
  37. Shahzad, A.; Musa, S.; Irfan, M.; Asadullah, S. Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement. J. Appl. Sci. 2014, 14, 2487–2497. [Google Scholar] [CrossRef]
  38. Chen, Y.; Dong, Q. RCCA security for KEM + DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. Secur. Commun. Netw. 2014, 7, 1219–1231. [Google Scholar]
  39. Rosslin, J.R.; Maricel, B.; Tai-hoon, K. Security Encryption Schemes for Internet SCADA: Comparison of the Solutions. Commun. Comput. Inf. Sci. 2011, 223, 19–27. [Google Scholar]
  40. Sandip, C.P. Secure Internet-Based Communication Protocol for Scada Networks. Ph.D. Thesis, University of Louisville, Louisville, KY, USA, 2006. [Google Scholar]
  41. Ralston, P.A.S.; Graham, J.H.; Hieb, J.L. Cyber security risk assessment for SCADA and DCS networks. ISA Trans. 2007, 46, 583–594. [Google Scholar] [CrossRef] [PubMed]
  42. Gilchrist, G. Secure authentication for DNP3. In Proceedings of the Power and Energy Society General Meeting—Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, Pittsburgh, PA, USA, 20–24 July 2008; pp. 1–3.
  43. Majdalawieh, M.; Parisi-Presicce, F.; Wijesekera, D. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. Adv. Comput. Inf. Syst. Sci. Eng. 2006, 3, 227–234. [Google Scholar]
  44. Shahzad, A.; Lee, M. The Protocol Design and New Approach for SCADA Security Enhancement during Sensors Broadcasting System. Multimed. Tools Appl. Springerlink 2015. [Google Scholar] [CrossRef]
  45. Helena, H.; Henri, G. Evaluation Report, Security Level of Cryptography—SHA-256, 2002. Available online: http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1045_IPA-SHA256.pdf (accessed on 1 October 2015).
  46. Somitra, K.S.; Palash, S. A new hash family obtained by modifying the SHA-2 family. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, NSW, Australia, 10–12 March 2009.
  47. Florian, M.; Tomislav, N.; Martin, S. Finding SHA-2 characteristics: Searching through a minefield of contradictions. In Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT′11), Seoul, Korea, 4–8 December 2011; pp. 288–307.
  48. Henri, G.; Helena, H. Security Analysis of SHA-256 and Sisters. Sel. Areas Cryptogr. Lect. Notes Comput. Sci. 2004, 3006, 175–193. [Google Scholar]
  49. Shahzad, A.; Lee, M.; Lee, Y.; Kim, S.; Xiong, K.; Choi, J.; Cho, Y. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information. Symmetry 2015. [Google Scholar] [CrossRef]
Figure 1. SCADA system and network components.
Figure 1. SCADA system and network components.
Sensors 16 00322 g001
Figure 2. DNP3 protocol model.
Figure 2. DNP3 protocol model.
Sensors 16 00322 g002
Figure 3. Simulation design and environment.
Figure 3. Simulation design and environment.
Sensors 16 00322 g003
Figure 4. Single TPDU block.
Figure 4. Single TPDU block.
Sensors 16 00322 g004
Figure 5. Multiple TPDU blocks.
Figure 5. Multiple TPDU blocks.
Sensors 16 00322 g005
Figure 6. Transport header field structure.
Figure 6. Transport header field structure.
Sensors 16 00322 g006
Figure 7. Interconnection between OSI model and DNP3 protocol.
Figure 7. Interconnection between OSI model and DNP3 protocol.
Sensors 16 00322 g007
Figure 8. Logical interrelation and communication flow.
Figure 8. Logical interrelation and communication flow.
Sensors 16 00322 g008
Figure 9. Security development Using hashing function.
Figure 9. Security development Using hashing function.
Sensors 16 00322 g009
Figure 10. Traffic: (left): Main Controller; (right) Remote Terminal Unit.
Figure 10. Traffic: (left): Main Controller; (right) Remote Terminal Unit.
Sensors 16 00322 g010
Figure 11. Attacks: Main controller traffic.
Figure 11. Attacks: Main controller traffic.
Sensors 16 00322 g011
Figure 12. Attacks: Remote terminal unit traffic.
Figure 12. Attacks: Remote terminal unit traffic.
Sensors 16 00322 g012
Table 1. Attack taxonomy for the DNP3 pseudo-transport layer.
Table 1. Attack taxonomy for the DNP3 pseudo-transport layer.
No.AttacksAttacks Instances (Description)
1Passive Network ReconnaissanceInterception of main station, sub-controller, and network information.
2Baseline Response ReplayInterruption, modification, and fabrication of the main station and sub-controller.
3Rogue InterloperInterruption, modification, and fabrication of the main station, sub-controller, and network information.
4Fragment InterruptionInterruption of the main station and sub-controller.
5Sequence ModificationInterception of Main Station, sub-controller, and network information.
Table 2. Attack taxonomy for the DNP3 data link layer.
Table 2. Attack taxonomy for the DNP3 data link layer.
No.AttacksAttacks Instances (Description)
1Passive Network ReconnaissanceInterception of main station, sub-controller, and network information.
2Baseline Response ReplayInterruption, modification, and fabrication of the main Station and sub-controller.
3Rogue InterloperInterruption, modification, and fabrication of the main station, sub-controller, and network information.
4Length Overflow AttackInterruption and modification of the main station and sub-controller.
5Flag AttackInterruption of sub-controller.
6Reset Function AttackInterruption and modification of the main station and sub-controller
7Unavailable Function AttackInterruption of the main station
8Destination Address AlterationInterruption, modification, and fabrication of the main station, sub-controller, and network information
Table 3. Security notations.
Table 3. Security notations.
NotationsDescription
Q T L ( B ) Assembled bytes.
f Q : b i Disassembled bytes.
f α : ( Q h T L ) Manipulated header bytes.
f α : ( Q b T L ) Manipulated data bytes, after disassembling.
k     l i m K is dual integer that defines the limit (lim).
α T L = User defined index pointer.
f H User defined hashing function.
f C o m p H Hashing comparison function.
f w : w h , b User defined relation function.
f p : p h , b User defined bytes separator function.

Share and Cite

MDPI and ACS Style

Shahzad, A.; Lee, M.; Xiong, N.N.; Jeong, G.; Lee, Y.-K.; Choi, J.-Y.; Mahesar, A.W.; Ahmad, I. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks. Sensors 2016, 16, 322. https://doi.org/10.3390/s16030322

AMA Style

Shahzad A, Lee M, Xiong NN, Jeong G, Lee Y-K, Choi J-Y, Mahesar AW, Ahmad I. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks. Sensors. 2016; 16(3):322. https://doi.org/10.3390/s16030322

Chicago/Turabian Style

Shahzad, Aamir, Malrey Lee, Neal Naixue Xiong, Gisung Jeong, Young-Keun Lee, Jae-Young Choi, Abdul Wheed Mahesar, and Iftikhar Ahmad. 2016. "A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks" Sensors 16, no. 3: 322. https://doi.org/10.3390/s16030322

APA Style

Shahzad, A., Lee, M., Xiong, N. N., Jeong, G., Lee, Y. -K., Choi, J. -Y., Mahesar, A. W., & Ahmad, I. (2016). A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks. Sensors, 16(3), 322. https://doi.org/10.3390/s16030322

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop