Authentication Layer for IEC 61113-3 Applications

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Mid 2010, the Stuxnet ICS attack targeted the Siemens automation products, and after this attack the ICS security was thrust into spotlight, automation products suppliers started to re-examine their business approach to cyber security. The OPC Foundation made also significant changes and improvements on its new design OPC-UA to increase security of automation applications but, what is still missing and seems to be not resolved any time soon is having security in depth for industrial automation applications. In this paper, we propose a simple but strong security control solution, what we will call a logic application level security particularly for SCADA and DCS. This proposed method is based on message integrity and should not be viewed as the main, nor the only level of protection that an industrial automation system is expected to have, but can be a low-level security procedure that avoids intelligent attacks such as Stuxnet.
Original languageEnglish
Title of host publication2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
PublisherIEEE
ISBN (Electronic)9781728115429, 9781728115412
ISBN (Print)9781728115436
DOIs
Publication statusPublished - 15 Jul 2019
Event10th IFIP International Conference on New Technologies, Mobility and Security 2019 - Canary Islands, Spain
Duration: 24 Jun 201926 Jun 2019

Conference

Conference10th IFIP International Conference on New Technologies, Mobility and Security 2019
Abbreviated titleNTMS 2019
Country/TerritorySpain
CityCanary Islands
Period24/06/1926/06/19

Keywords

  • Security
  • Computer worms
  • IEC Standards
  • Integrated circuits
  • Automation
  • Stuxnet
  • Obfuscation
  • Encryption
  • MAC
  • SCADA
  • DCS

Fingerprint

Dive into the research topics of 'Authentication Layer for IEC 61113-3 Applications'. Together they form a unique fingerprint.

Cite this