Title :
A deployable SCADA authentication technique for modern power grids
Author :
Taylor, Curtis R. ; Shue, Craig A. ; Paul, Nathanael R.
Author_Institution :
Comput. Sci. Dept., Worcester Polytech. Inst., Worcester, MA, USA
Abstract :
The modern power grid makes extensive use of automated data collection and control. These supervisory control and data acquisition (SCADA) systems often use communication protocols that were developed for isolated networks. However, the underlying SCADA systems often use the Internet for data transit, exposing these SCADA devices to remote, malicious adversaries. Unfortunately, these protocols are often vulnerable to impersonation attacks, and the devices can be susceptible to cryptographic key compromise. This allows adversaries to pollute the protocols with misinformation. In this paper, we propose an approach to authenticate the underlying SCADA protocols that combines a different approach to data authenticity and hardware-protected key distribution approach. Unlike prior work, our approach does not require modification to the SCADA end-points themselves, allowing the technique to be combined with legacy devices.
Keywords :
SCADA systems; cryptographic protocols; power grids; power system control; Internet; SCADA devices; SCADA protocols; automated data collection; communication protocols; cryptographic key; data authenticity; data control; data transit; deployable SCADA authentication technique; hardware-protected key distribution approach; impersonation attacks; legacy devices; modern power grid; supervisory control and data acquisition systems; Authentication; Databases; Memory management; Monitoring; Protocols; SCADA systems; Authentication; SCADA; Security;
Conference_Titel :
Energy Conference (ENERGYCON), 2014 IEEE International
Conference_Location :
Cavtat
DOI :
10.1109/ENERGYCON.2014.6850502