DocumentCode
173526
Title
A deployable SCADA authentication technique for modern power grids
Author
Taylor, Curtis R. ; Shue, Craig A. ; Paul, Nathanael R.
Author_Institution
Comput. Sci. Dept., Worcester Polytech. Inst., Worcester, MA, USA
fYear
2014
fDate
13-16 May 2014
Firstpage
696
Lastpage
702
Abstract
The modern power grid makes extensive use of automated data collection and control. These supervisory control and data acquisition (SCADA) systems often use communication protocols that were developed for isolated networks. However, the underlying SCADA systems often use the Internet for data transit, exposing these SCADA devices to remote, malicious adversaries. Unfortunately, these protocols are often vulnerable to impersonation attacks, and the devices can be susceptible to cryptographic key compromise. This allows adversaries to pollute the protocols with misinformation. In this paper, we propose an approach to authenticate the underlying SCADA protocols that combines a different approach to data authenticity and hardware-protected key distribution approach. Unlike prior work, our approach does not require modification to the SCADA end-points themselves, allowing the technique to be combined with legacy devices.
Keywords
SCADA systems; cryptographic protocols; power grids; power system control; Internet; SCADA devices; SCADA protocols; automated data collection; communication protocols; cryptographic key; data authenticity; data control; data transit; deployable SCADA authentication technique; hardware-protected key distribution approach; impersonation attacks; legacy devices; modern power grid; supervisory control and data acquisition systems; Authentication; Databases; Memory management; Monitoring; Protocols; SCADA systems; Authentication; SCADA; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Energy Conference (ENERGYCON), 2014 IEEE International
Conference_Location
Cavtat
Type
conf
DOI
10.1109/ENERGYCON.2014.6850502
Filename
6850502
Link To Document