Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system

Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system Supervisory control and data acquisition (SCADA) system is the heart of almost every critical infrastructure system, whereby SCADA is generally employed in order to control and to monitor both the physical and industrial processes within these systems. It is, thus, of vital importance that any vulnerabilities of SCADA system to be identified and mitigated to prevent unplanned incidents, malicious activities, and cyber-attacks. The IEC 60870-5-104 refers to an international standard applied for tele-control in electrical engineering and power SCADA systems, which appears to be a significant principal protocol in electrical power system automation. Major industrial control vendors employ this protocol to monitor and to manage power utility devices. Nonetheless, IEC 60870-5-104 suffers from several designs and implementation weaknesses in terms of security aspects. As such, this study briefly presents this protocol and summarises its security vulnerabilities. Furthermore, it highlights the potential cyber-attacks based on the identified vulnerabilities. Additionally, the paper depicts several possible countermeasures to tighten the security of the SCADA systems. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Critical Infrastructures Inderscience Publishers

Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system

Loading next page...
 
/lp/inderscience-publishers/assessing-the-cyber-security-of-the-iec-60870-5-104-protocol-in-scada-CCCPMgSxhN

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1475-3219
eISSN
1741-8038
DOI
10.1504/IJCIS.2020.107242
Publisher site
See Article on Publisher Site

Abstract

Supervisory control and data acquisition (SCADA) system is the heart of almost every critical infrastructure system, whereby SCADA is generally employed in order to control and to monitor both the physical and industrial processes within these systems. It is, thus, of vital importance that any vulnerabilities of SCADA system to be identified and mitigated to prevent unplanned incidents, malicious activities, and cyber-attacks. The IEC 60870-5-104 refers to an international standard applied for tele-control in electrical engineering and power SCADA systems, which appears to be a significant principal protocol in electrical power system automation. Major industrial control vendors employ this protocol to monitor and to manage power utility devices. Nonetheless, IEC 60870-5-104 suffers from several designs and implementation weaknesses in terms of security aspects. As such, this study briefly presents this protocol and summarises its security vulnerabilities. Furthermore, it highlights the potential cyber-attacks based on the identified vulnerabilities. Additionally, the paper depicts several possible countermeasures to tighten the security of the SCADA systems.

Journal

International Journal of Critical InfrastructuresInderscience Publishers

Published: Jan 1, 2020

There are no references for this article.