Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems.

Sensors (Basel)

Department of Automation and Applied Informatics, Faculty of Automation and Computers, University Politehnica Timișoara, 300223 Timișoara, Romania.

Published: March 2023

Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard protocols need to be protected. Hence, this paper attempts to offer a solution for securing the legacy insecure communication protocols based on elliptic curve cryptography while fulfilling the time constraints of a real SCADA network. Elliptic curve cryptography is chosen to respond to the low memory resources available for the low level devices of a SCADA network (e.g., PLCs), and also because it can achieve the same level of security as other cryptographic algorithms using smaller sizes for the secure keys. Furthermore, the proposed security methods have the purpose of assuring that the data transmitted between entities of a SCADA and automation system are authentic and confidential. The experimental results showed good timing performance for the cryptographic operations executed on Industruino and MDUINO PLCs, demonstrating that our proposed concept is deployable for Modbus TCP communication in a real automation/SCADA network on existing devices from the industry.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10006913PMC
http://dx.doi.org/10.3390/s23052686DOI Listing

Publication Analysis

Top Keywords

elliptic curve
12
curve cryptography
12
automation scada
8
scada systems
8
scada network
8
scada
5
cryptography considerations
4
considerations securing
4
securing automation
4
systems securing
4

Similar Publications

Intelligent two-phase dual authentication framework for Internet of Medical Things.

Sci Rep

January 2025

Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, 11543, Saudi Arabia.

The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing real-time monitoring and data-driven treatments. Nevertheless, the security of communication between IoMT devices and servers remains a huge problem because of the inherent sensitivity of the health data and susceptibility to cyber threats. Current security solutions, including simple password-based authentication and standard Public Key Infrastructure (PKI) approaches, typically do not achieve an appropriate balance between security and low computational overhead, resulting in the possibility of performance bottlenecks and increased vulnerability to attacks.

View Article and Find Full Text PDF

Novel Data Fusion Strategy for Second-Order Data: Multivariate Curve Resolution for the Determination of Pharmaceuticals by Means of Fluorimetric Measurements.

Anal Chem

January 2025

Laboratorio de Investigación y Desarrollo en Métodos Analíticos (LIDMA), Facultad de Ciencias Exactas, Universidad Nacional de La Plata (UNLP), Calle 49 y 115 (B1900AJL), La Plata 1900, Argentina.

A new strategy is proposed for second-order data fusion based on the simultaneous modeling of two data sets using the multivariate curve resolution-alternating least-squares (MCR-ALS) model, applying a new constraint during the ALS stage, called "Proportionality of Scores". This approach allows for the fusion of data from different sources, without requiring common dimensionality, and enables the application of specific constraints to each data set. This strategy was applied to the determination of five pharmaceutical contaminants (naproxen, danofloxacin, ofloxacin, sarafloxacin, and enoxacin) in environmental water samples, by fusing two sets of excitation-emission fluorescence matrices, measured before and after photochemical derivatization.

View Article and Find Full Text PDF

Vehicular Ad-hoc Networks (VANETs) are growing into more desirable targets for malicious individuals due to the quick rise in the number of automated vehicles around the roadside. Secure data transfer is necessary for VANETs to preserve the integrity of the entire network. Federated learning (FL) is often suggested as a safe technique for exchanging data among VANETs, however, its capacity to protect private information is constrained.

View Article and Find Full Text PDF

Transcendental Brauer-Manin obstructions on singular K3 surfaces.

Res Number Theory

December 2024

Department of Mathematics, King's College London, Strand, London, WC2R 2LS UK.

Let and be elliptic curves over with complex multiplication by the ring of integers of an imaginary quadratic field and let be the minimal desingularisation of the quotient of by the action of . We study the Brauer groups of such surfaces and use them to furnish new examples of transcendental Brauer-Manin obstructions to weak approximation.

View Article and Find Full Text PDF

Mahler measures, elliptic curves, and L-functions for the free energy of the Ising model.

Phys Rev E

November 2024

Department of Physics and National Institute of Science and Technology of Complex Systems, Federal University of Rio Grande do Norte, 59078-970 Natal-RN, Brazil.

This work establishes links between the Ising model and elliptic curves via Mahler measures. First, we reformulate the partition function of the Ising model on the square, triangular, and honeycomb lattices in terms of the Mahler measure of a Laurent polynomial whose variety's projective closure defines an elliptic curve. Next, we obtain hypergeometric formulas for the partition functions on the triangular and honeycomb lattices and review the known series for the square lattice.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!