Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard protocols need to be protected. Hence, this paper attempts to offer a solution for securing the legacy insecure communication protocols based on elliptic curve cryptography while fulfilling the time constraints of a real SCADA network. Elliptic curve cryptography is chosen to respond to the low memory resources available for the low level devices of a SCADA network (e.g., PLCs), and also because it can achieve the same level of security as other cryptographic algorithms using smaller sizes for the secure keys. Furthermore, the proposed security methods have the purpose of assuring that the data transmitted between entities of a SCADA and automation system are authentic and confidential. The experimental results showed good timing performance for the cryptographic operations executed on Industruino and MDUINO PLCs, demonstrating that our proposed concept is deployable for Modbus TCP communication in a real automation/SCADA network on existing devices from the industry.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10006913 | PMC |
http://dx.doi.org/10.3390/s23052686 | DOI Listing |
Sci Rep
January 2025
Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, 11543, Saudi Arabia.
The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing real-time monitoring and data-driven treatments. Nevertheless, the security of communication between IoMT devices and servers remains a huge problem because of the inherent sensitivity of the health data and susceptibility to cyber threats. Current security solutions, including simple password-based authentication and standard Public Key Infrastructure (PKI) approaches, typically do not achieve an appropriate balance between security and low computational overhead, resulting in the possibility of performance bottlenecks and increased vulnerability to attacks.
View Article and Find Full Text PDFAnal Chem
January 2025
Laboratorio de Investigación y Desarrollo en Métodos Analíticos (LIDMA), Facultad de Ciencias Exactas, Universidad Nacional de La Plata (UNLP), Calle 49 y 115 (B1900AJL), La Plata 1900, Argentina.
A new strategy is proposed for second-order data fusion based on the simultaneous modeling of two data sets using the multivariate curve resolution-alternating least-squares (MCR-ALS) model, applying a new constraint during the ALS stage, called "Proportionality of Scores". This approach allows for the fusion of data from different sources, without requiring common dimensionality, and enables the application of specific constraints to each data set. This strategy was applied to the determination of five pharmaceutical contaminants (naproxen, danofloxacin, ofloxacin, sarafloxacin, and enoxacin) in environmental water samples, by fusing two sets of excitation-emission fluorescence matrices, measured before and after photochemical derivatization.
View Article and Find Full Text PDFSci Rep
December 2024
Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
Vehicular Ad-hoc Networks (VANETs) are growing into more desirable targets for malicious individuals due to the quick rise in the number of automated vehicles around the roadside. Secure data transfer is necessary for VANETs to preserve the integrity of the entire network. Federated learning (FL) is often suggested as a safe technique for exchanging data among VANETs, however, its capacity to protect private information is constrained.
View Article and Find Full Text PDFRes Number Theory
December 2024
Department of Mathematics, King's College London, Strand, London, WC2R 2LS UK.
Let and be elliptic curves over with complex multiplication by the ring of integers of an imaginary quadratic field and let be the minimal desingularisation of the quotient of by the action of . We study the Brauer groups of such surfaces and use them to furnish new examples of transcendental Brauer-Manin obstructions to weak approximation.
View Article and Find Full Text PDFPhys Rev E
November 2024
Department of Physics and National Institute of Science and Technology of Complex Systems, Federal University of Rio Grande do Norte, 59078-970 Natal-RN, Brazil.
This work establishes links between the Ising model and elliptic curves via Mahler measures. First, we reformulate the partition function of the Ising model on the square, triangular, and honeycomb lattices in terms of the Mahler measure of a Laurent polynomial whose variety's projective closure defines an elliptic curve. Next, we obtain hypergeometric formulas for the partition functions on the triangular and honeycomb lattices and review the known series for the square lattice.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!