Affiliations 

  • 1 Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea. [email protected]
  • 2 Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea. [email protected]
  • 3 School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China. [email protected]
  • 4 Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea. [email protected]
  • 5 Department of Orthopedic Surgery, Chonbuk National University Hospital, Jeonju 561-756, Korea. [email protected]
  • 6 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Korea. [email protected]
  • 7 Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia. [email protected]
  • 8 Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia. [email protected]
Sensors (Basel), 2016;16(3).
PMID: 26950129 DOI: 10.3390/s16030322

Abstract

In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

* Title and MeSH Headings from MEDLINE®/PubMed®, a database of the U.S. National Library of Medicine.