Proposal of a Secure Modbus RTU communication with Adi Shamir’s secret sharing method
Abstract
Full Text:
PDFReferences
Shamir, Adi (1979). How to share a secret. Communications of the ACM, 22, 612-613.
Harn, Lien & Lin, Changlu (2010). Authenticated group key transfer
protocol based on secret sharing. IEEE transactions on computers, 59, 842-846.
Liu, Yining, Cheng, Chi, Gu, Tianlong, Jiang, Tao & Li, Xiangming (2016). A lightweight authenticated communication scheme for smart grid.
IEEE Sensors Journal, 16, 836-842. Narayana, V Lakshman & Bharathi, CR (2017).
IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS. Journal of Theoretical and Applied Information
Technology, 95, 1173.
Chen, B., Pattanaik, N., Goulart, A., Butler-Purry, K. L., & Kundur, D.
(2015, May). Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed. In Communications Quality and Reliability (CQR), 2015 IEEE International Workshop Technical Committee on (pp. 1-6). IEEE.
Ádámkó, Éva., Jakabóczki, Gábor. „Security analysis of Modbus
RTU.” Proceedings of the Conference on Problem-based Learning in Engineering Education. 2015. 5-11.
Byres, E. J., Franz, M., & Miller, D. (2004, December). The use of attack
trees in assessing vulnerabilities in SCADA systems. In Proceedings of the
international infrastructure survivability workshop.
Nardone, R., Rodríguez, R. J., & Marrone, S. (2016, December). Formal
security assessment of Modbus protocol. In Internet Technology and
Secured Transactions (ICITST), 2016 11th International Conference for (pp. 142-147). IEEE.
Huitsing, Peter, Chandia, Rodrigo,Papa, Mauricio & Shenoi, Sujeet
(2008). Attack taxonomies for the Modbus protocols. International
Journal of Critical Infrastructure Protection, 1, 37-44.
Goldenberg, Niv & Wool, Avishai (2013). Accurate modeling of
Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection, 6, 63-75.
Urrea, Claudio, Morales, Claudio & Kern, John (2016). Implementation of
error detection and correction in the Modbus-RTU serial protocol.
International Journal of Critical Infrastructure Protection, 15, 27-37.
Erez, Noam & Wool, Avishai (2015). Control variable classification,
modeling and anomaly detection in Modbus/TCP SCADA systems.
International Journal of Critical Infrastructure Protection, 10, 59-70.
Urrea, Claudio, Morales, Claudio & Mu~noz, Rodrigo (2016). Design and
implementation of an error detection and correction method compatible with MODBUS-RTU by means of systematic codes. Measurement, 91, 266-275.
Shahzad, Aamir, Lee, Malrey, Lee, Young-Keun, Kim, Suntae, Xiong,
Naixue, Choi, Jae-Young & Cho, Younghwa (2015). Real time MODBUS
transmissions and cryptography security designs and enhancements of
protocol sensitive information. Symmetry, 7, 1176-1210.
] R. Solomakhin, Predictive YASIR: High Security with Lower Latency in
Legacy SCADA, Technical Report TR2010-665, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2010.
Fovino, Igor Nai, Carcano, Andrea, Masera, Marcelo & Trombetta, Alberto
(2009). Design and Implementation of a Secure Modbus Protocol.. Critical
Infrastructure Protection, 3, 83-96.
Bruce, Schneier (1999). Attack trees.
Dr Dobb's Journal, 24, .
Menezes, Alfred J, Van Oorschot, P & Vanstone, S (). Handbook of Applied
Cryptography, C R CP ress, 1 996. Chapter, 5, 12.
Menezes, Alfred J, Van Oorschot, P & Vanstone, S (). Handbook of Applied
Cryptography, C R CP ress, 1 996. FIPS, PUB (2001). 197: Federal
Information Processing Standards Publication 197. Announcing the
ADVANCED ENCRYPTION STANDARD (AES).
Modicon, I (1996). Modicon modbus protocol reference guide. North
Andover, Massachusetts, , 28-29.
Raiou, Costen (2016). Kaspersky Security Bulletin. Securelist, , 68-
Communication network dependencies for ICS/SCADA Systems (2016).
,https://www.enisa.europa.eu/publications/ics-scada-dependencies
Schneider Electrics, SCADA systems white paper (2012)
Adrian Pauna, Konstantinos Moulinos, et.al. (2013). Can we learn from SCADA security incidents? https://www.enisa.europa.eu/publications/can-we-learn-from-scada-security-incidents.
Transceiver, Serial Encrypting. "SEL-3021 Serial Encrypting Transceiver
Yüksel, Ömer, Jerry den Hartog, and Sandro Etalle. "Reading between the
fields: practical, effective intrusion detection for industrial control
systems." Proceedings of the 31st Annual ACM Symposium on Applied
Computing. ACM, 2016.
Moore, Tyler, and Sujeet Shenoi, eds. Critical Infrastructure
Protection IV: Fourth Annual IFIP WG 11.10 International Conference on
Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers. Vol. 342. Springer Science & Business Media, 2010. Security Policy." (2005).
Karl Rauscher (2013). It’s Time to Write the Rules of Cyberwar.
http://spectrum.ieee.org/telecom/security/its-time-to-write-the-rules-of-
cyberwar.
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences
eISSN: 2300-1933