A deployable SCADA authentication technique for modern power grids

Curtis R. Taylor, Craig A. Shue, Nathanael R. Paul

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

The modern power grid makes extensive use of automated data collection and control. These supervisory control and data acquisition (SCADA) systems often use communication protocols that were developed for isolated networks. However, the underlying SCADA systems often use the Internet for data transit, exposing these SCADA devices to remote, malicious adversaries. Unfortunately, these protocols are often vulnerable to impersonation attacks, and the devices can be susceptible to cryptographic key compromise. This allows adversaries to pollute the protocols with misinformation. In this paper, we propose an approach to authenticate the underlying SCADA protocols that combines a different approach to data authenticity and hardware-protected key distribution approach. Unlike prior work, our approach does not require modification to the SCADA end-points themselves, allowing the technique to be combined with legacy devices.

Original languageEnglish
Title of host publicationENERGYCON 2014 - IEEE International Energy Conference
PublisherIEEE Computer Society
Pages696-702
Number of pages7
ISBN (Print)9781479924493
DOIs
StatePublished - 2014
Externally publishedYes
Event2014 IEEE International Energy Conference, ENERGYCON 2014 - Dubrovnik, Croatia
Duration: May 13 2014May 16 2014

Publication series

NameENERGYCON 2014 - IEEE International Energy Conference

Conference

Conference2014 IEEE International Energy Conference, ENERGYCON 2014
Country/TerritoryCroatia
CityDubrovnik
Period05/13/1405/16/14

Keywords

  • Authentication
  • SCADA
  • Security

Fingerprint

Dive into the research topics of 'A deployable SCADA authentication technique for modern power grids'. Together they form a unique fingerprint.

Cite this