A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
RajeshKumar, N.
- IoT-Based SCADA Systems Security:Detecting and Preventing Cyber-Attacks on Power Systems
Authors
1 Department of ECE, Pollachi Institute of Engineering and Technology, Coimbatore, IN
Source
Software Engineering, Vol 9, No 3 (2017), Pagination: 47-52Abstract
This Paper Presents a Scaled model For Supervisory Control and Data Acquisition (SCADA) communication network, which monitors and controls power distribution in Critical Infrastructure (CI). The existing power delivery system is vulnerable to both natural disasters and intentional attack. A successful terrorist attempt to disrupt the power delivery system could have adverse effects on national security, the economy, and the lives of every citizen. Secure and reliable operation of the electric system is fundamental to national and international economic systems, security, and quality of life. The Cyber Physical System (CPS) can be considered as "smart industrial systems," with their most prevalent applications in smart transportation, smart grids, smart medical and e Healthcare systems, and many more. These industrial CPSs mostly utilize Supervisory Control and Data Acquisition (SCADA) systems to control and monitor their Critical Infrastructure (CI). For example, Web SCADA is an application used for smart medical technologies, making improved patient monitoring and more timely decisions possible. The focus of the study presented in this paper is to highlight the security challenges that industrial SCADA systems face in an IoT -cloud environment. The cyber attacks on smart meter are detected using data mapping analysis. We have tried to implement intrusion detection system to protect the database systems with the use of hash map. Hashing technique performs faster than other techniques and results in high performance and high efficiency in detecting the database attacks. Finally, the paper briefly describes future research direction to secure these critical CPSs and results demonstrate that the proposed MDR approach helps in detecting and preventing the malicious nodes in the network effectively.
Keywords
Internet of Things (IoT), Cyber-Attacks, Hashing Technique, SCADA, Critical Infrastructure (CI).- Critical State Based Filtering System with Code Security for SCADA Network Protocols
Authors
1 Department of Applied Electronics, Sasurie College of Engineering, Tirupur, Tamilnadu, IN
2 Sasurie College of Engineering, Tirupur, Tamilnadu, IN
Source
International Journal of Scientific Engineering and Technology, Vol 2, No 8 (2013), Pagination: 756-758Abstract
SCADA (supervisory control and data acquisition) is a type of industrial control system (ICS). It’s a centralized system that monitors and control industrial processes that exist in the physical world. They work in Master – Slave basis. This system is widely used in Power plants, traffic light control, power plants, etc., As it is a centralized system storing lot of data, there is chance for the attackers to hack the information. In the existing system, a special filtering system is used which acts as a firewall for the SCADA network. System is prevented from hackers by analyzing the state of the system. It involves the prediction of finding whether the system is close to the critical state.The problem is that only attack by the hacker is prevented. Any problem in the software of PLC (Programmable Logic Controller) is not identified. There is no protection against unintentional errors or and other code level attacks. Some errors will show only warning, the user will ignore the warning and upload the malicious code into the server thus affecting the entire system. We focus on software vulnerabilities in ladder logic; a popular graphical language for programmable logic controllers. We show how intentional or unintentional errors in the ladder logic code can lead to integrity and availability violations. We propose methods to support secure Programmable logic controllers code development and to detect vulnerable applications.Keywords
SCADA, ICS, PLC, Filtering.- Efficient Cross Layer Mitigation in SCADA Network
Authors
1 Department of Applied Electronics, Sasurie College of Engineering, Tirupur, Tamilnadu, IN
Source
International Journal of Scientific Engineering and Technology, Vol 2, No 6 (2013), Pagination: 579-582Abstract
Almost all the Industrial Data Acquisition and control systems today use connection oriented concepts for interfaces. However, various shapes and functional commands that each cable or wire based system has also raises numerous problems: the difficulties in locating the particular area affected by the industrial parameter, the complexity in operation of the system, the maintenance issue and so on. The control of sensitive industrial parameters by using SCADAbased wireless technology has gained significant industry and academic attention lately for the usability benefits and convenience that it offers users. The control of the temperature of a room containing chemicals and toxic gases the existing research has failed to provide a flexible solution for controlling such conditions by connection- oriented systems. They have used cables and bulky equipment which require large amount of space, high degree of the maintenance and are easily detoriated by moisture and excessive heat. Additionally, the Data acquisition and control techniques used so far have imposed considerable computational burden and have not provided a consistent and accurate results expected by the employees and their industries.Keywords
SCADA, Cross Layer Mitigation, Wireless Technologies.- Smart Home – Integration of Technology through Network for Quality Living
Authors
1 Department of ECE, KPR Institute of Engineering and Technology, Coimbatore, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 10, No 7 (2018), Pagination: 169-171Abstract
This paper provides a low cost-effective and flexible home monitoring system with the aid of an integrated. Micro-web server with Internet Protocol (IP) connectivity for access and to monitoring of equipment and devices remotely using smart phone app. The main ideas is to identify the number of persons entering and existing in a home, monitoring the gas leakage, indication of water level, monitoring the intensity of light and reducing the speed of fan. The proposed system does not require a dedicated server PC with respect to similar systems and offers a new communication protocol for monitoring the home environment with more than just switching functionality and provide home energy control systems design intelligent services for users.
References
- K. Xu, Y. Qu, K. Yang “A Tutorial On The Internet Of Things : From A Heterogeneous Network Integration Perspective“, IEEE Network (volume:30, Issue:2, March-April 2016)
- U.S. Energy Information Administration , Commercial Building Energy Consumption Survey (CBECS), Energy Usage Summary”, 2012 Edition
- D. Minoli, Building the internet of things with IPv6 and MIPv6 (Wiley, 2013).
- Q. Wang ,W. Wang, K. Sohraby, ”Energy Efficient Multimedia Sensing as a service at Cloud edge IoT and Fogs”, IEEE Multimedia Communication Technical committee communicationFrontiers,Volume11, no4
- U.S. Energy Information Administration , Commercial Building Energy Consumption Survey (CBECS),Energy Usage Summary”,2012 Edition, [6] L. Atzori, A. Iera and G. Morabito, The Internet of Things: A survey, computer network, vol.54, pp.2787-2805, 2014.
- Rajeev Piyare "Internet of Things: Ubiquitous Home Control and Monitoring System using Android based Smart Phone" International Journal of Internet of Things 2013, 2(1): 5-11
- Yue Li "Design of A Key Establishment Protocol for Smart Home Energy Management System" 2013Fifth International Conference on Computational Intelligence, Communication Systems and Networks
- Vinay sagar K N, Kusuma S M "Home Automation Using Internet of Things" International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
- Rosslin John Robles1 and Tai-hoon Kim1" Applications, Systems and Methods in Smart Home Technology: A Review" International Journal of Advanced Science and Technology Vol. 15, February, 2010.pp 3747.10.
- Kallakunta. Ravi Kumar, Shaik Akbar "Android Application Based Real Time Home Automation." Indian Journal of Applied Research ISSN 2249-555X.