Title: Ontology and protocol secure for SCADA

Authors: Sahli Nabil; Benmohammed Mohamed; El-Bay Bourennane

Addresses: GRTG Gas Factory - SONELGAZ Group Algeria, Algeria; (LIRE) Distributed Computer Science Laboratory, University of Constantine 2, P.O. Box 325, City Ain El Bey 25017 Constantine, Algeria ' GRTG Gas Factory - SONELGAZ Group Algeria, Algeria; (LIRE) Distributed Computer Science Laboratory, University of Constantine 2, P.O. Box 325, City Ain El Bey 25017 Constantine, Algeria ' LE2I Laboratory, University of Burgundy, BP 47870, 21078 Dijon Cedex, France

Abstract: In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption technology developed specifically for low latency embedded applications. We integrated security mechanisms in specific SCADA protocols as Modbus. Moreover, we made use of the WS-Security framework and we crypt and signed all the improved security protocols frames with our mixed (ECC) and a hash function.

Keywords: control systems; semantic security block; security ontology; ECC cryptography; Modbus protocol; SOAP protocol; cyber security; vulnerabilities; semantic attacks; SCADA; supervisory control; data acquisition; encryption technology; low latency; embedded applications; security protocols.

DOI: 10.1504/IJMSO.2014.060321

International Journal of Metadata, Semantics and Ontologies, 2014 Vol.9 No.2, pp.114 - 127

Received: 19 Aug 2012
Accepted: 02 Aug 2013

Published online: 10 Apr 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article