Title: Cyber security for wireless semantic (SCADA/DCS) systems

Authors: Sahli Nabil; El-Bay Bourennane; Mohamed Benmohammed

Addresses: GRTG – SONELGAZ Group Algeria, INSAT University of 7 November Cartage Tunis, Tunisia; LE2I Laboratory, University of Burgundy, BP 47870, 21078 Dijon cedex, France; LIRE Distributed Computer Science Laboratory, Constantine 2 University, Algeria ' GRTG – SONELGAZ Group Algeria, INSAT University of 7 November Cartage Tunis, Tunisia; LE2I Laboratory, University of Burgundy, BP 47870, 21078 Dijon cedex, France; LIRE Distributed Computer Science Laboratory, Constantine 2 University, Algeria ' GRTG – SONELGAZ Group Algeria, INSAT University of 7 November Cartage Tunis, Tunisia; LE2I Laboratory, University of Burgundy, BP 47870, 21078 Dijon cedex, France; LIRE Distributed Computer Science Laboratory, Constantine 2 University, Algeria

Abstract: Supervisory control and data acquisition and distributed control systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real-time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between wireless ZIGBEE protocol, SOAP protocol and the integration of our security mechanism, in the global message header obtained by the fusion between ZIGBEE message and SOAP message.

Keywords: wireless security protocols; semantic cyber security; semantic wireless systems; supervisory control; data acquisition; distributed control systems; SCADA; DCS; ZIGBEE; SOAP; smart energetic platforms; semantic attacks.

DOI: 10.1504/IJSCC.2016.079399

International Journal of Systems, Control and Communications, 2016 Vol.7 No.4, pp.307 - 320

Received: 15 Jul 2014
Accepted: 04 Nov 2014

Published online: 28 Sep 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article