[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 7, Issue 2 (3-2019) ::
منادی 2019, 7(2): 30-15 Back to browse issues page
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Mohammad mehdi Ahmadian , Mehdi Shajari *
amirkabir university of technology
Abstract:   (3471 Views)
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is used in the ICSs as telemetry communication. According to achievement of these goals, we have analyzed the IEC 60870-5-104 design phase carefully and used experimental test bed to identify the security threats and vulnerabilities and characterize the technical attacks. Finally we review the design of hardening mechanisms and their challenges.
 
Keywords: Secutiy Vulnerability, Secutiy Threat, Industrial Control System Protocol, IEC 60870-5-104, SCADA
Full-Text [PDF 4236 kb]   (1006 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2018/06/11 | Accepted: 2019/07/16 | Published: 2019/08/3
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Ahmadian M M, Shajari M. IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification. منادی 2019; 7 (2) :30-15
URL: http://monadi.isc.org.ir/article-1-123-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 7, Issue 2 (3-2019) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 38 queries by YEKTAWEB 4645