:: Volume 7, Issue 2 (8-2019) ::
3 2019, 7(2): 30-15 Back to browse issues page
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Mohammad mehdi Ahmadian Mr, Mehdi Shajari Dr
amirkabir university of technology
Abstract:   (200 Views)
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is used in the ICSs as telemetry communication. According to achievement of these goals, we have analyzed the IEC 60870-5-104 design phase carefully and used experimental test bed to identify the security threats and vulnerabilities and characterize the technical attacks. Finally we review the design of hardening mechanisms and their challenges.
 
Keywords: Secutiy Vulnerability, Secutiy Threat, Industrial Control System Protocol, IEC 60870-5-104, SCADA
Full-Text [PDF 4236 kb]   (54 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2018/06/11 | Accepted: 2019/07/16 | Published: 2019/08/3


XML   Persian Abstract   Print



Volume 7, Issue 2 (8-2019) Back to browse issues page