Securing SCADA Energy Management System under DDos Attacks Using Token Verification Approach

Yu Sheng Yang, Shih Hsiung Lee, Wei Che Chen, Chu Sing Yang, Yuen Min Huang, Ting Wei Hou

Research output: Contribution to journalArticlepeer-review

13 Citations (Scopus)

Abstract

The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and highly interconnected network. In addition, the equipment of industrial electronic devices has experienced complete systemic integration by connecting with the SCADA network, and due to the control and monitoring advantages of SCADA, the interconnectivity and working efficiency among systems have been tremendously improved. However, it is inevitable that the SCADA system cannot be separated from the public network, which indicates that there are concerns over cyber-attacks and cyber-threats, as well as information security breaches, in the SCADA network system. According to this context, this paper proposes a module based on the token authentication service to deter attackers from performing distributed denial-of-service (DDoS) attacks. Moreover, a simulated experiment has been conducted in an energy management system in the actual field, and the experimental results have suggested that the security defense architecture proposed by this paper can effectively improve security and is compatible with real field systems.

Original languageEnglish
Article number530
JournalApplied Sciences (Switzerland)
Volume12
Issue number1
DOIs
Publication statusPublished - 2022 Jan 1

All Science Journal Classification (ASJC) codes

  • General Materials Science
  • Instrumentation
  • General Engineering
  • Process Chemistry and Technology
  • Computer Science Applications
  • Fluid Flow and Transfer Processes

Fingerprint

Dive into the research topics of 'Securing SCADA Energy Management System under DDos Attacks Using Token Verification Approach'. Together they form a unique fingerprint.

Cite this