DOI QR코드

DOI QR Code

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi (JINI Co., Ltd) ;
  • Lee, Malrey (Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University)
  • Received : 2015.12.12
  • Accepted : 2016.01.10
  • Published : 2016.02.29

Abstract

These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

Keywords

References

  1. Stouffer, J. Falco, K.Kent, "Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security," Recommendations of the National Institute of Standards and Technology, 2006
  2. H.Chae, Shahzad. A, M.Irfan, H.Lee, M.Lee, "Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements," Advanced Science and Technology Letters Vol.95 (CIA 2015), pp.144-148, http://dx.doi.org/10.14257/astl.2015.95.27
  3. S. Musa, A. Shahzad, A.Aborujilah, "Secure security model implementation for security services and related attacks base on end- To-end, application layer and data link layer security," Proceeding ICUIMC '2013 Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013, doi: 10.1145/2448556.2448588
  4. Aamir Shahzad, Kalum Priyanath Udagepola, Young-keun Lee, Soojin Park, and Malrey Lee, "The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission," International Journal of Distributed Sensor Networks, Article ID 738687..
  5. Sugwon Hong; Myongho Lee, "Challenges and Direction toward Secure Communication in the SCADA System," Communication Networks and Services Research Conference (CNSR), 2010 doi:10.1109/CNSR.2010.52
  6. A. Shahzad, S. Musa, M. Irfan, "N-Secure Cryptography Solution for SCADA Security Enhancement," Trends in Applied Sciences Research, 2014, 9: 381-395 doi:10.3923/tasr.2014.381.395
  7. HyungJun Kim, "Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2012, Article ID 268478, pp.10
  8. Shahzad, A.; Lee, M.; Lee, Y.-K.; Kim, S.; Xiong, N.; Choi, J.-Y.; Cho, Y. "Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information," Symmetry, 2015, 7, 1176-1210 https://doi.org/10.3390/sym7031176