Authenticated Modbus Protocol for Critical Infrastructure Protection

Protecting a nation's critical infrastructure, notably its power grid is crucial in view of increasing threats, such as international terrorism. We focus on the security of the Modbus protocol, a de-facto protocol for distributed control systems popularly used for power plants. Specifically, we...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on power delivery 2012-07, Vol.27 (3), p.1687-1689
1. Verfasser: Phan, R. C.-W
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1689
container_issue 3
container_start_page 1687
container_title IEEE transactions on power delivery
container_volume 27
creator Phan, R. C.-W
description Protecting a nation's critical infrastructure, notably its power grid is crucial in view of increasing threats, such as international terrorism. We focus on the security of the Modbus protocol, a de-facto protocol for distributed control systems popularly used for power plants. Specifically, we analyze the security of a recently proposed authenticated Modbus protocol. We present attacks on the protocol, discuss reasons behind these phenomena, and motivate how these problems can be addressed.
doi_str_mv 10.1109/TPWRD.2012.2187122
format Article
fullrecord <record><control><sourceid>pascalfrancis_RIE</sourceid><recordid>TN_cdi_ieee_primary_6172205</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6172205</ieee_id><sourcerecordid>26603805</sourcerecordid><originalsourceid>FETCH-LOGICAL-c297t-59ab3be07985e8165c68250b6779da6dc7025b55cd39c86dea2a58fe268b3ba43</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRS0EEqXwA7DJhmXKeFK_llXLo1IRFSpiGTnORASVuLKdBX9P2qKuZnHvGekexm45TDgH87BZf74vJggcJ8i14ohnbMRNofIpgj5nI9Ba5NoodcmuYvwGgCkYGLHFrE9f1KXW2UR19urrqo_ZOvjknd9mjQ_ZPLT7eJstuybYmELvUh_oUCKXWt9ds4vGbiPd_N8x-3h63Mxf8tXb83I-W-UOjUq5MLYqKgJltCDNpXBSo4BKKmVqK2unAEUlhKsL47SsyaIVuiGUeuDstBgzPP51wccYqCl3of2x4bfkUO49lAcP5d5D-e9hgO6P0M7GYcUwoXNtPJEoJRQaxNC7O_ZaIjrFkivEIf0D1eJnjg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Authenticated Modbus Protocol for Critical Infrastructure Protection</title><source>IEEE Electronic Library (IEL)</source><creator>Phan, R. C.-W</creator><creatorcontrib>Phan, R. C.-W</creatorcontrib><description>Protecting a nation's critical infrastructure, notably its power grid is crucial in view of increasing threats, such as international terrorism. We focus on the security of the Modbus protocol, a de-facto protocol for distributed control systems popularly used for power plants. Specifically, we analyze the security of a recently proposed authenticated Modbus protocol. We present attacks on the protocol, discuss reasons behind these phenomena, and motivate how these problems can be addressed.</description><identifier>ISSN: 0885-8977</identifier><identifier>EISSN: 1937-4208</identifier><identifier>DOI: 10.1109/TPWRD.2012.2187122</identifier><identifier>CODEN: ITPDE5</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Authentication ; Coils ; Critical infrastructure protection ; distributed control systems ; Electric power plants ; Electrical engineering. Electrical power engineering ; Electrical machines ; Electrical power engineering ; Exact sciences and technology ; Miscellaneous ; modbus ; mutual authentication ; Power networks and lines ; power plants ; Protocols ; Registers ; Regulation and control ; security ; Switches ; Synchronization</subject><ispartof>IEEE transactions on power delivery, 2012-07, Vol.27 (3), p.1687-1689</ispartof><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c297t-59ab3be07985e8165c68250b6779da6dc7025b55cd39c86dea2a58fe268b3ba43</citedby><cites>FETCH-LOGICAL-c297t-59ab3be07985e8165c68250b6779da6dc7025b55cd39c86dea2a58fe268b3ba43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6172205$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6172205$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=26603805$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Phan, R. C.-W</creatorcontrib><title>Authenticated Modbus Protocol for Critical Infrastructure Protection</title><title>IEEE transactions on power delivery</title><addtitle>TPWRD</addtitle><description>Protecting a nation's critical infrastructure, notably its power grid is crucial in view of increasing threats, such as international terrorism. We focus on the security of the Modbus protocol, a de-facto protocol for distributed control systems popularly used for power plants. Specifically, we analyze the security of a recently proposed authenticated Modbus protocol. We present attacks on the protocol, discuss reasons behind these phenomena, and motivate how these problems can be addressed.</description><subject>Applied sciences</subject><subject>Authentication</subject><subject>Coils</subject><subject>Critical infrastructure protection</subject><subject>distributed control systems</subject><subject>Electric power plants</subject><subject>Electrical engineering. Electrical power engineering</subject><subject>Electrical machines</subject><subject>Electrical power engineering</subject><subject>Exact sciences and technology</subject><subject>Miscellaneous</subject><subject>modbus</subject><subject>mutual authentication</subject><subject>Power networks and lines</subject><subject>power plants</subject><subject>Protocols</subject><subject>Registers</subject><subject>Regulation and control</subject><subject>security</subject><subject>Switches</subject><subject>Synchronization</subject><issn>0885-8977</issn><issn>1937-4208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMtOwzAQRS0EEqXwA7DJhmXKeFK_llXLo1IRFSpiGTnORASVuLKdBX9P2qKuZnHvGekexm45TDgH87BZf74vJggcJ8i14ohnbMRNofIpgj5nI9Ba5NoodcmuYvwGgCkYGLHFrE9f1KXW2UR19urrqo_ZOvjknd9mjQ_ZPLT7eJstuybYmELvUh_oUCKXWt9ds4vGbiPd_N8x-3h63Mxf8tXb83I-W-UOjUq5MLYqKgJltCDNpXBSo4BKKmVqK2unAEUlhKsL47SsyaIVuiGUeuDstBgzPP51wccYqCl3of2x4bfkUO49lAcP5d5D-e9hgO6P0M7GYcUwoXNtPJEoJRQaxNC7O_ZaIjrFkivEIf0D1eJnjg</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Phan, R. C.-W</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20120701</creationdate><title>Authenticated Modbus Protocol for Critical Infrastructure Protection</title><author>Phan, R. C.-W</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c297t-59ab3be07985e8165c68250b6779da6dc7025b55cd39c86dea2a58fe268b3ba43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Applied sciences</topic><topic>Authentication</topic><topic>Coils</topic><topic>Critical infrastructure protection</topic><topic>distributed control systems</topic><topic>Electric power plants</topic><topic>Electrical engineering. Electrical power engineering</topic><topic>Electrical machines</topic><topic>Electrical power engineering</topic><topic>Exact sciences and technology</topic><topic>Miscellaneous</topic><topic>modbus</topic><topic>mutual authentication</topic><topic>Power networks and lines</topic><topic>power plants</topic><topic>Protocols</topic><topic>Registers</topic><topic>Regulation and control</topic><topic>security</topic><topic>Switches</topic><topic>Synchronization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Phan, R. C.-W</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>IEEE transactions on power delivery</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Phan, R. C.-W</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authenticated Modbus Protocol for Critical Infrastructure Protection</atitle><jtitle>IEEE transactions on power delivery</jtitle><stitle>TPWRD</stitle><date>2012-07-01</date><risdate>2012</risdate><volume>27</volume><issue>3</issue><spage>1687</spage><epage>1689</epage><pages>1687-1689</pages><issn>0885-8977</issn><eissn>1937-4208</eissn><coden>ITPDE5</coden><abstract>Protecting a nation's critical infrastructure, notably its power grid is crucial in view of increasing threats, such as international terrorism. We focus on the security of the Modbus protocol, a de-facto protocol for distributed control systems popularly used for power plants. Specifically, we analyze the security of a recently proposed authenticated Modbus protocol. We present attacks on the protocol, discuss reasons behind these phenomena, and motivate how these problems can be addressed.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TPWRD.2012.2187122</doi><tpages>3</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0885-8977
ispartof IEEE transactions on power delivery, 2012-07, Vol.27 (3), p.1687-1689
issn 0885-8977
1937-4208
language eng
recordid cdi_ieee_primary_6172205
source IEEE Electronic Library (IEL)
subjects Applied sciences
Authentication
Coils
Critical infrastructure protection
distributed control systems
Electric power plants
Electrical engineering. Electrical power engineering
Electrical machines
Electrical power engineering
Exact sciences and technology
Miscellaneous
modbus
mutual authentication
Power networks and lines
power plants
Protocols
Registers
Regulation and control
security
Switches
Synchronization
title Authenticated Modbus Protocol for Critical Infrastructure Protection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T06%3A06%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authenticated%20Modbus%20Protocol%20for%20Critical%20Infrastructure%20Protection&rft.jtitle=IEEE%20transactions%20on%20power%20delivery&rft.au=Phan,%20R.%20C.-W&rft.date=2012-07-01&rft.volume=27&rft.issue=3&rft.spage=1687&rft.epage=1689&rft.pages=1687-1689&rft.issn=0885-8977&rft.eissn=1937-4208&rft.coden=ITPDE5&rft_id=info:doi/10.1109/TPWRD.2012.2187122&rft_dat=%3Cpascalfrancis_RIE%3E26603805%3C/pascalfrancis_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6172205&rfr_iscdi=true