Analisis Performa AES Untuk Sekuriti Jaringan Scada Berbasis ATMega16

  • Eka Puji Widiyanto STMIK GI MDP
Keywords: SCADA, AES, Microprocessor, Encryption, AVR

Abstract

SCADA as the backbone for modern sontrol system has been unseparated part of human daily life, from industrial system, powerline, to military system with its global and vast scope. SCADA by nature is not safe, and because of that reason there is a big security hole in every SCADA system that threatens its functionality. To overcome this, security concept must be applied to existing SCADA system in the form on data encryption. AES 128 bit is used as the encryption method on an 8 bit microprocessor AVR ATMEGA16 clocked at 11.0592MHz. Based s to encrypt 16 bytes block of data and requiremon this chip, AES executed with total time of 40 s for decryption. With this performance on an 8 bit chip architecture, using AES asm60 encryption for any field object in SCADA system is very advisable to achieve higher security level.

References

[1] Beaver et al. 2002, Key Management for SCADA [Online], Available:http://www.sandia.gov/scada/documents/013252.pdf.
[2] B. Linke, 2008, June 19, Overview of 1-Wire Technology and Its Use[Online], Available: http://www.maxim-ic.com/app-notes/index.mvp/id/1796.
[3] Dr. A. Goel and R.S. Mishra, 2009, “Remote Data Acquisition Using Wireless – SCADA System,” International Journal of Engineering, Vol. 3, No. 1, pp. 58-64,
March 15.
[4] D. Choi et al.,2009, “Advanced Key Management Architecture for Secure SCADA Communication,” IEEE Transactions on Power Delivery, Vol. 24,Nno. 3, pp.
1154-1163.
[5] IEEE Standard, 1994, Definition, Specification, and Analysis of Systems Used for Supervisory Control, Data Acquisition, and Automatic Control, IEEE.
[6] K. Stouffer et al.,2011, Guide to Industrial Control System (ICS) Security, NIST U.S. Department of Commerce, Gaithersburg.
[7] R.L. Krutz, 2005, Securing SCADA System, Wiley, Indianapolis.
[8] R.J. Robles et al., 2008, “Vulnerabilities in SCADA and Critical Infrastructure Systems,” International Journal of Future Generation Communication and
Networking, Vol. 1, No. 1, pp. 99-104.
[9] R.J. Robles and T. Kim, 2011, “Scheme to Secure Communication of SCADA Master Station and Remote HMI’s through Smart Phones,” Journal of Security
Engineering, Vol. 8, No. 3, pp. 349-358.
[10] R. Dawson et al., 2006, ” SKMA A Key Management Architecture for SCADA Systems,” Fourth Australasian Information Security Workshop, Vol. 54, pp. 138-
192.
[11] S.F. Barret, 2009, Embedded System Design with the Atmel AVR Microcontroller, Morgan & Claypool Publishers, California.
[12] S.A. Boyer, SCADA, 2009, Supervisory Control and Data Acquisition, The Instrumentation, Systems, and Automation (ISA) Society, North Carolina.
[13] T. Amaio and T. Van, 2011,“IEEE 1711-2010 Security for Legacy SCADA Protocols,” Presented at The Industrial Control Systems Joint Working Group (ICSJWG),
Long Beach, CA.
Published
2017-03-16