Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems

Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from M...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Eko Hadiyono Riyadi, Agfianto Eko Putra, Tri Kuntoro Priyambodo
Formato: article
Lenguaje:EN
Publicado: PeerJ Inc. 2021
Materias:
RC4
Acceso en línea:https://doaj.org/article/79065179c43848e180ec06114ffc431f
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:79065179c43848e180ec06114ffc431f
record_format dspace
spelling oai:doaj.org-article:79065179c43848e180ec06114ffc431f2021-11-06T15:05:07ZImprovement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems10.7717/peerj-cs.7272376-5992https://doaj.org/article/79065179c43848e180ec06114ffc431f2021-11-01T00:00:00Zhttps://peerj.com/articles/cs-727.pdfhttps://peerj.com/articles/cs-727/https://doaj.org/toc/2376-5992Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. Methods This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. Results Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = −0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity.Eko Hadiyono RiyadiAgfianto Eko PutraTri Kuntoro PriyambodoPeerJ Inc.articleDNP3 SecurityBeaufortRC4Super encryptionPoly-alphabetic substitutionAccelerating key generationElectronic computers. Computer scienceQA75.5-76.95ENPeerJ Computer Science, Vol 7, p e727 (2021)
institution DOAJ
collection DOAJ
language EN
topic DNP3 Security
Beaufort
RC4
Super encryption
Poly-alphabetic substitution
Accelerating key generation
Electronic computers. Computer science
QA75.5-76.95
spellingShingle DNP3 Security
Beaufort
RC4
Super encryption
Poly-alphabetic substitution
Accelerating key generation
Electronic computers. Computer science
QA75.5-76.95
Eko Hadiyono Riyadi
Agfianto Eko Putra
Tri Kuntoro Priyambodo
Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
description Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. Methods This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. Results Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = −0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity.
format article
author Eko Hadiyono Riyadi
Agfianto Eko Putra
Tri Kuntoro Priyambodo
author_facet Eko Hadiyono Riyadi
Agfianto Eko Putra
Tri Kuntoro Priyambodo
author_sort Eko Hadiyono Riyadi
title Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_short Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_full Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_fullStr Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_full_unstemmed Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
title_sort improvement of nuclear facilities dnp3 protocol data transmission security using super encryption brc4 in scada systems
publisher PeerJ Inc.
publishDate 2021
url https://doaj.org/article/79065179c43848e180ec06114ffc431f
work_keys_str_mv AT ekohadiyonoriyadi improvementofnuclearfacilitiesdnp3protocoldatatransmissionsecurityusingsuperencryptionbrc4inscadasystems
AT agfiantoekoputra improvementofnuclearfacilitiesdnp3protocoldatatransmissionsecurityusingsuperencryptionbrc4inscadasystems
AT trikuntoropriyambodo improvementofnuclearfacilitiesdnp3protocoldatatransmissionsecurityusingsuperencryptionbrc4inscadasystems
_version_ 1718443675650883584