Development the method of organizing a secure data channel in the water supply monitoring system

Authors

DOI:

https://doi.org/10.15587/2312-8372.2016.75118

Keywords:

monitoring, water supply system, wireless, single-board computer

Abstract

This article describes a method of securing data in water supply monitoring system. The main aim of the study is to information security that is transmitted in the system of monitoring of water supply process through wireless networks. It is necessary to find a system architecture that will provide stability to the interception of information. In this paper we propose to use the encryption algorithm based on an asymmetric public key to create a secure TCP-session between the client (data acquisition points) and the server. This method allows creating a secure data transmission channel on the Internet using only one static IP-address from the data acquisition server. Studies indicate that this method has advantages over the use of the existing operating system in the data acquisition device. The author proposes to use this method of constructing the water supply monitoring system for data exchange between the data acquisition points and the server. The research results can be used by designers of water supply systems, automation and remote control, engaged in the field of water supply.

Author Biographies

Володимир Володимирович Сидоренко, Kirovohrad National Technical University, ave. Universytetsky 8, Kirovohrad, 25006

Doctor of Technical Sciences, Professor

Department of Programming and Information Protection

Костянтин Олегович Буравченко, Kirovohrad National Technical University, ave. Universytetsky 8, Kirovohrad, 25006

Assistant

Department of Programming and Information Protection

References

  1. Romanov, V. O., Haleliuka, I. B., Hrusha, V. M., Cherneha, P. P. (2009). Rozpodilena systema zboru i obrobky informatsii na bazi intelektualnykh portatyvnykh pryladiv. Kompiuterni zasoby, merezhi ta systemy, 8, 64–72.
  2. Sidorenko, V. V., Buravchenko, K. O. (2015). Analysis of the causes pressure fluctuations in supply systems with a view to minimizing. Collection of Scientific Publications of Admiral Makarov National University of Shipbuilding, 28 (460), 113–117.
  3. Buravchenko, K. (2016). Research and analysis of dynamics of pump unit control process. Technology Audit And Production Reserves, 3(2(29)), 15–19. doi:10.15587/2312-8372.2016.71878
  4. Kozlov, A. (2008). Promyshchlennye standarty besprovodnoi peredachi dannyh. Chip News Ukraina, 7, 18–21.
  5. Amin, S., Litrico, X., Sastry, S., Bayen, A. M. (2013, September). Cyber Security of Water SCADA Systems – Part I: Analysis and Experimentation of Stealthy Deception Attacks. IEEE Transactions on Control Systems Technology, Vol. 21, № 5, 1963–1970. doi:10.1109/tcst.2012.2211873
  6. Amin, S., Litrico, X., Sastry, S. S., Bayen, A. M. (2013, September). Cyber Security of Water SCADA Systems – Part II: Attack Detection Using Enhanced Hydrodynamic Models. IEEE Transactions on Control Systems Technology, Vol. 21, № 5, 1679–1693. doi:10.1109/tcst.2012.2211874
  7. Hossain, M. A., Canning, J., Ast, S., Rutledge, P. J., Jamalipour, A. (2015, September 23). Early warning smartphone diagnostics for water security and analysis using real-time pH mapping. Photonic Sensors, Vol. 5, № 4, 289–297. doi:10.1007/s13320-015-0256-x
  8. Morris, T. H., Wei, G. (2013). Industrial control system cyber attacks. Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013. BCS, 22–29.
  9. Peng, Y., Chang, C. Q., Xie, F., Dai, Z. H. et al. (2012). Industrial control system cybersecurity research. Journal of Tsinghua University Science and Technology, Vol. 52, № 10, 1396–1408.
  10. Zheng, Y., Zheng, S. (2015, September). Cyber Security Risk Assessment for Industrial Automation Platform. 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). Institute of Electrical & Electronics Engineers (IEEE), 341–344. doi:10.1109/iih-msp.2015.58
  11. Pasqualetti, F., Dorfler, F., Bullo, F. (2013, November). Attack Detection and Identification in Cyber-Physical Systems. IEEE Transactions on Automatic Control, Vol. 58, № 11, 2715–2729. doi:10.1109/tac.2013.2266831
  12. Pasqualetti, F. (2012, September). Secure control systems: A control-theoretic approach to cyber-physical security. Santa Barbara: University of California. Available: http://www.dsi.unifi.it/users/chisci/essc/phd-Pasqualetti-sep12.pdf. Last accessed: 11.07.2016.
  13. Nirmal, S. A., Mudasser, A. W., Altaf, S. V. (2014, January). Location Based Industrial Monitoring & System Using 3G Wireless Technology. International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. 2, № 1. Available: http://www.ijireeice.com/upload/2014/january/IJIREEICE2D_s_sanket_LOCATION.pdf. Last accessed: 11.07.2016.
  14. Benedetto, S., Biglieri, E. (2002). Principles of Digital Transmission: With Wireless Applications. Springer Science & Business Media, 855. doi:10.1007/b117711
  15. Jonsson, J., Kaliski, B. (2003, February). Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Available: https://www.rfc-editor.org/rfc/rfc3447.txt. doi:10.17487/rfc3447

Published

2016-07-26

How to Cite

Сидоренко, В. В., & Буравченко, К. О. (2016). Development the method of organizing a secure data channel in the water supply monitoring system. Technology Audit and Production Reserves, 4(3(30), 9–12. https://doi.org/10.15587/2312-8372.2016.75118