Development the method of organizing a secure data channel in the water supply monitoring system
DOI:
https://doi.org/10.15587/2312-8372.2016.75118Keywords:
monitoring, water supply system, wireless, single-board computerAbstract
This article describes a method of securing data in water supply monitoring system. The main aim of the study is to information security that is transmitted in the system of monitoring of water supply process through wireless networks. It is necessary to find a system architecture that will provide stability to the interception of information. In this paper we propose to use the encryption algorithm based on an asymmetric public key to create a secure TCP-session between the client (data acquisition points) and the server. This method allows creating a secure data transmission channel on the Internet using only one static IP-address from the data acquisition server. Studies indicate that this method has advantages over the use of the existing operating system in the data acquisition device. The author proposes to use this method of constructing the water supply monitoring system for data exchange between the data acquisition points and the server. The research results can be used by designers of water supply systems, automation and remote control, engaged in the field of water supply.
References
- Romanov, V. O., Haleliuka, I. B., Hrusha, V. M., Cherneha, P. P. (2009). Rozpodilena systema zboru i obrobky informatsii na bazi intelektualnykh portatyvnykh pryladiv. Kompiuterni zasoby, merezhi ta systemy, 8, 64–72.
- Sidorenko, V. V., Buravchenko, K. O. (2015). Analysis of the causes pressure fluctuations in supply systems with a view to minimizing. Collection of Scientific Publications of Admiral Makarov National University of Shipbuilding, 28 (460), 113–117.
- Buravchenko, K. (2016). Research and analysis of dynamics of pump unit control process. Technology Audit And Production Reserves, 3(2(29)), 15–19. doi:10.15587/2312-8372.2016.71878
- Kozlov, A. (2008). Promyshchlennye standarty besprovodnoi peredachi dannyh. Chip News Ukraina, 7, 18–21.
- Amin, S., Litrico, X., Sastry, S., Bayen, A. M. (2013, September). Cyber Security of Water SCADA Systems – Part I: Analysis and Experimentation of Stealthy Deception Attacks. IEEE Transactions on Control Systems Technology, Vol. 21, № 5, 1963–1970. doi:10.1109/tcst.2012.2211873
- Amin, S., Litrico, X., Sastry, S. S., Bayen, A. M. (2013, September). Cyber Security of Water SCADA Systems – Part II: Attack Detection Using Enhanced Hydrodynamic Models. IEEE Transactions on Control Systems Technology, Vol. 21, № 5, 1679–1693. doi:10.1109/tcst.2012.2211874
- Hossain, M. A., Canning, J., Ast, S., Rutledge, P. J., Jamalipour, A. (2015, September 23). Early warning smartphone diagnostics for water security and analysis using real-time pH mapping. Photonic Sensors, Vol. 5, № 4, 289–297. doi:10.1007/s13320-015-0256-x
- Morris, T. H., Wei, G. (2013). Industrial control system cyber attacks. Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013. BCS, 22–29.
- Peng, Y., Chang, C. Q., Xie, F., Dai, Z. H. et al. (2012). Industrial control system cybersecurity research. Journal of Tsinghua University Science and Technology, Vol. 52, № 10, 1396–1408.
- Zheng, Y., Zheng, S. (2015, September). Cyber Security Risk Assessment for Industrial Automation Platform. 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). Institute of Electrical & Electronics Engineers (IEEE), 341–344. doi:10.1109/iih-msp.2015.58
- Pasqualetti, F., Dorfler, F., Bullo, F. (2013, November). Attack Detection and Identification in Cyber-Physical Systems. IEEE Transactions on Automatic Control, Vol. 58, № 11, 2715–2729. doi:10.1109/tac.2013.2266831
- Pasqualetti, F. (2012, September). Secure control systems: A control-theoretic approach to cyber-physical security. Santa Barbara: University of California. Available: http://www.dsi.unifi.it/users/chisci/essc/phd-Pasqualetti-sep12.pdf. Last accessed: 11.07.2016.
- Nirmal, S. A., Mudasser, A. W., Altaf, S. V. (2014, January). Location Based Industrial Monitoring & System Using 3G Wireless Technology. International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. 2, № 1. Available: http://www.ijireeice.com/upload/2014/january/IJIREEICE2D_s_sanket_LOCATION.pdf. Last accessed: 11.07.2016.
- Benedetto, S., Biglieri, E. (2002). Principles of Digital Transmission: With Wireless Applications. Springer Science & Business Media, 855. doi:10.1007/b117711
- Jonsson, J., Kaliski, B. (2003, February). Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Available: https://www.rfc-editor.org/rfc/rfc3447.txt. doi:10.17487/rfc3447
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Володимир Володимирович Сидоренко, Костянтин Олегович Буравченко
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.