Design and implementation of a secure Modbus protocol

124Citations
Citations of this article
114Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead. © IFIP International Federation for Information Processing 2009.

Author supplied keywords

Cite

CITATION STYLE

APA

Fovino, I. N., Carcano, A., Masera, M., & Trom-Betta, A. (2009). Design and implementation of a secure Modbus protocol. In IFIP Advances in Information and Communication Technology (Vol. 311, pp. 83–96). Springer New York LLC. https://doi.org/10.1007/978-3-642-04798-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free