SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1548
SCADA Systems: Vulnerabilities and Blockchain Technology
Diksha Chhonkar, Garima Pandey
Student, Department of CSE, Dronacharya College of Engineering, Gurgaon, Haryana, India
ABSTRACT
SCADA systems are one of the most important part of industrial operations.
Before SCADA, plant personnel had to monitor and control industrial process
via selector switches, pushbuttons and dials for analog signals. As
manufacturing grew and sites became more remote, relays and timers were
used to assist supervision. With theonsetoftechnologyandadventofnetwork
based protocols, these systems became more reliable, fast and it became easy
to troubleshoot problems. Indeed progress also brings vulnerabilities, which
was no new for SCADA. The IP protocols broughtthreatto thesecurityofthese
systems. The devastation that cyber predators on SCADA can inflict, could be
illustrated by the Stuxnet virus attack. This paper discusses what SCADA
systems are, their uses, protocols being used by these systems, vulnerabilities
and ways to combat those vulnerabilities. It focusses on the use of Blockchain
Technology as a step in security of such systems.
KEYWORDS: SCADA systems, Vulnerabilities, blockchain technology,
decentralization
How to cite this paper: Diksha Chhonkar
| Garima Pandey "SCADA Systems:
Vulnerabilities and Blockchain
Technology"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-4 | Issue-4,
June 2020, pp.1548-1550, URL:
www.ijtsrd.com/papers/ijtsrd31586.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
Introduction to SCADA Systems:
SCADA stands for Supervisory Control and Data Acquisition.
It is a collection of both software and hardware components
that allow supervision and control ofproduction plants,both
locally and remotely and is used to gather real time data. It
consists of HMIs (Human Machine interaction) which
facilitates interaction with field devices such as pumps,
valves, motors, sensors etc.SCADAsoftwareusuallylinksthe
databases and HMIs. The structural design of a standard
SCADA system starts with RTUs (Remote terminal Units) or
PLCs (Programmable Logic Controllers). RTUs and PLCs are
microprocessors which communicate with field devicesand
HMIs. The data from RTUs and PLCs is then routedtoSCADA
computers where software interprets and displays the data
to operators for analysing and reacting to system events.
Before SCADA, monitoring and control was the task of plant
personnel. In 1960s, with the growth of manufacturing,
telemetry came on the scene to offer automated
communication. In 1970s, the term SCADA was coined for
standalone units with PLCS and microprocessors without
networking. Later in 1990’s and 2000’s SCADA system
started to implement open system architectures with
communication protocols allowing real time plant
information to be accessed anywhere around the world.
With SQL, data history can be logged and used in trending
applications and record keeping. On HMI and end user
computer, graphical representation of operations exist for
operator interactions. Data may be analysed and used to
enhance plant production and troubleshoot problems.
Uses of SCADA Systems:
The sesystems are used in industrial organisations such as
Oil and Gas refining and transportation, telecommunication,
water and waste control etc. as they help in maintaining
efficiency, processing data for smarter action. SCADA
systems are used for generation, distribution and
transmission of electric power enabling detection ofcurrent
flow and line voltage. These systemsaresuccessfullyusedby
manufacturing units for regulation of industrial automation,
for monitoring the process and controlling the quality of it.
SCADA is also used to automate, monitor and control all the
function related to railway trains and trolleybuses. Waste
water and sewage utilities use these systems to monitorand
control the water pump station. SCADA is also used by
offices and building environments, thermal station and
power plants and industries like forestry, pulp and paper
industries.
Protocols used in SCADA Systems:
Protocols allow SCADA/ RTU units to communicate with
each other. Protocol and communication parametersshould
match between connectingdevices.Therearemorethan 200
such application layer protocols like Modbus, Allen Bradley
DF1, Omron, SiemensandMitsubishietc.These protocolsare
now used as virtual standards in modern SCADA systems.
Modbus is a communication protocol given by Modicon
Systems in 1979 used for transmitting information over
serial lines between electronic devices. Three main
variations of Modbus protocol include Modbus ASCII,
Modbus RTUandModbusTCP.DistributedNetwork protocol
(DNP) is a member restricted protocol. It has gone through
various iterations. Modbus X is an adoption which
overcomes the Modbus limitations by allowing positive and
negative numbers up to 9 digits making it legible.Ethernetis
IJTSRD31586
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1549
a packet oriented protocol. The packets are generated
irrespective of the incoming data protocols. TCP/IP
networks have the same packet characteristics as Ethernet
and frame relay network.It mustestablishconnectionbefore
transferring data as it is connection oriented. Once the
connection is established, the server then responds to the
queries from the client until the client closes the connection.
Vulnerabilities of a SCADA System:
Many Vulnerabilities can pose as a threat for such systems
like hackers, security-unaware employees, Malware,Lack of
Software and Hardware maintenance. Critical infrastructure
threats include equipment failure, terrorist attacks,
accidents, crimes and natural disasters. These may be
reasons for failure of such systems. Hence these systems
need to be made robust and should be maintained on a
timely basis. Apart from Hardware loses and attacks, the
more vulnerable part is the software as the hackers and
other cyber predators are onestepahead.Accordingtoa risk
report, around 60 % of such sites aren’t using anti-virus
protections throwing a risk of updating signatures
automatically. Around 70% sites use easily crack able
passwords which could lead to denial of service,
manipulation and data interception.
There may be hackers who gain access to the SCADA
network may make some unauthorized changes to
instructions and commands by compromising the servers.
This could be an act of outsider or insider where different
information to operators and control systems could be
presented. Majority of SCADA network have MasterStations
which can control the systems and if these stations are not
protected by firewalls, antivirus or other methods can lead
to undesirable conditions. Equipment protection systems
could be messed up and can lead to destruction in costlyand
irreplaceable equipment. Interferenceinsafetysystemcanal
so endanger human life.
Combating SCADA Vulnerabilities:
With the usage of client–server basedprotocols,theproblem
of security of the network is encountered. The prominent
challenge is to restrict the unauthorized access. Then comes
the question of enhancing security inside the SCADA
network and to develop security monitoring tools. Focus
should also be diverted to cryptography and key
management along with the device and operating system
security management. There is very little emphasis on
standard security methods like encryption and
authentication. A robust protection strategy is the need of
the hour for such systems. It is high time to realize the
importance of implementing security programs. Some
strategic steps may include removing of unnecessary
functionalities and mapping ofcurrentsystemsandknowing
all points of entry and exit which pose as threats are much
easier to monitor. Secondly, early detection of potential
attacks can limit the amount of damage done. Constant
security checks and risk assessments should be conducted
timely. Many techniques like encryption and firewalls can
protect such systems.Clevertechniqueslike“honeypots”can
deal in some manner to counteract unauthorized access
attempts. As many SCADA Systems use master control
systems which become an easy prey for the cyber predators
to attack. These systems can also be decentralizedandmade
more reliable and safe.
Blockchain: A solution for cyber threats
One way to make SCADA secure is by making t h e s y s t e m
decentralised because decentralisation will reduce
dependence on a particular master station for controlling
and monitoring operations. Blockchain is a distributed
database which maintains records of all device transactions
data on a SCADA blockchain network. Basically, blockchain
comprises of two words where block means digital
information and chain means storageinpublicdatabase. The
blocks have three main parts of information that is
information about transaction for example duration and
amount of purchase from any e-commerce site. Secondly, it
contains information about end user who is participating in
transaction and also the information to differentiate it from
other blocks. The data is stored in blocks forming a linear
sequence where each block references the hash of the
previous block. A hash is a unique ID of a block. Anybody
who tries to temper with the hash needs to change all the
hashes of successive blocks which makes it a tedious task
and therefore the data becomes temper proof. The working
of this technology combines three leading technologies that
are cryptographic keys which could be private as well as
public, a peer-to-peer network containing a shared ledger
and a machine which is used tostoretransactionandrecords
of the network. The cryptographic keys produce a secure
digital reference and play an important role in successful
transaction between two partiesremovingtheneedforthird
party. This secure identity is called digital signature in case
of crypto currency. The digital signature is combined with
peer-to-peer network where large amount of individualsact
as authors and transactions are carried out efficiently.
Advantage of the Blockchain is the greater throughputofthe
database technology,fasterdata Communicationtechnology,
efficient consensus mechanism to make sure the security of
SCADA. These transactionsdata aretimestampedandcanbe
checked whether the sender’s data and the receiver’s is
validated. Also blockchain use efficient consensus
mechanisms and algorithms which ensures that legitimate
transactions are added and synchronizes and audits them.
These consensus protocols are necessary for correct
functioning of blockchains. Some of these mechanisms are
Proof of Work (POW), Proof of stake (POS), Proof of capacity
(POC) and Proof of Elapsed Time (POET) etc. POW is also
known as mining and requires solving of complex and
asymmetric mathematical puzzles. These puzzles aresolved
on a hit and trial basis and depends upon good
computational power. The difficulty of the puzzles depends
upon how fast the blocks are mined. POS is a randomized
process in which producer of next block is determined. This
method is energy efficient and validators actually maintain
the network as they hold the coins of blockchain they are
validating on. In a delegated proof of stake methoduserscan
vote for a particular delegate. A person or organisation that
wishes to add blocks to a network refers to a delegate. This
method is also called digital democracy. POC is another
method which uses plotting whoever having the fastest
solution of puzzle creates a new block. POET is a protocol in
which assignment of random wait time to each node isdone.
Hence blockchainhasverycrucial featuresliketransparency,
encryption and accountability. This means that no single
node or group of nodes can take up majority of the set and
no one can change entire SCADA network software system
without the majority of theentirenetwork ofusersaccepting
the change, thus ensuring no harm to the system.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1550
Conclusion:
Use of network protocols in SCADA systems make them
vulnerable to cyber attacks. Hence a robust protection
strategy is the need of the hour. Blockchaintechnologybeing
a distributed, encrypted and secure mechanism can be used
to ensure security of the system. As blockchain use
consensus mechanism to add new transactions, it wouldnot
be easy for attackers to change data and present wrong logs
thus reducing risks of scada systems.
References:
[1] John D. McDonald and Mini S. Thomas: Power System
SCADA and Smart Grids, 2015.
[2] Ronald L Krutz: Securing SCADA systems, 2005.
[3] http://www.bayshorenetworks.com
[4] Daniel Drescher: Blockchain Basics: A Non-Technical
Introduction in 25 Steps, 2017.
[5] www.hackernoon.com

More Related Content

What's hot

A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
Nischal Lal Shrestha
 
Project report for railway security monotorin system
Project report for railway security monotorin systemProject report for railway security monotorin system
Project report for railway security monotorin system
ASWATHY VG
 
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Mohammad Karim Shahbaz
 
iPARK: Intelligent Parking System based on IoT & AI
iPARK: Intelligent Parking System based on IoT & AIiPARK: Intelligent Parking System based on IoT & AI
iPARK: Intelligent Parking System based on IoT & AI
Mithileysh Sathiyanarayanan
 
ppt
pptppt
on line feedback system
on line feedback systemon line feedback system
on line feedback system
sathish sak
 
Hyperloops
HyperloopsHyperloops
Hyperloops
Rahul Kumar
 
Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPT
Nagaraj Kandoor
 
osy microproject[1].pdf
osy microproject[1].pdfosy microproject[1].pdf
osy microproject[1].pdf
RenuDeshmukh5
 
Report of PILL CAMERA
Report of PILL CAMERAReport of PILL CAMERA
Report of PILL CAMERA
razaemohammed
 
Student Management System
Student Management SystemStudent Management System
Student Management System
HamaQarani
 
Automatic railway track crack detector
Automatic railway track crack detectorAutomatic railway track crack detector
Automatic railway track crack detector
AJEET VERMA
 
Hyperloop seminar reports
Hyperloop seminar reportsHyperloop seminar reports
Hyperloop seminar reports
shaik maheboob sab
 
RAILWAY TRACK GEOMETRY SURVEYING SYSTEM
RAILWAY TRACK GEOMETRY SURVEYING SYSTEMRAILWAY TRACK GEOMETRY SURVEYING SYSTEM
RAILWAY TRACK GEOMETRY SURVEYING SYSTEM
rajesharayankara
 
Employee Tracking System
Employee Tracking SystemEmployee Tracking System
Employee Tracking System
Kiran Girase
 
Asp.net difference faqs- 9
Asp.net difference faqs- 9Asp.net difference faqs- 9
Asp.net difference faqs- 9
Umar Ali
 
innovative railway track surveying with sensors and controlled by wireless co...
innovative railway track surveying with sensors and controlled by wireless co...innovative railway track surveying with sensors and controlled by wireless co...
innovative railway track surveying with sensors and controlled by wireless co...
kalaimathi mathiyazhagan
 
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEMEYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
International Journal of Technical Research & Application
 
ERP ( College Management System)
ERP ( College Management System)ERP ( College Management System)
ERP ( College Management System)
Pranav Jha
 
SMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOTSMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOT
Saipandu143
 

What's hot (20)

A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
 
Project report for railway security monotorin system
Project report for railway security monotorin systemProject report for railway security monotorin system
Project report for railway security monotorin system
 
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
 
iPARK: Intelligent Parking System based on IoT & AI
iPARK: Intelligent Parking System based on IoT & AIiPARK: Intelligent Parking System based on IoT & AI
iPARK: Intelligent Parking System based on IoT & AI
 
ppt
pptppt
ppt
 
on line feedback system
on line feedback systemon line feedback system
on line feedback system
 
Hyperloops
HyperloopsHyperloops
Hyperloops
 
Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPT
 
osy microproject[1].pdf
osy microproject[1].pdfosy microproject[1].pdf
osy microproject[1].pdf
 
Report of PILL CAMERA
Report of PILL CAMERAReport of PILL CAMERA
Report of PILL CAMERA
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
Automatic railway track crack detector
Automatic railway track crack detectorAutomatic railway track crack detector
Automatic railway track crack detector
 
Hyperloop seminar reports
Hyperloop seminar reportsHyperloop seminar reports
Hyperloop seminar reports
 
RAILWAY TRACK GEOMETRY SURVEYING SYSTEM
RAILWAY TRACK GEOMETRY SURVEYING SYSTEMRAILWAY TRACK GEOMETRY SURVEYING SYSTEM
RAILWAY TRACK GEOMETRY SURVEYING SYSTEM
 
Employee Tracking System
Employee Tracking SystemEmployee Tracking System
Employee Tracking System
 
Asp.net difference faqs- 9
Asp.net difference faqs- 9Asp.net difference faqs- 9
Asp.net difference faqs- 9
 
innovative railway track surveying with sensors and controlled by wireless co...
innovative railway track surveying with sensors and controlled by wireless co...innovative railway track surveying with sensors and controlled by wireless co...
innovative railway track surveying with sensors and controlled by wireless co...
 
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEMEYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
EYE TRACKING BASED DRIVER DROWSINESS MONITORING AND WARNING SYSTEM
 
ERP ( College Management System)
ERP ( College Management System)ERP ( College Management System)
ERP ( College Management System)
 
SMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOTSMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOT
 

Similar to SCADA Systems Vulnerabilities and Blockchain Technology

IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
IJSRED
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
Uchi Pou
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
aswanthmrajeev112
 
SCADA The Universal Remote for Industrial Control.pptx
SCADA The Universal Remote for Industrial Control.pptxSCADA The Universal Remote for Industrial Control.pptx
SCADA The Universal Remote for Industrial Control.pptx
AnujMarskole
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
IJARIIT
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
bhavuksharma10
 
SCADA
SCADASCADA
SCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdfSCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdf
ebrahimbadushata00
 
Scada slide
Scada slideScada slide
Scada slide
Towfiqur Rahman
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
David Blanco
 
All about scada
All about scadaAll about scada
All about scada
Stella Hermias
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
Embitel Technologies (I) PVT LTD
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
ssuser1831ba
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
csandit
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
RapidAcademy
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
Yehia Mamdouh
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
NiMa Bagheriasl
 
Scada pdf
Scada pdfScada pdf
Scada pdf
Vidya Sisale
 
Scada & hmi
Scada & hmiScada & hmi
Scada & hmi
munishgargg
 
What is SCADA
What is SCADAWhat is SCADA
What is SCADA
tenderboyfriend96
 

Similar to SCADA Systems Vulnerabilities and Blockchain Technology (20)

IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
SCADA The Universal Remote for Industrial Control.pptx
SCADA The Universal Remote for Industrial Control.pptxSCADA The Universal Remote for Industrial Control.pptx
SCADA The Universal Remote for Industrial Control.pptx
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
 
SCADA
SCADASCADA
SCADA
 
SCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdfSCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdf
 
Scada slide
Scada slideScada slide
Scada slide
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
All about scada
All about scadaAll about scada
All about scada
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
 
Scada pdf
Scada pdfScada pdf
Scada pdf
 
Scada & hmi
Scada & hmiScada & hmi
Scada & hmi
 
What is SCADA
What is SCADAWhat is SCADA
What is SCADA
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
lakitawilson
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
siemaillard
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Liyana Rozaini
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
MichelleDeLaCruz93
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
Celine George
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
bipin95
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
SrimanigandanMadurai
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
Celine George
 
How to Install Theme in the Odoo 17 ERP
How to  Install Theme in the Odoo 17 ERPHow to  Install Theme in the Odoo 17 ERP
How to Install Theme in the Odoo 17 ERP
Celine George
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
Celine George
 
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesArdra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Astro Pathshala
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
Celine George
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
shimeathdelrosario1
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
Celine George
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
Celine George
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Neny Isharyanti
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
 
How to Install Theme in the Odoo 17 ERP
How to  Install Theme in the Odoo 17 ERPHow to  Install Theme in the Odoo 17 ERP
How to Install Theme in the Odoo 17 ERP
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
 
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesArdra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
 

SCADA Systems Vulnerabilities and Blockchain Technology

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1548 SCADA Systems: Vulnerabilities and Blockchain Technology Diksha Chhonkar, Garima Pandey Student, Department of CSE, Dronacharya College of Engineering, Gurgaon, Haryana, India ABSTRACT SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With theonsetoftechnologyandadventofnetwork based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols broughtthreatto thesecurityofthese systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. KEYWORDS: SCADA systems, Vulnerabilities, blockchain technology, decentralization How to cite this paper: Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4, June 2020, pp.1548-1550, URL: www.ijtsrd.com/papers/ijtsrd31586.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) Introduction to SCADA Systems: SCADA stands for Supervisory Control and Data Acquisition. It is a collection of both software and hardware components that allow supervision and control ofproduction plants,both locally and remotely and is used to gather real time data. It consists of HMIs (Human Machine interaction) which facilitates interaction with field devices such as pumps, valves, motors, sensors etc.SCADAsoftwareusuallylinksthe databases and HMIs. The structural design of a standard SCADA system starts with RTUs (Remote terminal Units) or PLCs (Programmable Logic Controllers). RTUs and PLCs are microprocessors which communicate with field devicesand HMIs. The data from RTUs and PLCs is then routedtoSCADA computers where software interprets and displays the data to operators for analysing and reacting to system events. Before SCADA, monitoring and control was the task of plant personnel. In 1960s, with the growth of manufacturing, telemetry came on the scene to offer automated communication. In 1970s, the term SCADA was coined for standalone units with PLCS and microprocessors without networking. Later in 1990’s and 2000’s SCADA system started to implement open system architectures with communication protocols allowing real time plant information to be accessed anywhere around the world. With SQL, data history can be logged and used in trending applications and record keeping. On HMI and end user computer, graphical representation of operations exist for operator interactions. Data may be analysed and used to enhance plant production and troubleshoot problems. Uses of SCADA Systems: The sesystems are used in industrial organisations such as Oil and Gas refining and transportation, telecommunication, water and waste control etc. as they help in maintaining efficiency, processing data for smarter action. SCADA systems are used for generation, distribution and transmission of electric power enabling detection ofcurrent flow and line voltage. These systemsaresuccessfullyusedby manufacturing units for regulation of industrial automation, for monitoring the process and controlling the quality of it. SCADA is also used to automate, monitor and control all the function related to railway trains and trolleybuses. Waste water and sewage utilities use these systems to monitorand control the water pump station. SCADA is also used by offices and building environments, thermal station and power plants and industries like forestry, pulp and paper industries. Protocols used in SCADA Systems: Protocols allow SCADA/ RTU units to communicate with each other. Protocol and communication parametersshould match between connectingdevices.Therearemorethan 200 such application layer protocols like Modbus, Allen Bradley DF1, Omron, SiemensandMitsubishietc.These protocolsare now used as virtual standards in modern SCADA systems. Modbus is a communication protocol given by Modicon Systems in 1979 used for transmitting information over serial lines between electronic devices. Three main variations of Modbus protocol include Modbus ASCII, Modbus RTUandModbusTCP.DistributedNetwork protocol (DNP) is a member restricted protocol. It has gone through various iterations. Modbus X is an adoption which overcomes the Modbus limitations by allowing positive and negative numbers up to 9 digits making it legible.Ethernetis IJTSRD31586
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1549 a packet oriented protocol. The packets are generated irrespective of the incoming data protocols. TCP/IP networks have the same packet characteristics as Ethernet and frame relay network.It mustestablishconnectionbefore transferring data as it is connection oriented. Once the connection is established, the server then responds to the queries from the client until the client closes the connection. Vulnerabilities of a SCADA System: Many Vulnerabilities can pose as a threat for such systems like hackers, security-unaware employees, Malware,Lack of Software and Hardware maintenance. Critical infrastructure threats include equipment failure, terrorist attacks, accidents, crimes and natural disasters. These may be reasons for failure of such systems. Hence these systems need to be made robust and should be maintained on a timely basis. Apart from Hardware loses and attacks, the more vulnerable part is the software as the hackers and other cyber predators are onestepahead.Accordingtoa risk report, around 60 % of such sites aren’t using anti-virus protections throwing a risk of updating signatures automatically. Around 70% sites use easily crack able passwords which could lead to denial of service, manipulation and data interception. There may be hackers who gain access to the SCADA network may make some unauthorized changes to instructions and commands by compromising the servers. This could be an act of outsider or insider where different information to operators and control systems could be presented. Majority of SCADA network have MasterStations which can control the systems and if these stations are not protected by firewalls, antivirus or other methods can lead to undesirable conditions. Equipment protection systems could be messed up and can lead to destruction in costlyand irreplaceable equipment. Interferenceinsafetysystemcanal so endanger human life. Combating SCADA Vulnerabilities: With the usage of client–server basedprotocols,theproblem of security of the network is encountered. The prominent challenge is to restrict the unauthorized access. Then comes the question of enhancing security inside the SCADA network and to develop security monitoring tools. Focus should also be diverted to cryptography and key management along with the device and operating system security management. There is very little emphasis on standard security methods like encryption and authentication. A robust protection strategy is the need of the hour for such systems. It is high time to realize the importance of implementing security programs. Some strategic steps may include removing of unnecessary functionalities and mapping ofcurrentsystemsandknowing all points of entry and exit which pose as threats are much easier to monitor. Secondly, early detection of potential attacks can limit the amount of damage done. Constant security checks and risk assessments should be conducted timely. Many techniques like encryption and firewalls can protect such systems.Clevertechniqueslike“honeypots”can deal in some manner to counteract unauthorized access attempts. As many SCADA Systems use master control systems which become an easy prey for the cyber predators to attack. These systems can also be decentralizedandmade more reliable and safe. Blockchain: A solution for cyber threats One way to make SCADA secure is by making t h e s y s t e m decentralised because decentralisation will reduce dependence on a particular master station for controlling and monitoring operations. Blockchain is a distributed database which maintains records of all device transactions data on a SCADA blockchain network. Basically, blockchain comprises of two words where block means digital information and chain means storageinpublicdatabase. The blocks have three main parts of information that is information about transaction for example duration and amount of purchase from any e-commerce site. Secondly, it contains information about end user who is participating in transaction and also the information to differentiate it from other blocks. The data is stored in blocks forming a linear sequence where each block references the hash of the previous block. A hash is a unique ID of a block. Anybody who tries to temper with the hash needs to change all the hashes of successive blocks which makes it a tedious task and therefore the data becomes temper proof. The working of this technology combines three leading technologies that are cryptographic keys which could be private as well as public, a peer-to-peer network containing a shared ledger and a machine which is used tostoretransactionandrecords of the network. The cryptographic keys produce a secure digital reference and play an important role in successful transaction between two partiesremovingtheneedforthird party. This secure identity is called digital signature in case of crypto currency. The digital signature is combined with peer-to-peer network where large amount of individualsact as authors and transactions are carried out efficiently. Advantage of the Blockchain is the greater throughputofthe database technology,fasterdata Communicationtechnology, efficient consensus mechanism to make sure the security of SCADA. These transactionsdata aretimestampedandcanbe checked whether the sender’s data and the receiver’s is validated. Also blockchain use efficient consensus mechanisms and algorithms which ensures that legitimate transactions are added and synchronizes and audits them. These consensus protocols are necessary for correct functioning of blockchains. Some of these mechanisms are Proof of Work (POW), Proof of stake (POS), Proof of capacity (POC) and Proof of Elapsed Time (POET) etc. POW is also known as mining and requires solving of complex and asymmetric mathematical puzzles. These puzzles aresolved on a hit and trial basis and depends upon good computational power. The difficulty of the puzzles depends upon how fast the blocks are mined. POS is a randomized process in which producer of next block is determined. This method is energy efficient and validators actually maintain the network as they hold the coins of blockchain they are validating on. In a delegated proof of stake methoduserscan vote for a particular delegate. A person or organisation that wishes to add blocks to a network refers to a delegate. This method is also called digital democracy. POC is another method which uses plotting whoever having the fastest solution of puzzle creates a new block. POET is a protocol in which assignment of random wait time to each node isdone. Hence blockchainhasverycrucial featuresliketransparency, encryption and accountability. This means that no single node or group of nodes can take up majority of the set and no one can change entire SCADA network software system without the majority of theentirenetwork ofusersaccepting the change, thus ensuring no harm to the system.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1550 Conclusion: Use of network protocols in SCADA systems make them vulnerable to cyber attacks. Hence a robust protection strategy is the need of the hour. Blockchaintechnologybeing a distributed, encrypted and secure mechanism can be used to ensure security of the system. As blockchain use consensus mechanism to add new transactions, it wouldnot be easy for attackers to change data and present wrong logs thus reducing risks of scada systems. References: [1] John D. McDonald and Mini S. Thomas: Power System SCADA and Smart Grids, 2015. [2] Ronald L Krutz: Securing SCADA systems, 2005. [3] http://www.bayshorenetworks.com [4] Daniel Drescher: Blockchain Basics: A Non-Technical Introduction in 25 Steps, 2017. [5] www.hackernoon.com