Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
Musaria K. Mahmood, Fawzi M. Al-Naima
.
DOI: 10.4236/wsn.2010.27064   PDF    HTML     5,612 Downloads   10,625 Views   Citations

Abstract

The energy industry and in particular the Oil Refineries are extremely important elements in Iraq’s infrastructure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the whole economy. It can also cause serious damage to the environment and even losses of human lives. The security of information systems and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a major part of infrastructure protection strategy. This paper describes an attempt to use several security procedures to design a secure, robust system for the SCADA and DCS systems currently in use in the North Oil Refinery in the city of Baiji located in northern Iraq.

Share and Cite:

M. Mahmood and F. Al-Naima, "Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries," Wireless Sensor Network, Vol. 2 No. 7, 2010, pp. 520-527. doi: 10.4236/wsn.2010.27064.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] R. L. Krutz, “Securing SCADA Systems,” Wesley Publishing, Inc., Indianapolis, 2006.
[2] J. Pollet, “Developing a Solid SCADA Security Strategy,” Proceedings of the Second ISA/IEEE Sensors for Industry Conference, Houston, November 2002, pp. 148156.
[3] M. Bishop, “Introduction to Computer Security,” Addison-Wesley, Boston, 2005.
[4] J. Nordlander, “What is Special about SCADA System Cyber Security,” Master Dissertation, Royal Institute of Technology, Sweden, 2009.
[5] H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W. Lee and B. N. Ha, “Security Protocols Against Cyber Attacks in the Distribution Automation System,” IEEE Transactions on Power Delivery, Vol. 25, No. 1, 2010, pp. 448-455.
[6] T. Davis, “RSA Encryption,” October 2003. http://www. geometer.org/mathcircles
[7] J. Messy, H. Kh and K. Kuregian, “Nomination of SAFER+ as a Candidate Algorithm for the AES,” 1998. http://csrc.nist.gov/archive/aes/round1
[8] A. Schubert and W. Anheier, “Efficient VLSI Implementation of Modern Symmetric Block Ciphers,” 6th IEEE International Conference on Electronics, Circuit and Systems, Pafos, Vol. 2, September 1999, pp. 757-760.
[9] S. Mukherjee, D. Ganguly and S. Naskar, “A New Generation Cryptographic Technique,” International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August 2009, pp. 284-287.
[10] I. S. Ashour, “Online Data and Voice Encryption System Based on FPGA,” 24th National Radio Science Conference, Cairo, National Republican Senatorial Committee, 2007, pp. 1-7.
[11] D. Sharmila and R. Neelaveni, “Performance Analysis of SAFER+ and Triple DES Security Algorithms for Bluetooth Security System,” International Journal of Computer Science and Network Security, Vol. 9, No. 2, 2009, pp. 74-87.
[12] J. Kelsey, B. Schneier and D. Wagner, “Key Schedule Weaknesses in SAFER+,” Second Advanced Encryption Standard Candidate Conference, Rome, 1999, pp. 155167.
[13] A. West, “Securing DNP3 and Modbus with AGA12-2J,” IEEE Power and Energy Society General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, 20-24 July 2008, pp. 1-4.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.