What is Security for station communications

Sobia Khan
2 min readApr 28, 2021

Security for station communications

Until recently, the term “security”, when applied to SCADA communication systems, referred only to the process of ensuring message integrity against electrical noise and other communications disruptions. But in reality, “security” also has a much broader meaning. Security, in the broad sense, concerns anything that risks undermining the integrity of the company.

Here we will focus on issues more closely related to SCADA security.

PLC SCADA

.

In a previous section, we examined the role of the OSI Reference Model (ISO 7498–1) in defining a communications architecture. Likewise, ISO 7498–2, Information processing systems, Open Systems Interconnection, Basic Reference Model — Part 2: Security Architecture, published in 1989, provides a general description of security services and associated mechanisms. that fit into the reference, model defines the positions in the reference model where they can be provided.

It also provides useful standard definitions for security terms.

ISO 7498–2 defines the following five categories of security service:

1. Authentication : the corroboration that an entity is the one claimed

2. Access control: preventing unauthorized use of a resource

3. Data privacy: the property that information is not made available or disclosed to unauthorized persons, entities, or processes

4. Data integrity: the property that data has not been altered or destroyed in an unauthorized manner

5. Non-repudiation : data added to, or a cryptographic transformation of a data unit that allows a recipient of the data unit to prove the source and integrity of the unit and to protect against tampering, for example, by the recipient

Note that ISO 7498–2 provides standard definitions and architecture for security services, but leaves other standards to define the details of these services. It also provides recommendations on the location of required security services in the seven-layer reference model to ensure secure and successful interoperability between open systems. </ P>

Security functions can generally be provided alternatively at more than one layer of the OSI model. Strictly point-to-point communication channels — for which no externally visible device addresses should be observable — can use encryption and other security techniques at the physical and data link layers. If packets are to be routable, messages must be encrypted at or above the network layer (OSI recommendation) or the security wrapper must be applied and removed on each node of the interconnected network.

This is a bad idea due to the resulting complexities of managing security keys and the resulting likelihood of security leaks.

Burraq Engineering Solutions is providing practically electrical courses in Lahore. We offer a PLC course, SOLAR SYSTEM Installation and DESIGN COURSE, ETAP course, DIALAX course, Panel FABRICATION course, VFD course, ADVANCED Course Panel, SWITCHERGEAR design course, Building Electrical design course, and all electrical diploma courses in Lahore.

--

--