Please use this identifier to cite or link to this item: https://repositori.mypolycc.edu.my/jspui/handle/123456789/9785
Title: SECURE DATA TRANSMISSION AND MESSAGE AUTHENTICATION CODES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS
Authors: Hima Bindu Lekkala
Vishnu Vardhan Bandari
Keywords: Message Authentication Codes (MAC)
Secure data transmission
Industrial automation and control systems
DES
MD5
Issue Date: Jan-2024
Publisher: IAEME Publication
Series/Report no.: International Journal of Manufacturing, Materials, and Mechanical Engineering (IJMMME);Volume 2, Issue 1
Abstract: It is challenging to secure communication of systems like these, which span home automation, industrial, and automotive applications, and include a multitude of protocols, limited resources, and sometimes high demands in real-time. It is possible to use the idea of a detached MAC to guarantee the genuineness and security of data transfers between nodes in a network. This is especially helpful for older, less modern parts of the network that are still actively communicating with one another. The article explains the technology's workings via the lens of an evaluation simulation model. In it, the likelihood of discovering an attack is laid out to the message authenticating overhead. Confidentiality, integrity, and authenticity are three of the most important security concerns of data transferred in IACSS when subjected to deception attacks. System stability and performance may be severely compromised by deception attacks. To safeguard IACSS against these threats, this study presents a secure transmission method that combines the DES algorithm, the MD5 algorithm, and a timestamp technique. Data sent between the controller and the plant may be securely encrypted and decrypted using DES. To ensure that the data is valid and intact, the MD5 algorithm and a timestamp are used. All control factors are considered by the model, which uses random data flow for measurements. Even with a little communication overhead, the statistical analysis shows that a high assault detection rate is achievable. To prove that the suggested methods work, we conducted tests where we controlled the velocity of a DC motor via the Internet.
URI: https://repositori.mypolycc.edu.my/jspui/handle/123456789/9785
ISSN: 2940-6442
Appears in Collections:JABATAN KEJURUTERAAN MEKANIKAL

Files in This Item:
File Description SizeFormat 
SECURE DATA TRANSMISSION AND MESSAGE AUTHENTICATION CODES.pdf598.76 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.