Simulation-based framework for authenticating SCADA systems and cyber threat security in edge-based autonomous environments

Supervisory Control and Data Acquisition (SCADA) systems are pivotal to critical industries, such as oil and gas, water treatment, and power generation, where they enable real-time monitoring and control over complex industrial processes. These systems commonly use protocols like Modbus/RTU, Modbus...

Full description

Saved in:
Bibliographic Details
Published inSimulation modelling practice and theory Vol. 140; p. 103078
Main Authors Mughaid, Ala, Alzu’bi, Shadi, Alkhatib, Ahmad A.A., AlZioud, Adel, Ghazo, Alaa Al, AL-Aiash, Issa
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.04.2025
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Supervisory Control and Data Acquisition (SCADA) systems are pivotal to critical industries, such as oil and gas, water treatment, and power generation, where they enable real-time monitoring and control over complex industrial processes. These systems commonly use protocols like Modbus/RTU, Modbus TCP/IP, DNP3, and IEC60870, each chosen to meet specific operational requirements. However, vulnerabilities in protocols like Modbus TCP/IP, especially in access control, authentication, and data integrity leave SCADA networks susceptible to cyber threats, with risks ranging from process disruption to data breaches or potential physical harm to infrastructure. This study proposes a simulation-based security framework for SCADA environments using the Modbus TCP/IP protocol, incorporating authentication through unique identification bytes, robust encryption to secure communications, and a layered Intrusion Detection and Prevention System (IDS/IPS) to detect and counteract malicious activities. The framework’s effectiveness is demonstrated through simulated scenarios and a real-world case study, showcasing significant resilience against common cyber threats faced by SCADA systems. •Introduced a simulated security framework to enhance SCADA system in industrial environments.•Authentication method utilizing unique identification bytes to secure Modbus TCP/IP.•Integrated cybersecurity Systems for robust cyber threat mitigation.•Validated the framework’s effectiveness through real-world attack simulations.•Achieved enhanced SCADA security without requiring infrastructure modifications.
ISSN:1569-190X
DOI:10.1016/j.simpat.2025.103078