Development of security mechanisms for scada systems in the postquantium period

The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wirel...

Full description

Saved in:
Bibliographic Details
Published in:Sistemi obrobki ìnformacìï no. 2 (169); pp. 25 - 34
Main Authors: Воропай, О. В., Погасій, С. С., Король, О. Г., Мілевський, С. В.
Format: Journal Article
Language:English
Published: Ivan Kozhedub Kharkiv National Air Force University 09.06.2022
Subjects:
ISSN:1681-7710, 2518-1696
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.
AbstractList The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.
Author Король, О. Г.
Воропай, О. В.
Погасій, С. С.
Мілевський, С. В.
Author_xml – sequence: 1
  givenname: О. В.
  orcidid: 0000-0003-3396-8803
  surname: Воропай
  fullname: Воропай, О. В.
– sequence: 2
  givenname: С. С.
  orcidid: 0000-0002-4540-3693
  surname: Погасій
  fullname: Погасій, С. С.
– sequence: 3
  givenname: О. Г.
  orcidid: 0000-0002-8733-9984
  surname: Король
  fullname: Король, О. Г.
– sequence: 4
  givenname: С. В.
  orcidid: 0000-0001-5087-7036
  surname: Мілевський
  fullname: Мілевський, С. В.
BookMark eNo9kMtOwzAQRS1UJErpnqV_IGVsJ3G8ROVVqVI3sLYce0xdNXGxU6T-PaFFrK7mLs7onlsy6WOPhNwzWAiQZfOQY1hw4HzBarUAcUWmvGJNMV71hExZ3bBCSgY3ZJ7zDgB4BZLX1ZRsnvAb9_HQYT_Q6GlGe0xhONEO7db0IXeZ-photsYZmk95wLEJPR22SA8xD19H0w_h2NEDphDdHbn2Zp9x_pcz8vHy_L58K9ab19XycV1YVipR1EKBqBxvETxHpbBEaXxTAvcSrauca5XlMI4D5w1T0lvXIrPWVE1rJRczsrpwXTQ7fUihM-mkown6XMT0qU0agt2j5rxysrHopBClZ2DE-Fqh8kqo1jk3suDCsinmnND_8xjos189-tW_fvVoVIMQP1-Ocew
Cites_doi 10.1016/j.compind.2018.04.017
10.3390/electronics11030404
10.15587/1729-4061.2021.233533
10.5194/isprs-archives-XLVI-4-W5-2021-411-2021
10.15587/1729-4061.2022.254545
10.15587/1729-4061.2017.108461
10.15587/1729-4061.2020.205702
10.15587/1729-4061.2018.150903
10.15587/978-617-7319-31-2
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.30748/soi.2022.169.03
DatabaseName CrossRef
DOAJ Open Access Full Text
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2518-1696
EndPage 34
ExternalDocumentID oai_doaj_org_article_225d78ced7334f10a30359e9f939bddd
10_30748_soi_2022_169_03
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
OK1
ID FETCH-LOGICAL-c1493-639035d2be0f2e99e4e7af8402f7ecd5ddb9c203070dfa197fcdbe1cca58bc723
IEDL.DBID DOA
ISSN 1681-7710
IngestDate Mon Nov 10 04:28:54 EST 2025
Sat Nov 29 04:17:00 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2 (169)
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1493-639035d2be0f2e99e4e7af8402f7ecd5ddb9c203070dfa197fcdbe1cca58bc723
ORCID 0000-0003-3396-8803
0000-0002-8733-9984
0000-0002-4540-3693
0000-0001-5087-7036
OpenAccessLink https://doaj.org/article/225d78ced7334f10a30359e9f939bddd
PageCount 10
ParticipantIDs doaj_primary_oai_doaj_org_article_225d78ced7334f10a30359e9f939bddd
crossref_primary_10_30748_soi_2022_169_03
PublicationCentury 2000
PublicationDate 2022-06-09
PublicationDateYYYYMMDD 2022-06-09
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-09
  day: 09
PublicationDecade 2020
PublicationTitle Sistemi obrobki ìnformacìï
PublicationYear 2022
Publisher Ivan Kozhedub Kharkiv National Air Force University
Publisher_xml – name: Ivan Kozhedub Kharkiv National Air Force University
References 21941
21963
21985
21940
21962
21984
21961
21983
21960
21982
21981
21980
21949
21948
21947
21969
21946
21968
21945
21967
21944
21966
21943
21965
21942
21964
21939
21952
21974
21951
21973
21950
21972
21971
21970
21959
21958
21957
21979
21956
21978
21955
21977
21954
21976
21953
21975
References_xml – ident: 21952
– ident: 21975
– ident: 21954
– ident: 21948
– ident: 21973
– ident: 21979
– ident: 21977
– ident: 21946
– ident: 21971
  doi: 10.1016/j.compind.2018.04.017
– ident: 21942
– ident: 21968
  doi: 10.3390/electronics11030404
– ident: 21940
– ident: 21947
  doi: 10.1016/j.compind.2018.04.017
– ident: 21965
– ident: 21980
  doi: 10.15587/1729-4061.2021.233533
– ident: 21963
– ident: 21945
  doi: 10.5194/isprs-archives-XLVI-4-W5-2021-411-2021
– ident: 21972
– ident: 21970
– ident: 21956
  doi: 10.15587/1729-4061.2021.233533
– ident: 21976
– ident: 21951
– ident: 21953
– ident: 21955
– ident: 21949
– ident: 21974
– ident: 21960
  doi: 10.15587/1729-4061.2022.254545
– ident: 21978
– ident: 21959
  doi: 10.15587/1729-4061.2017.108461
– ident: 21961
– ident: 21941
– ident: 21939
– ident: 21964
– ident: 21981
  doi: 10.15587/1729-4061.2020.205702
– ident: 21983
  doi: 10.15587/1729-4061.2017.108461
– ident: 21962
– ident: 21985
– ident: 21966
– ident: 21982
  doi: 10.15587/1729-4061.2018.150903
– ident: 21967
  doi: 10.15587/978-617-7319-31-2
– ident: 21969
  doi: 10.5194/isprs-archives-XLVI-4-W5-2021-411-2021
– ident: 21984
  doi: 10.15587/1729-4061.2022.254545
– ident: 21944
  doi: 10.3390/electronics11030404
– ident: 21957
  doi: 10.15587/1729-4061.2020.205702
– ident: 21943
  doi: 10.15587/978-617-7319-31-2
– ident: 21950
– ident: 21958
  doi: 10.15587/1729-4061.2018.150903
SSID ssj0002507265
Score 2.1841304
Snippet The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 25
SubjectTerms scada-systems, sociocyberphysical systems, post-quantum algorithms, cryptocode constructions, algebraic-geometric codes
Title Development of security mechanisms for scada systems in the postquantium period
URI https://doaj.org/article/225d78ced7334f10a30359e9f939bddd
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2518-1696
  dateEnd: 20221231
  omitProxy: false
  ssIdentifier: ssj0002507265
  issn: 1681-7710
  databaseCode: DOA
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcDCG1Fe8sDCEJrYThyPgKgYUGEA1M2KX1KGNqVu-f2cnRSFiYUlQxRF1nfnu-_k83cIXTtbFKUjNlG6DMeMGuKgqkwigGrTVMMz9uZ8PPPJpJxOxWtv1FfoCWvlgVvgRuBvhpfaGk4pc1la0SA6Z4UTVChjTIi-KRe9YirEYEjsnMQ5kllRZkAhs7Q9owSXZuXINzWUhoTcZkXQOP2Vk3rS_THHjPfRbkcO8V27qAO0ZeeHaG8zeAF3-_AIvfRafXDjsO-G0OGZDRd5az_zGMgo9royFW7Fmj2u5xjYHl40fvW5BkDr9QwHnePGHKP38ePbw1PSTUZINFQ0NAFaASgYomwKOAthmeWVg1qNOG61yY1RQpO4n42rMsGdNspmYK28VJoTeoIG82ZuTxEWjnGiFRgs1CaOqZSyghUAac4rpvIhutlgIxetAIaEwiHiKAFHGXCUgKNM6RDdB_B-vgvS1fEFGFR2BpV_GfTsP35yjnbCumJPl7hAg9VybS_Rtv5a1X55FX3lG5fywsw
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development+of+security+mechanisms+for+scada+systems+in+the+postquantium+period&rft.jtitle=Sistemi+obrobki+%C3%ACnformac%C3%AC%C3%AF&rft.au=%D0%92%D0%BE%D1%80%D0%BE%D0%BF%D0%B0%D0%B9%2C+%D0%9E.+%D0%92.&rft.au=%D0%9F%D0%BE%D0%B3%D0%B0%D1%81%D1%96%D0%B9%2C+%D0%A1.+%D0%A1.&rft.au=%D0%9A%D0%BE%D1%80%D0%BE%D0%BB%D1%8C%2C+%D0%9E.+%D0%93.&rft.au=%D0%9C%D1%96%D0%BB%D0%B5%D0%B2%D1%81%D1%8C%D0%BA%D0%B8%D0%B9%2C+%D0%A1.+%D0%92.&rft.date=2022-06-09&rft.issn=1681-7710&rft.eissn=2518-1696&rft.issue=2+%28169%29&rft.spage=25&rft.epage=34&rft_id=info:doi/10.30748%2Fsoi.2022.169.03&rft.externalDBID=n%2Fa&rft.externalDocID=10_30748_soi_2022_169_03
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1681-7710&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1681-7710&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1681-7710&client=summon