Development of security mechanisms for scada systems in the postquantium period
The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wirel...
Saved in:
| Published in: | Sistemi obrobki ìnformacìï no. 2 (169); pp. 25 - 34 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Ivan Kozhedub Kharkiv National Air Force University
09.06.2022
|
| Subjects: | |
| ISSN: | 1681-7710, 2518-1696 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems. |
|---|---|
| AbstractList | The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems. |
| Author | Король, О. Г. Воропай, О. В. Погасій, С. С. Мілевський, С. В. |
| Author_xml | – sequence: 1 givenname: О. В. orcidid: 0000-0003-3396-8803 surname: Воропай fullname: Воропай, О. В. – sequence: 2 givenname: С. С. orcidid: 0000-0002-4540-3693 surname: Погасій fullname: Погасій, С. С. – sequence: 3 givenname: О. Г. orcidid: 0000-0002-8733-9984 surname: Король fullname: Король, О. Г. – sequence: 4 givenname: С. В. orcidid: 0000-0001-5087-7036 surname: Мілевський fullname: Мілевський, С. В. |
| BookMark | eNo9kMtOwzAQRS1UJErpnqV_IGVsJ3G8ROVVqVI3sLYce0xdNXGxU6T-PaFFrK7mLs7onlsy6WOPhNwzWAiQZfOQY1hw4HzBarUAcUWmvGJNMV71hExZ3bBCSgY3ZJ7zDgB4BZLX1ZRsnvAb9_HQYT_Q6GlGe0xhONEO7db0IXeZ-photsYZmk95wLEJPR22SA8xD19H0w_h2NEDphDdHbn2Zp9x_pcz8vHy_L58K9ab19XycV1YVipR1EKBqBxvETxHpbBEaXxTAvcSrauca5XlMI4D5w1T0lvXIrPWVE1rJRczsrpwXTQ7fUihM-mkown6XMT0qU0agt2j5rxysrHopBClZ2DE-Fqh8kqo1jk3suDCsinmnND_8xjos189-tW_fvVoVIMQP1-Ocew |
| Cites_doi | 10.1016/j.compind.2018.04.017 10.3390/electronics11030404 10.15587/1729-4061.2021.233533 10.5194/isprs-archives-XLVI-4-W5-2021-411-2021 10.15587/1729-4061.2022.254545 10.15587/1729-4061.2017.108461 10.15587/1729-4061.2020.205702 10.15587/1729-4061.2018.150903 10.15587/978-617-7319-31-2 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.30748/soi.2022.169.03 |
| DatabaseName | CrossRef DOAJ Open Access Full Text |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2518-1696 |
| EndPage | 34 |
| ExternalDocumentID | oai_doaj_org_article_225d78ced7334f10a30359e9f939bddd 10_30748_soi_2022_169_03 |
| GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ OK1 |
| ID | FETCH-LOGICAL-c1493-639035d2be0f2e99e4e7af8402f7ecd5ddb9c203070dfa197fcdbe1cca58bc723 |
| IEDL.DBID | DOA |
| ISSN | 1681-7710 |
| IngestDate | Mon Nov 10 04:28:54 EST 2025 Sat Nov 29 04:17:00 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 (169) |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1493-639035d2be0f2e99e4e7af8402f7ecd5ddb9c203070dfa197fcdbe1cca58bc723 |
| ORCID | 0000-0003-3396-8803 0000-0002-8733-9984 0000-0002-4540-3693 0000-0001-5087-7036 |
| OpenAccessLink | https://doaj.org/article/225d78ced7334f10a30359e9f939bddd |
| PageCount | 10 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_225d78ced7334f10a30359e9f939bddd crossref_primary_10_30748_soi_2022_169_03 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-06-09 |
| PublicationDateYYYYMMDD | 2022-06-09 |
| PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-09 day: 09 |
| PublicationDecade | 2020 |
| PublicationTitle | Sistemi obrobki ìnformacìï |
| PublicationYear | 2022 |
| Publisher | Ivan Kozhedub Kharkiv National Air Force University |
| Publisher_xml | – name: Ivan Kozhedub Kharkiv National Air Force University |
| References | 21941 21963 21985 21940 21962 21984 21961 21983 21960 21982 21981 21980 21949 21948 21947 21969 21946 21968 21945 21967 21944 21966 21943 21965 21942 21964 21939 21952 21974 21951 21973 21950 21972 21971 21970 21959 21958 21957 21979 21956 21978 21955 21977 21954 21976 21953 21975 |
| References_xml | – ident: 21952 – ident: 21975 – ident: 21954 – ident: 21948 – ident: 21973 – ident: 21979 – ident: 21977 – ident: 21946 – ident: 21971 doi: 10.1016/j.compind.2018.04.017 – ident: 21942 – ident: 21968 doi: 10.3390/electronics11030404 – ident: 21940 – ident: 21947 doi: 10.1016/j.compind.2018.04.017 – ident: 21965 – ident: 21980 doi: 10.15587/1729-4061.2021.233533 – ident: 21963 – ident: 21945 doi: 10.5194/isprs-archives-XLVI-4-W5-2021-411-2021 – ident: 21972 – ident: 21970 – ident: 21956 doi: 10.15587/1729-4061.2021.233533 – ident: 21976 – ident: 21951 – ident: 21953 – ident: 21955 – ident: 21949 – ident: 21974 – ident: 21960 doi: 10.15587/1729-4061.2022.254545 – ident: 21978 – ident: 21959 doi: 10.15587/1729-4061.2017.108461 – ident: 21961 – ident: 21941 – ident: 21939 – ident: 21964 – ident: 21981 doi: 10.15587/1729-4061.2020.205702 – ident: 21983 doi: 10.15587/1729-4061.2017.108461 – ident: 21962 – ident: 21985 – ident: 21966 – ident: 21982 doi: 10.15587/1729-4061.2018.150903 – ident: 21967 doi: 10.15587/978-617-7319-31-2 – ident: 21969 doi: 10.5194/isprs-archives-XLVI-4-W5-2021-411-2021 – ident: 21984 doi: 10.15587/1729-4061.2022.254545 – ident: 21944 doi: 10.3390/electronics11030404 – ident: 21957 doi: 10.15587/1729-4061.2020.205702 – ident: 21943 doi: 10.15587/978-617-7319-31-2 – ident: 21950 – ident: 21958 doi: 10.15587/1729-4061.2018.150903 |
| SSID | ssj0002507265 |
| Score | 2.1841304 |
| Snippet | The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 25 |
| SubjectTerms | scada-systems, sociocyberphysical systems, post-quantum algorithms, cryptocode constructions, algebraic-geometric codes |
| Title | Development of security mechanisms for scada systems in the postquantium period |
| URI | https://doaj.org/article/225d78ced7334f10a30359e9f939bddd |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2518-1696 dateEnd: 20221231 omitProxy: false ssIdentifier: ssj0002507265 issn: 1681-7710 databaseCode: DOA dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcDCG1Fe8sDCEJrYThyPgKgYUGEA1M2KX1KGNqVu-f2cnRSFiYUlQxRF1nfnu-_k83cIXTtbFKUjNlG6DMeMGuKgqkwigGrTVMMz9uZ8PPPJpJxOxWtv1FfoCWvlgVvgRuBvhpfaGk4pc1la0SA6Z4UTVChjTIi-KRe9YirEYEjsnMQ5kllRZkAhs7Q9owSXZuXINzWUhoTcZkXQOP2Vk3rS_THHjPfRbkcO8V27qAO0ZeeHaG8zeAF3-_AIvfRafXDjsO-G0OGZDRd5az_zGMgo9royFW7Fmj2u5xjYHl40fvW5BkDr9QwHnePGHKP38ePbw1PSTUZINFQ0NAFaASgYomwKOAthmeWVg1qNOG61yY1RQpO4n42rMsGdNspmYK28VJoTeoIG82ZuTxEWjnGiFRgs1CaOqZSyghUAac4rpvIhutlgIxetAIaEwiHiKAFHGXCUgKNM6RDdB_B-vgvS1fEFGFR2BpV_GfTsP35yjnbCumJPl7hAg9VybS_Rtv5a1X55FX3lG5fywsw |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development+of+security+mechanisms+for+scada+systems+in+the+postquantium+period&rft.jtitle=Sistemi+obrobki+%C3%ACnformac%C3%AC%C3%AF&rft.au=%D0%92%D0%BE%D1%80%D0%BE%D0%BF%D0%B0%D0%B9%2C+%D0%9E.+%D0%92.&rft.au=%D0%9F%D0%BE%D0%B3%D0%B0%D1%81%D1%96%D0%B9%2C+%D0%A1.+%D0%A1.&rft.au=%D0%9A%D0%BE%D1%80%D0%BE%D0%BB%D1%8C%2C+%D0%9E.+%D0%93.&rft.au=%D0%9C%D1%96%D0%BB%D0%B5%D0%B2%D1%81%D1%8C%D0%BA%D0%B8%D0%B9%2C+%D0%A1.+%D0%92.&rft.date=2022-06-09&rft.issn=1681-7710&rft.eissn=2518-1696&rft.issue=2+%28169%29&rft.spage=25&rft.epage=34&rft_id=info:doi/10.30748%2Fsoi.2022.169.03&rft.externalDBID=n%2Fa&rft.externalDocID=10_30748_soi_2022_169_03 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1681-7710&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1681-7710&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1681-7710&client=summon |