Javascript must be enabled to continue!
Research and Implementation of Modbus TCP Security Enhancement Protocol
View through CrossRef
Abstract
Considering the security problem of Modbus TCP protocol, such as the lack of authentication mechanism, the protection mechanism of data transmission and abuse of function code, a secure industrial control communication protocol(Modbus-S protocol) is designed based on the original Modbus TCP protocol, which uses symmetric key algorithm to ensure the confidentiality of data; the uniqueness of data is guaranteed by the synchronization mechanism based on hash algorithm; digital signature algorithm is used to ensure the verifiability and integrity of data; finally, “White List” filtering mechanism is used to manage function codes based on roles to effectively prevent abuse of function codes. Through the verification and analysis of experiment, Modbus-S can fully compensate for the design defects of Modbus TCP protocol. Compared with the existing methods, this method has higher security and can comprehensively improve the communication security of Modbus TCP protocol.
Title: Research and Implementation of Modbus TCP Security Enhancement Protocol
Description:
Abstract
Considering the security problem of Modbus TCP protocol, such as the lack of authentication mechanism, the protection mechanism of data transmission and abuse of function code, a secure industrial control communication protocol(Modbus-S protocol) is designed based on the original Modbus TCP protocol, which uses symmetric key algorithm to ensure the confidentiality of data; the uniqueness of data is guaranteed by the synchronization mechanism based on hash algorithm; digital signature algorithm is used to ensure the verifiability and integrity of data; finally, “White List” filtering mechanism is used to manage function codes based on roles to effectively prevent abuse of function codes.
Through the verification and analysis of experiment, Modbus-S can fully compensate for the design defects of Modbus TCP protocol.
Compared with the existing methods, this method has higher security and can comprehensively improve the communication security of Modbus TCP protocol.
Related Results
MODBUS TCP BACKBONE THROUGHPUT ANALYSIS FOR NOISY IEEE 802.11 WIRELESS CHANNEL
MODBUS TCP BACKBONE THROUGHPUT ANALYSIS FOR NOISY IEEE 802.11 WIRELESS CHANNEL
The use of high-speed wireless IEEE 802.11 channels (802.11n/ac/ax) for the Modbus TCP backbone in automated control systems of industrial enterprises (APCS) requ...
Single / multi TCP and a fairness issue
Single / multi TCP and a fairness issue
In distributed systems domain a good connection is a structural quest for messages transfer between clusters in today's high performance applications. Initiating a single TCP used ...
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED]Rhino XL Reviews, NY USA: Studies show that testosterone levels in males decrease constantly with growing age. There are also many other problems that males face due ...
Polycomb requires Tcp-1η chaperonin for maintaining gene silencing in
Drosophila
Polycomb requires Tcp-1η chaperonin for maintaining gene silencing in
Drosophila
Abstract
In metazoans, heritable states of cell type specific gene expression patterns linked with specialization of various cell types constitut...
Simulation and Analysis of Cyber-Attack on Modbus Protocol for Smart Grids in Virtual Environment
Simulation and Analysis of Cyber-Attack on Modbus Protocol for Smart Grids in Virtual Environment
Smart grid capabilities have grown significantly in recent years. The smart grid provides advanced real-time handling of faults, advanced automatic control for efficient electricit...
RESEARCH ON DUAL PLC SIMULATION TECHNOLOGY BASED ON MODBUS TCP COMMUNICATION
RESEARCH ON DUAL PLC SIMULATION TECHNOLOGY BASED ON MODBUS TCP COMMUNICATION
With the rapid development of industrial automation technology, efficient communication between PLCs has become the key to realizing complex control systems. Based on the MODBUS TC...
Recovery of loss of packet in network using constant packet reordering
Recovery of loss of packet in network using constant packet reordering
When the packet is reordered the most standard implementation of the Transmission control protocol (TCP) gives poor performance. This paper proposes a new version of the TCP which ...
Thrombocytopenia in neonatal intensive care unit at a tertiary care hospital of South Punjab, Pakistan.
Thrombocytopenia in neonatal intensive care unit at a tertiary care hospital of South Punjab, Pakistan.
Objective: To find out fetal and maternal factors linked with thrombocytopenia (TCP) among neonates admitted in neonatal intensive care unit (NICU) of a tertiary care hospital of S...

