{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T08:29:53Z","timestamp":1776068993211,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2016,3,3]],"date-time":"2016-03-03T00:00:00Z","timestamp":1456963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received\/transmitted from\/to the data link layer or in the send\/respond from the main controller\/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received\/transmitted from\/to the lower layer of the DNP3 protocol or the send\/respond to\/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.<\/jats:p>","DOI":"10.3390\/s16030322","type":"journal-article","created":{"date-parts":[[2016,3,3]],"date-time":"2016-03-03T10:30:47Z","timestamp":1457001047000},"page":"322","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0265-545X","authenticated-orcid":false,"given":"Aamir","family":"Shahzad","sequence":"first","affiliation":[{"name":"Center for Advanced Image and Information Technology, School of Electronics &amp; Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea"}]},{"given":"Malrey","family":"Lee","sequence":"additional","affiliation":[{"name":"Center for Advanced Image and Information Technology, School of Electronics &amp; Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju 561-756, Korea"}]},{"given":"Neal","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China"},{"name":"Department of Business and Computer Science, Southwestern Oklahoma State University, Oklahoma, OK 73096, USA"}]},{"given":"Gisung","family":"Jeong","sequence":"additional","affiliation":[{"name":"Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea"}]},{"given":"Young-Keun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Orthopedic Surgery, Chonbuk National University Hospital, Jeonju 561-756, Korea"}]},{"given":"Jae-Young","family":"Choi","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Korea"}]},{"given":"Abdul","family":"Mahesar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia"}]},{"given":"Iftikhar","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2016,3,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cheung, R., and Fung, Y. (November, January 30). Wireless access to SCADA system. Proceedings of the 2000 International Conference on Advances in Power System Control, Operation and Management, Hong Kong, China.","DOI":"10.1049\/cp:20000461"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1322","DOI":"10.1016\/j.mejo.2008.08.012","article-title":"Wired and wireless sensor networks for industrial applications","volume":"40","author":"Flammini","year":"2009","journal-title":"Microelectron. J."},{"key":"ref_3","unstructured":"Escudero, J.I., Rodriguez, J.A., Romero, M.C., and Luque, J. (2004, January 10\u201313). IDOLO: Multimedia data deployment on SCADA systems. Proceedings of the Power Systems Conference and Exposition, New York, NY, USA."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1109\/TPWRD.2004.833906","article-title":"Deployment of digital video and Audio Over electrical SCADA networks","volume":"20","author":"Escudero","year":"2005","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Morsi, I., el Deeb, M., and El Zwawi, A. (2009, January 15\u201320). SCADA\/HMI Development for a Multi Stage Desalination Plant. Proceedings of the Computation world 09. Computation World Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, Athens, Greece.","DOI":"10.1109\/ComputationWorld.2009.114"},{"key":"ref_6","unstructured":"Laurence, K., and R\u00e9mi, B. (2014, January 15). The synergy between system modelization and HMI modelization: Application on a workbench HMI. Proceedings of the 2014 Ergonomie et Informatique Avanc\u00e9e Conference\u2014Design, Ergonomie et IHM: Quelle articulation pour la co-conception de l\u2019interaction (Ergo\u2019IA \u201814), New York, NY, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.csi.2008.03.023","article-title":"Web based multilayered distributed SCADA\/HMI system in refinery application","volume":"31","author":"Adnan","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mander, T., Nabhani, F., Wang, L., and Cheung, R. (2007, January 24\u201328). Data Object Based Security for DNP3 Over TCP\/IP for Increased Utility Commercial Aspects Security. Proceedings of the Power Engineering Society General Meeting, Tampa, FL, USA.","DOI":"10.1109\/PES.2007.386243"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ortega, A., and Akira Shinoda, A. (2013, January 15\u201317). Simulation in NS-2 of DNP3 protocol encapsulated over TCP\/IP in smart grid applications. Proceedings of the 2013 IEEE PES Conference on Innovative Smart Grid Technologies Latin America (ISGT LA), Chicago, IL, USA.","DOI":"10.1109\/ISGT-LA.2013.6554430"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1016\/j.conengprac.2003.09.002","article-title":"Wireless and Internet communications technologies for monitoring and control","volume":"12","author":"Haydn","year":"2004","journal-title":"Control Eng. Pract."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Musa, S., and Aborujilah, A. (2013, January 17\u201319). Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, Kota Kinabalu, Malaysia.","DOI":"10.1145\/2448556.2448588"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.ijcip.2008.08.003","article-title":"Attack taxonomies for the Modbus protocols","volume":"1","author":"Huitsing","year":"2008","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_13","first-page":"67","article-title":"A Taxonomy of Attacks on the DNP3 Protocol","volume":"3","author":"East","year":"2009","journal-title":"Crit. Infrastruct. Prot."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Lee, M., Kim, S., Kim, K., Choi, J.-Y., Cho, Y., and Lee, K.-K. (2016). Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors, 16.","DOI":"10.3390\/s16010037"},{"key":"ref_15","unstructured":"Sugwon, H., and Lee, M. (2010, January 11\u201314). Challenges and Direction toward Secure Communication in the SCADA System. Proceedings of the Communication Networks and Services Research Conference (CNSR), Montreal, QC, Canada."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/sec.698","article-title":"SCADA communication and security issues","volume":"7","author":"Gao","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kim, H. (2012). Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks. Int. J. Distrib. Sens. Netw., 2012.","DOI":"10.1155\/2012\/268478"},{"key":"ref_18","unstructured":"Lee, D., HakJu, K., Kwangjo, K., and Yoo, P.D. (2014, January 21\u201324). Simulated Attack on DNP3 Protocol in SCADA System. Proceedings of the 31th Symposium on Cryptography and Information Security, Kagoshima, Japan."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Willig, A., Matheus, K., and Wolisz, A. (2005). Wireless Technology in Industrial Networks. IEEE Proc.","DOI":"10.1109\/JPROC.2005.849717"},{"key":"ref_20","unstructured":"Gordon, C., Deon, R., and Edwin, W. (2004). Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems, Elsevier."},{"key":"ref_21","unstructured":"Susanto, I., Jackson, R., and Paul, D.L. (2009). Wiley Handbook of Science and Technology for Homeland Security, John Wiley & Sons."},{"key":"ref_22","unstructured":"Jeffrey, L., Hieb, J.H., and Graham, S.C. (2007). Cyber Security Enhancements for SCADA and DCS Systems. ISRL-TR-07-02, Intelligent Systems Research Laboratory, University of Louisville. Technical Report TR-ISRL-07-02."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/S1353-4858(09)70078-9","article-title":"The SCADA challenge: Securing critical infrastructure","volume":"2009","author":"Steve","year":"2009","journal-title":"Netw. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.ijcip.2009.10.001","article-title":"An experimental investigation of malware attacks on SCADA systems","volume":"2","author":"Andrea","year":"2009","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/1538788.1538820","article-title":"Improving the cyber security of SCADA communication networks","volume":"52","author":"Patel","year":"2009","journal-title":"Commun ACM"},{"key":"ref_26","first-page":"133","article-title":"Security Enhancements for Distributed Control Systems, Critical Infrastructure Protection","volume":"253","author":"Hieb","year":"2008","journal-title":"IFIP Int. Fed. Inf. Process."},{"key":"ref_27","unstructured":"Kim, H.M. (2007, January 6\u20138). A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. Proceedings of the Future Generation Communication and Networking, Jeju-Island, Korea."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.1002\/sec.834","article-title":"A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme","volume":"7","author":"Azeem","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1002\/sec.860","article-title":"Equivalent public keys and a key substitution attack on the schemes from vector decomposition","volume":"7","author":"Seongan","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_30","first-page":"930","article-title":"Wireless Sensor Networks for Industrial Process Monitoring and Control with Security Architecture: A survey for Research Issues","volume":"2","author":"Vyas","year":"2013","journal-title":"IJESRT"},{"key":"ref_31","first-page":"56","article-title":"Public Key Cryptography Based Approach for Securing SCADA Communications, Computer Networks and Information Technologies","volume":"142","author":"Anupam","year":"2011","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_32","first-page":"337","article-title":"Cipher for Internet-based Supervisory Control and Data Acquisition Architecture","volume":"8","author":"Martin","year":"2011","journal-title":"J. Secur. Eng."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"381","DOI":"10.3923\/tasr.2014.381.395","article-title":"N-Secure Cryptography Solution for SCADA Security Enhancement","volume":"9","author":"Shahzad","year":"2014","journal-title":"Trends Appl. Sci. Res."},{"key":"ref_34","unstructured":"Fujisaki, E., and Okamoto, T. (1999). Advances in Cryptology\u2014CRYPTO\u201999, Spring-Verlag. LNCS."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1002\/sec.506","article-title":"A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography","volume":"5","author":"He","year":"2012","journal-title":"Secur. Commun. Netw."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Robles, R.-J., and Balitanas, J. (2011). Comparison of Encryption Schemes as Used in Communication between SCADA Components. Ubiquitous Comput. Mult. Appl.","DOI":"10.1109\/UCMA.2011.33"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2487","DOI":"10.3923\/jas.2014.2487.2497","article-title":"Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement","volume":"14","author":"Shahzad","year":"2014","journal-title":"J. Appl. Sci."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1002\/sec.853","article-title":"RCCA security for KEM + DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions","volume":"7","author":"Chen","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_39","first-page":"19","article-title":"Security Encryption Schemes for Internet SCADA: Comparison of the Solutions","volume":"223","author":"Rosslin","year":"2011","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_40","unstructured":"Sandip, C.P. (2006). Secure Internet-Based Communication Protocol for Scada Networks. [Ph.D. Thesis, University of Louisville]."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.isatra.2007.04.003","article-title":"Cyber security risk assessment for SCADA and DCS networks","volume":"46","author":"Ralston","year":"2007","journal-title":"ISA Trans."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Gilchrist, G. (2008, January 20\u201324). Secure authentication for DNP3. Proceedings of the Power and Energy Society General Meeting\u2014Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, Pittsburgh, PA, USA.","DOI":"10.1109\/PES.2008.4596147"},{"key":"ref_43","first-page":"227","article-title":"DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework","volume":"3","author":"Majdalawieh","year":"2006","journal-title":"Adv. Comput. Inf. Syst. Sci. Eng."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Shahzad, A., and Lee, M. (2015). The Protocol Design and New Approach for SCADA Security Enhancement during Sensors Broadcasting System. Multimed. Tools Appl. Springerlink.","DOI":"10.1007\/s11042-015-3050-2"},{"key":"ref_45","unstructured":"Helena, H., and Henri, G. Evaluation Report, Security Level of Cryptography\u2014SHA-256, 2002. Available online: http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/fy15\/doc\/1045_IPA-SHA256.pdf."},{"key":"ref_46","unstructured":"Somitra, K.S., and Palash, S. (2009, January 10\u201312). A new hash family obtained by modifying the SHA-2 family. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, NSW, Australia."},{"key":"ref_47","unstructured":"Florian, M., Tomislav, N., and Martin, S. (2011, January 4\u20138). Finding SHA-2 characteristics: Searching through a minefield of contradictions. Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT\u203211), Seoul, Korea."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","article-title":"Security Analysis of SHA-256 and Sisters","volume":"3006","author":"Henri","year":"2004","journal-title":"Sel. Areas Cryptogr. Lect. Notes Comput. Sci."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Lee, M., Lee, Y., Kim, S., Xiong, K., Choi, J., and Cho, Y. (2015). Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information. Symmetry.","DOI":"10.3390\/sym7031176"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/3\/322\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:20:06Z","timestamp":1760210406000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/3\/322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,3]]},"references-count":49,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,3]]}},"alternative-id":["s16030322"],"URL":"https:\/\/doi.org\/10.3390\/s16030322","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,3]]}}}