{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:39:54Z","timestamp":1775122794539,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T00:00:00Z","timestamp":1674604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Lembaga Pengelola Dana Pendidikan (LPDP), The Ministry of Finance, Republic of Indonesia","award":["KEP 44\/LPDP\/202"],"award-info":[{"award-number":["KEP 44\/LPDP\/202"]}]},{"name":"Lembaga Pengelola Dana Pendidikan (LPDP), The Ministry of Finance, Republic of Indonesia","award":["019\/SAM3\/DBE-RC\/2019"],"award-info":[{"award-number":["019\/SAM3\/DBE-RC\/2019"]}]},{"name":"Lembaga Pengelola Dana Pendidikan (LPDP), The Ministry of Finance, Republic of Indonesia","award":["SPJ-17.1\/D1\/INKA\/2019"],"award-info":[{"award-number":["SPJ-17.1\/D1\/INKA\/2019"]}]},{"name":"Telkom University","award":["KEP 44\/LPDP\/202"],"award-info":[{"award-number":["KEP 44\/LPDP\/202"]}]},{"name":"Telkom University","award":["019\/SAM3\/DBE-RC\/2019"],"award-info":[{"award-number":["019\/SAM3\/DBE-RC\/2019"]}]},{"name":"Telkom University","award":["SPJ-17.1\/D1\/INKA\/2019"],"award-info":[{"award-number":["SPJ-17.1\/D1\/INKA\/2019"]}]},{"name":"Indonesian Rolling Stock Industry","award":["KEP 44\/LPDP\/202"],"award-info":[{"award-number":["KEP 44\/LPDP\/202"]}]},{"name":"Indonesian Rolling Stock Industry","award":["019\/SAM3\/DBE-RC\/2019"],"award-info":[{"award-number":["019\/SAM3\/DBE-RC\/2019"]}]},{"name":"Indonesian Rolling Stock Industry","award":["SPJ-17.1\/D1\/INKA\/2019"],"award-info":[{"award-number":["SPJ-17.1\/D1\/INKA\/2019"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A Train Control and Monitoring System (TCMS) is a vital part of monitoring sensors in a train. The data output of sensors is sent wirelessly to the data server for monitoring. However, as the wireless channel used to send the data is a shared public network, the transmitted data are prone to hackers and attacks. This paper proposes the Securebox architecture to manage secure data transfer from the onboard Vehicle Control Unit (VCU) to the data server in TCMS. The architecture is comprised of four main functions: network management, buffer management, data management, and security management. The architecture has been successfully developed in an HSM (Hardware Security Modul) and verified using alpha and beta software testing to form a secure TCMS. From the real-time testing phase in an electric-diesel train, the average performance of the AES-based HSM showed 55% faster time processing with unnoticed 0.1% added memory usage compared to the 3DES. The secure TCMS also withstands MITM attack and provides end-to-end data security compared to the (Mobile Station) MS to Base Station (BS) only in GSM-R.<\/jats:p>","DOI":"10.3390\/s23031341","type":"journal-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T01:30:30Z","timestamp":1674696630000},"page":"1341","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Security Architecture for Secure Train Control and Monitoring System"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5608-4723","authenticated-orcid":false,"given":"Yudha","family":"Purwanto","sequence":"first","affiliation":[{"name":"School of Electrical Engineering, Telkom University, Jl. Telekomunikasi No. 1, Bandung 40257, Indonesia"}]},{"given":"Muhammad Faris","family":"Ruriawan","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Telkom University, Jl. Telekomunikasi No. 1, Bandung 40257, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5106-7561","authenticated-orcid":false,"given":"Andry","family":"Alamsyah","sequence":"additional","affiliation":[{"name":"School of Economics and Business, Telkom University, Jl. Telekomunikasi No. 1, Bandung 40257, Indonesia"}]},{"given":"Febry Pandu","family":"Wijaya","sequence":"additional","affiliation":[{"name":"Indonesian Rolling Stock Industry, Jl. Yos Sudarso No. 71, Madiun 63122, Indonesia"}]},{"given":"Dewi Nala","family":"Husna","sequence":"additional","affiliation":[{"name":"Indonesian Rolling Stock Industry, Jl. Yos Sudarso No. 71, Madiun 63122, Indonesia"}]},{"given":"Agri","family":"Kridanto","sequence":"additional","affiliation":[{"name":"Indonesian Rolling Stock Industry, Jl. Yos Sudarso No. 71, Madiun 63122, Indonesia"}]},{"given":"Fifin","family":"Nugroho","sequence":"additional","affiliation":[{"name":"Indonesian Rolling Stock Industry, Jl. Yos Sudarso No. 71, Madiun 63122, Indonesia"}]},{"given":"Anang","family":"Fakhrudin","sequence":"additional","affiliation":[{"name":"Indonesian Rolling Stock Industry, Jl. Yos Sudarso No. 71, Madiun 63122, Indonesia"}]},{"given":"Mu\u2019ammar","family":"Itqon","sequence":"additional","affiliation":[{"name":"Indonesian Rolling Stock Industry, Jl. Yos Sudarso No. 71, Madiun 63122, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1326-2195","authenticated-orcid":false,"given":"Mochamad Yudha","family":"Febrianta","sequence":"additional","affiliation":[{"name":"School of Economics and Business, Telkom University, Jl. Telekomunikasi No. 1, Bandung 40257, Indonesia"}]},{"given":"Sri","family":"Widiyanesti","sequence":"additional","affiliation":[{"name":"School of Economics and Business, Telkom University, Jl. Telekomunikasi No. 1, Bandung 40257, Indonesia"}]},{"given":"Fussy","family":"Mentari","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Telkom University, Jl. Telekomunikasi No. 1, Bandung 40257, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9377-9532","authenticated-orcid":false,"given":"Alfian Akbar","family":"Gozali","sequence":"additional","affiliation":[{"name":"School of Applied Science, Telkom University, Jl. Telekomunikasi, Bandung 40257, Indonesia"}]},{"given":"Ade","family":"Romadhony","sequence":"additional","affiliation":[{"name":"School of Applied Science, Telkom University, Jl. Telekomunikasi, Bandung 40257, Indonesia"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Rekik, M., Gransart, C., and Berbineau, M. (2018, January 19\u201321). Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems. Proceedings of the 2018 International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy.","DOI":"10.1109\/ISNCC.2018.8531005"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Neil, G. (2014, January 3\u20136). On Board Train Control and Monitoring Systems. Proceedings of the IET 13th Professional Development Course on Electric Traction Systems, London, UK.","DOI":"10.1049\/cp.2014.1443"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Marinov, M. (2018). Sustainable Rail Transport, Lecture Notes in Mobility, Springer.","DOI":"10.1007\/978-3-319-58643-4"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2156529","DOI":"10.1155\/2021\/2156529","article-title":"Electrical Control Online Monitoring System Based on Internet of Things","volume":"2021","author":"Fan","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"032144","DOI":"10.1088\/1757-899X\/394\/3\/032144","article-title":"Research on Signal Control System of Urban Rail Transit Based on Communication Technology","volume":"394","author":"Wei","year":"2018","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6353","DOI":"10.1109\/JIOT.2019.2919066","article-title":"Cyber-Physical Vulnerability Analysis of Communication-Based Train Control","volume":"6","author":"Kim","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCOM.2015.7295471","article-title":"Cyber security analysis of the European train control system","volume":"53","author":"Lopez","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Jafarnejad, S., Codeca, L., Bronzi, W., Frank, R., and Engel, T. (2015, January 6\u201310). A Car Hacking Experiment: When Connectivity Meets Vulnerability. Proceedings of the IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA.","DOI":"10.1109\/GLOCOMW.2015.7413993"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Butun, I., Sari, A., and \u00d6sterberg, P. (2020). Hardware Security of Fog End-Devices for the Internet of Things. Sensors, 20.","DOI":"10.3390\/s20205729"},{"key":"ref_10","first-page":"8348925","article-title":"Security Requirements Engineering in Safety-Critical Railway Signalling Networks","volume":"2019","author":"Heinrich","year":"2019","journal-title":"Secur. Commun. Networks"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sanchez-Avila, C., and Sanchez-Reillol, R. (2001, January 16\u201319). The Rijndael block cipher (AES proposal): A Comparison with DES. Proceedings of the IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186), London, UK.","DOI":"10.1109\/CCST.2001.962837"},{"key":"ref_12","first-page":"151","article-title":"A Performance Comparison of Encryption A Performance Comparison of Encryption Algorithms AES and DES","volume":"4","author":"Khalid","year":"2015","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_13","first-page":"5634181","article-title":"A Framework for Vulnerability Detection in European Train Control Railway Communications","volume":"2018","author":"Arsuaga","year":"2018","journal-title":"Secur. Commun. Networks"},{"key":"ref_14","first-page":"127","article-title":"Research and Improvement on Security of GSM-R System","volume":"33","author":"Hao","year":"2009","journal-title":"J. Beijing Jiaotong Univ."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Levshun, D., Bakhtin, Y., Chechulin, A., and Kotenko, I. (2019, January 17\u201319). Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model. Proceedings of the International Symposium on Mobile Internet Security (MobiSec), Taichung, Taiwan.","DOI":"10.1007\/978-981-15-9609-4_11"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"103482","DOI":"10.1016\/j.micpro.2020.103482","article-title":"The application of the methodology for secure cyber\u2013physical systems design to improve the semi-natural model of the railway infrastructure","volume":"87","author":"Levshun","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Song, Y., Bu, B., and Zhu, L. (2020). A Novel Intrusion Detection Model Using a Fusion of Network and Device States for Communication-Based Train Control Systems. Electronics, 9.","DOI":"10.3390\/electronics9010181"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Miller, N., Satsrisakul, Y., Faist, K., Fehling-Kaschek, M., Crabbe, S., Poliotti, M., Naderpajouh, N., Setunge, S., Erg\u00fcn, S., and Kanak, A. (2021, January 19\u201323). A Risk and Resilience Assessment Approach for Railway Networks. Proceedings of the 31st European Safety and Reliability Conference (ESREL), Angers, France.","DOI":"10.3850\/978-981-18-2016-8_402-cd"},{"key":"ref_19","unstructured":"Soderi, S., H\u00e4m\u00e4l\u00e4inen, M., and Iinatti, J. (2016, January 17\u201319). Cybersecurity considerations for Communication Based Train Control. Proceedings of the Seventh Nordic Workshop on System and Network Optimization for Wireless (SNOW), Cortina d\u2019Ampezzo, Italy."},{"key":"ref_20","unstructured":"International Electrotechnical Commission (2009). IEC\/TR 62443 Industrial Communication Networks-Network and System Security-Security Technologies for Industrial Automation and Control Systems, IEC."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Pandian, A., Fernando, X., and Islam, S. (2021). Computer Networks, Big Data and IoT, Springer. Lecture Notes on Data Engineering and Communications Technologies.","DOI":"10.1007\/978-981-16-0965-7"},{"key":"ref_22","first-page":"121","article-title":"Cost Analysis for Classification-based Autonomous Response Systems","volume":"20","author":"Purwanto","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1109\/COMST.2015.2496624","article-title":"A Survey of Mobile VPN Technologies","volume":"18","author":"Alshalan","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MVT.2016.2564446","article-title":"High-Speed Railway Communications: From GSM-R to LTE-R","volume":"11","author":"He","year":"2016","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1364\/AOP.361502","article-title":"Advances in quantum cryptography","volume":"12","author":"Pirandola","year":"2020","journal-title":"Adv. Opt. Photonics"},{"key":"ref_26","unstructured":"American National Standard (2007). ANSI\/ISA-99.00.01-2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, ISA."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Luo, X. (2014). Analysis for the Security of Industrial Control System and Coping Strategies, Trans Tech Publications, Ltd.. Advanced Materials Research.","DOI":"10.4028\/www.scientific.net\/AMR.1039.427"},{"key":"ref_28","unstructured":"(2021). Railway Applications\u2014Rolling Stock\u2014Electronic Equipment (Standard No. EN 50155:2017)."},{"key":"ref_29","unstructured":"(2019). Railway Applications. Electromagnetic Compatibility Emission and Immunity of the Signalling and Telecommunications Apparatus (Standard No. BS EN 50121-4:2016+A1:2019)."},{"key":"ref_30","unstructured":"Intel Corporation (2022). Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manuals, Intel Corporation. Available online: https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/671436."},{"key":"ref_31","unstructured":"Socolofsky, T., and Kale, C. (2022, December 20). \u201cA TCP\/IP Tutorial\u201d. Network Working Group Request for Comments: 1180. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc1180."},{"key":"ref_32","unstructured":"Griesemer, R., and Language, G.P. (2021, August 20). Writing Web Applications\u2014The Go Programming Language. Available online: https:\/\/golang.org\/doc\/articles\/wiki\/."},{"key":"ref_33","unstructured":"Frankel, S., Glenn, R., and Kelly, S. (2022, December 20). \u201cThe AES-CBC Cipher Algorithm and Its Use with IPsec\u201d, Network Working Group Request for Comments: 3602. Available online: https:\/\/www.ietf.org\/rfc\/rfc3602.txt."},{"key":"ref_34","unstructured":"(2022, December 20). The PostgreSQL Global Development Group. \u201cPostgreSQL 13.4 Documentation\u201d. Available online: https:\/\/www.postgresql.org\/docs\/13\/release-13-4.html."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Hu, J., Zhao, W., and Cui, Y. (2020, January 15\u201317). A Survey on SQL Injection Attacks, Detection, and Prevention. Proceedings of the 2020 12th International Conference on Machine Learning and Computing (ICMLC), Shenzhen, China.","DOI":"10.1145\/3383972.3384028"},{"key":"ref_36","unstructured":"The World Wide Web Consortium (W3C) (2022, December 20). \u201cPush API\u201d, W3C Working Draft. Available online: https:\/\/www.w3.org\/TR\/push-api\/."},{"key":"ref_37","first-page":"241","article-title":"A Comparison of the 3DES and AES Encryption Standards","volume":"9","author":"Aleisa","year":"2015","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"210610","DOI":"10.5614\/j.eng.technol.sci.2021.53.6.10","article-title":"Acquaintance Management Algorithm Based on the Multi-Class Risk-Cost Analysis for Collaborative Intrusion Detection Network","volume":"53","author":"Purwanto","year":"2021","journal-title":"J. Eng. Technol. Sci."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1341\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:15:15Z","timestamp":1760120115000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,25]]},"references-count":38,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031341"],"URL":"https:\/\/doi.org\/10.3390\/s23031341","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,25]]}}}