{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:47:32Z","timestamp":1768920452876,"version":"3.49.0"},"reference-count":109,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2015,7,2]],"date-time":"2015-07-02T00:00:00Z","timestamp":1435795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client\/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client\/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.<\/jats:p>","DOI":"10.3390\/sym7031176","type":"journal-article","created":{"date-parts":[[2015,7,3]],"date-time":"2015-07-03T12:24:56Z","timestamp":1435926296000},"page":"1176-1210","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0265-545X","authenticated-orcid":false,"given":"Aamir","family":"Shahzad","sequence":"first","affiliation":[{"name":"Center for Advanced Image and Information Technology,School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea"}]},{"given":"Malrey","family":"Lee","sequence":"additional","affiliation":[{"name":"Center for Advanced Image and Information Technology,School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea"}]},{"given":"Young-Keun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Orthopedic Surgery, Chonbuk National University Hospital, Jeonju, Jeonbuk 561-721, Korea"}]},{"given":"Suntae","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Colorado Technical University, 4435 North Chestnut Street, Colorado Spring, CO 80907, USA"}]},{"given":"Jae-Young","family":"Choi","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University,  Suwon 440-746, Korea"}]},{"given":"Younghwa","family":"Cho","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University,  Suwon 440-746, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2015,7,2]]},"reference":[{"key":"ref_1","unstructured":"Reynders, D., Mackay, S., and Wright, E. (2004). Practical Industrial Data Communications: Best Practice Techniques, Butterworth-Heinemann."},{"key":"ref_2","unstructured":"Stouffer, J., and Kent, K. (2011). Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Recommendations of the National Institute of Standards and Technology, NIST."},{"key":"ref_3","unstructured":"National Communications System (2004). Supervisory Control and Data Acquisition (SCADA) Systems, National Communications System. Technical Information Bulletin 04-1."},{"key":"ref_4","unstructured":"Boyer, S.A. (2004). Scada: Supervisory Control and Data Acquisition, Instrumentation, Systems and Automation Society."},{"key":"ref_5","unstructured":"The Modbus Organization (2004). MODBUS Messaging on TCP\/IP Implementation Guide V1.0a, Modbus Organization."},{"key":"ref_6","unstructured":"The Modbus Organization (2004). MODBUS Application Protocol Specification V1.1a, Modbus Organization."},{"key":"ref_7","unstructured":"The Modbus Organization (2000). MODBUS Protocol, Modbus Organization."},{"key":"ref_8","unstructured":"Susanto, I., Jackson, R., and Paul, D.L. (2009). Wiley Handbook of Science and Technology for Homeland Security, John Wiley & Sons."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Stavroulakis, P., and Stamp, M. (2010). Handbook on Information and Communication Security, Springer.","DOI":"10.1007\/978-3-642-04117-4"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.isatra.2011.08.003","article-title":"Development of an automatic subsea Blow out preventer stack control system using PLC based SCADA","volume":"51","author":"Cai","year":"2012","journal-title":"ISA Trans."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/S0019-0578(07)60066-4","article-title":"Mobile phone based SCADA for industrial automation","volume":"45","author":"Ozdemir","year":"2006","journal-title":"ISA Trans."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-0-387-75462-8_15","article-title":"Security Analysis of Multilayer SCADA Protocols","volume":"Volume 253","author":"Edmonds","year":"2008","journal-title":"Critical Infrastructure Protection, IFIP International Federation for Information Processing"},{"key":"ref_13","unstructured":"Digi Remote Cellular TCP\/IP Access to MODBUS Ethernet and Serial Devices. Available online: http:\/\/ftp1.digi.com\/support\/documentation\/90000772_a.pdf."},{"key":"ref_14","first-page":"473","article-title":"SCADA Network Insecurity:Securing Critical Infrastructures through SCADA Security Exploitation","volume":"2009","author":"Cagalaban","year":"2009","journal-title":"J. Secur. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.isatra.2013.02.005","article-title":"Secure SCADA communication by using a modified key management scheme","volume":"52","author":"Rezai","year":"2013","journal-title":"ISA Trans."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1521","DOI":"10.1016\/j.ijepes.2009.03.004","article-title":"Proposal strategies of key management for data encryption in SCADA network of electric power systems","volume":"33","author":"Kang","year":"2011","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_17","unstructured":"Lee, S., Choi, D., Park, C., and Kim, S. An efficient key management scheme for secure SCADA communication. Available online: http:\/\/www.waset.org\/publications\/15268."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MPAE.2005.1405870","article-title":"A failure to communicate: Next generation communication requirements, technologies, and architecture for the electric power grid","volume":"3","author":"Hauser","year":"2005","journal-title":"IEEE Power Energy Mag."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Pietre-cambacedes, L., and Sitbon, P. (2008, January 24\u201326). Cryptographic key management for SCADA systems-issues and perspectives. Proceedings of the IEEE International Conference on Information Security and Assurance, Busan, Korea.","DOI":"10.1109\/ISA.2008.77"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Xiao, L., Yen, I., and Bastani, F. (2010, January 8\u201310). Scalable authentication and key management in SCADA. Proceedings of the IEEE International Conference on Parallel and Distributed Systems, Shanghai, China.","DOI":"10.1109\/ICPADS.2010.66"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","article-title":"Security issues in SCADA networks","volume":"25","author":"Igure","year":"2006","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.ijcip.2008.08.003","article-title":"Attack taxonomies for the MODBUS protocols","volume":"1","author":"Huitsing","year":"2008","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Hong, S., and Lee, M. (2010, January 11\u201314). Challenges and Direction toward Secure Communication in the SCADA System. Proceedings of the 2010 Eighth Annual Communication Networks and Services Research Conference (CNSR), Montreal, QC, Canada.","DOI":"10.1109\/CNSR.2010.52"},{"key":"ref_24","unstructured":"Pfleeger, C., and Pfleeger, S.L. (2007). Security in Computing, Prentice Hall."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Musa, S., Aborujilah, A., and Irfan, M. (2013, January 23\u201324). Secure Cryptography Testbed Implementation for SCADA Protocols Security. Proceedings of 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuching, Malaysia.","DOI":"10.1109\/ACSAT.2013.69"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ten, C.-W., Liu, C.-C., and Govindarasu, M. (2007, January 24\u201328). Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees. Proceedings of the 2007 IEEE Power Engineering Society General Meeting, Tampa, FL, USA.","DOI":"10.1109\/PES.2007.385876"},{"key":"ref_27","unstructured":"Lee, D., Kim, H., Kim, K., and Yoo, P.D. (2014, January 21\u201324). Simulated Attack on DNP3 Protocol in SCADA System. Proceedings of the 31th Symposium on Cryptography and Information Security, Kagoshima, Japan."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s00145-011-9114-1","article-title":"Secure integration of asymmetric and symmetric metric encryption schemes","volume":"26","author":"Fujisaki","year":"2013","journal-title":"J. Cryptol."},{"key":"ref_29","unstructured":"Graham, J., and Patel, S. (2004). Security Considerations in SCADA Communication Protocols, Intelligent Systems Research Laboratory. Technical Report TR-ISRL-04-01."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"381","DOI":"10.3923\/tasr.2014.381.395","article-title":"N-Secure Cryptography Solution for SCADA Security Enhancement","volume":"9","author":"Shahzad","year":"2014","journal-title":"Trends Appl. Sci. Res."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","article-title":"Kerberos: An authentication service for computer networks","volume":"32","author":"Neuman","year":"1994","journal-title":"IEEE Commun. Mag."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kang, H.M., and Kim, A. (2007, January 6\u20138). Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. Proceedings of the Future Generation Communication and Networking (FGCN 2007), Jeju, Korea.","DOI":"10.1109\/FGCN.2007.36"},{"key":"ref_33","unstructured":"Nazri, M., and Alsharafi, A. (2013, January 23\u201324). Flooding Based DoS Attack Feature Selection Using Remove Correlated Attributes Algorithm. Proceedings of 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuching, Malaysia."},{"key":"ref_34","first-page":"177","article-title":"Protection of SCADA communication channels","volume":"Volume 7130","author":"Khelil","year":"2012","journal-title":"Critical Infrastructure Protection, Proceedings of the Critical Infrastructure Protection Lecture Notes in Computer Science"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TPWRD.2009.2034830","article-title":"A trust system architecture for SCADA network security","volume":"25","author":"Coates","year":"2010","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kim, H.J. (2012). Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks. Int. J. Distrib. Sens. Netw., 2012.","DOI":"10.1155\/2012\/268478"},{"key":"ref_37","first-page":"40","article-title":"AGA 12 recommends how to protect SCADA communications from cyber attack","volume":"233","author":"Rush","year":"2006","journal-title":"Pipeline Gas J."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Rezai, A., and Keshavarzi, P. (2011, January 21\u201323). High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common- multiplicand\u2013multiplication method. Proceedings of the IEEE World Congress on Internet Security, London, UK.","DOI":"10.1109\/WorldCIS17046.2011.5749849"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1016\/j.jlp.2009.07.015","article-title":"Reducing security vulnerabilities for critical infrastructure","volume":"22","author":"Ryu","year":"2009","journal-title":"J. Loss Prev. Process Ind."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Rezai, A., and Keshavarzi, P. (2011, January 16\u201318). High-performance implementation approach of elliptic curve cryptosystem for wireless network applications. Proceedings of the 2011 IEEE International Conference on Consumer Electronic, Communication and Networks (CECNet), XianNing, China.","DOI":"10.1109\/CECNET.2011.5768248"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"4269","DOI":"10.1016\/j.comcom.2008.05.043","article-title":"A unified security framework with three key management schemes for wireless sensor networks","volume":"31","author":"Riaz","year":"2008","journal-title":"Comput. Commun."},{"key":"ref_42","unstructured":"Dawson, R., Boyd, C., Dawson, E., and Nieto, J. (2006, January 16\u201319). SKMA, a key management architecture for SCADA systems. Proceedings of the fourth Australasian information security workshop, Hobart, Australia."},{"key":"ref_43","unstructured":"Beaver, C., Gallup, D., Neumann, W., and Torgerson, M. Key Management for SCADA, Available online: http:\/\/www.sandia.gov\/scada\/documents\/013252.pdf."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1109\/TPWRD.2008.2005683","article-title":"Advanced key management architecture for SCADA communications","volume":"24","author":"Choi","year":"2009","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TPWRD.2009.2036181","article-title":"Efficient secure group communications for SCADA","volume":"25","author":"Choi","year":"2010","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_46","first-page":"281","article-title":"Hybrid key management architecture for robust SCADA systems","volume":"29","author":"Choi","year":"2013","journal-title":"J. Inf. Sci. Eng."},{"key":"ref_47","unstructured":"Rezai, A., Keshavarzi, P., and Moravej, Z. (2011, January 1\u20134). A new key management scheme for SCADA network. Proceedings of the 2nd International Symposium on Computing in Science and Engineering, Ayd\u0131n, Turkey."},{"key":"ref_48","unstructured":"Almanei, S., Alqattan, M., Khamis, R., and Hussain, Y. (2000). TCP\/IP Protocol Possible Attacks, Oregon State University."},{"key":"ref_49","unstructured":"Du, W.L. (2010). Attack Lab: Attacks on TCP\/IP Protocol, Syracuse University."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Mander, T., Nabhani, F., Wang, L., and Cheung, R. (2007, January 24\u201328). Data Object Based Security for DNP3 Over TCP\/IP for Increased Utility Commercial Aspects Security. Proceedings of the 2007 IEEE Power Engineering Society General Meeting, Tampa, FL, USA.","DOI":"10.1109\/PES.2007.386243"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Musa, S., Adulaziz, A., and Irfan, M. (2014, January 9\u201311). Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, Siem Reap, Cambodia.","DOI":"10.1145\/2557977.2558061"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-642-04798-5_6","article-title":"Design And Implementation of a Secure Modbus Protocol","volume":"Volume 311","author":"Fovino","year":"2009","journal-title":"Critical Infrastructure Protection III"},{"key":"ref_53","unstructured":"Byres, E.J., Franz, M., and Mille, D. (2004, January 4). The use of attack trees in assessing vulnerabilities in SCADA systems. Proceedings of the IEEE Conference on International Infrastructure Survivability Workshop (IISW \u201904), Institute for Electrical and Electronics Engineers, Lisbon, Portugal. Available online: http:\/\/www.ida.liu.se\/labs\/rtslab\/iisw04\/camready\/SCADA-Attack-Trees-Final.pdf."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"kofahi, N.A. (2013). An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers. Int. J. Secur. Appl., 7, Available online: http:\/\/www.sersc.org\/journals\/IJSIA\/vol7_no5_2013\/1.pdf.","DOI":"10.14257\/ijsia.2013.7.5.01"},{"key":"ref_55","unstructured":"Frankel, Y., MacKenzie, P.D., and Yung, M. Robust efficient distributed RSA-key generation. Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing STOC '98)."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/sec.698","article-title":"SCADA communication and security issues","volume":"7","author":"Gao","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"144","DOI":"10.14257\/astl.2015.95.27","article-title":"Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements","volume":"95","author":"Chae","year":"2015","journal-title":"Adv. Sci. Technol. Lett."},{"key":"ref_58","unstructured":"Majdalawieh, M., Parisi-Presicce, F., and Wijesekera, D. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. Advances in Computer, Information, and Systems Sciences, and Engineering, Proceedings of IETA 2005, TeNe 2005, EIAE 2005."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.3390\/sym6041011","article-title":"Privacy-Enhancing Security Protocol in LTE Initial Attack","volume":"6","author":"Jang","year":"2014","journal-title":"Symmetry"},{"key":"ref_60","first-page":"1","article-title":"Security for Industrial Control Systems Based on Wireless Sensor Networks","volume":"2014","author":"Lu","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_61","unstructured":"Rosa, T. Key-collisions in (EC) DSA: Attacking Non-repudiation. Extended version of the paper supporting a brief talk given at the CRYPTO 2002\u00a0Rump Session. Available online: https:\/\/eprint.iacr.org\/2002\/129.pdf."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.cose.2012.11.009","article-title":"A taxonomy and survey of attacks on digital signatures","volume":"34","author":"Ramos","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_63","unstructured":"Pajcin, B.R., and Ivanis, P.N. (2011). Analysis of Software Realized DSA Algorithm for Digital Signature. Electronics, 15, Available online: http:\/\/electronics.etfbl.net\/journal\/Vol15No2\/xPaper_12.pdf."},{"key":"ref_64","unstructured":"Chen, H., Shen, X., and Wei, W. (2009, January 7\u20138). Digital Signature Algorithm Based on Hash Round Function and Self-Certified Public Key System. Proceedings of the First International Workshop on Education Technology and Computer Science, Wuhan, China."},{"key":"ref_65","unstructured":"Kumar, H., and Singh, A. (2012). An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key Cryptography. IJRREST Int. J. Res. Rev. Eng. Sci. Technol., 1, Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.300.6509."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"320","DOI":"10.4304\/jsw.5.3.320-327","article-title":"A New Digital Signature Algorithm Similar to ELGamal Type","volume":"5","author":"Chen","year":"2010","journal-title":"J. Softw."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"2487","DOI":"10.3923\/jas.2014.2487.2497","article-title":"Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement","volume":"14","author":"Shahzad","year":"2014","journal-title":"J. Appl. Sci."},{"key":"ref_68","unstructured":"Test Harness, Triangle MicroWorks. Available online: www.trianglemicroworks.com."},{"key":"ref_69","first-page":"69","article-title":"Token Based Key Management Scheme for SCADA Communication","volume":"2","author":"Saxena","year":"2011","journal-title":"Int. J. Distrib. Parallel Syst."},{"key":"ref_70","unstructured":"An Ettercap Primer. Available online: http:\/\/www.sans.org\/reading-room\/whitepapers\/tools\/ettercap-primer-1406."},{"key":"ref_71","unstructured":"Ethereal. Available online: http:\/\/www.engr.siu.edu\/~weng\/ece553\/wireshark-tutorial.pdf."},{"key":"ref_72","unstructured":"Aircrack. Available online: http:\/\/www.aircrack-ng.org\/doku.php?id=cracking_wpa."},{"key":"ref_73","unstructured":"Air Snort. Available online: http:\/\/www.scribd.com\/doc\/50711790\/airsnort-tutorial#scribd."},{"key":"ref_74","unstructured":"Packet Sniffer. Available online: https:\/\/www.mikrotik.com\/testdocs\/ros\/2.9\/tools\/sniffer.pdf."},{"key":"ref_75","unstructured":"Dniffer. Available online: http:\/\/www.giac.org\/paper\/gsec\/810\/introduction-dsniff\/101714."},{"key":"ref_76","unstructured":"Airpwn. Available online: http:\/\/airpwn.sourceforge.net\/Documentation.html."},{"key":"ref_77","unstructured":"File2air. Available online: http:\/\/www.willhackforsushi.com\/?page_id=126."},{"key":"ref_78","unstructured":"Son, S., McKinley, K.S., and Shmatikov, V. Diglossia: Detecting Code Injection Attacks with Precision and Efficiency. Available online: https:\/\/www.cs.utexas.edu\/~shmat\/shmat_ccs13.pdf."},{"key":"ref_79","unstructured":"Valdes, A., and Zamboni, D. Defending against injection attacks through context-sensitive string evaluation. Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection (RAID'05)."},{"key":"ref_80","unstructured":"Pinkas, B., and Sander, T. Securing Passwords Against Dictionary Attacks. Available online: http:\/\/www.pinkas.net\/PAPERS\/pwdweb.pdf."},{"key":"ref_81","unstructured":"Narayanan, A., and Shmatikov, V. Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff. Available online: https:\/\/www.cs.utexas.edu\/~shmat\/shmat_ccs05pwd.pdf."},{"key":"ref_82","unstructured":"Wireless Modbus TCP Communication. Available online: http:\/\/www.connectblue.com\/press\/articles\/robust-wireless-modbus-tcp-communication\/."},{"key":"ref_83","unstructured":"White Paper. Process Control and Automation using Modbus Protocol. Available online: https:\/\/www.amplicon.com\/docs\/white-papers\/MODBUS-in-Process-control.pdf."},{"key":"ref_84","unstructured":"R9120\u20131 ModHopper Wireless Modbus\/Pulse Transceiver. Available online: http:\/\/www.chipkin.com\/files\/products\/modhopper\/R9120\u20131Cutsheet.pdf."},{"key":"ref_85","unstructured":"ProSoft Implementing Modbus TCP over Wireless. Available online: http:\/\/www.prosofttechnology.com\/content\/download\/4598\/32774\/file\/rlxihw_wireless+modbus+tcp_v31.pdf."},{"key":"ref_86","unstructured":"Application Note. Wireless Modbus Systems. Available online: http:\/\/www.mtl-inst.com\/images\/uploads\/AN9033.pdf."},{"key":"ref_87","unstructured":"Wireless MeshScape Gateway\u2014Wi-Modbus TCP. Available online: http:\/\/millennialnet.com\/EnergyManagement\/Products\/Wi-Modbus-TCP.asp."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"396","DOI":"10.3923\/tasr.2014.396.405","article-title":"Security Solution for SCADA Protocols Communication during Multicasting and Polling Scenario","volume":"9","author":"Shahzad","year":"2014","journal-title":"Trends Appl. Sci. Res."},{"key":"ref_89","unstructured":"DNP Users Group (2005). DNP3 Application Layer Specification, DNP Organization. Version 2.00."},{"key":"ref_90","unstructured":"DNP Users Group (2010). DNP3 Specification, Secure Authentication, DNP Organization. Supplement to Volume 2."},{"key":"ref_91","unstructured":"Hieb, J.L., Graham, J.H., and Patel, S.C. (2007). Cyber Security Enhancements for SCADA and DCS Systems, ISRL-TR-07-02, Intelligent Systems Research Laboratory, University of Louisville. Technical Report TR-ISRL-07-02."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-0-387-75462-8_10","article-title":"Security Enhancements for Distributed Control Systems","volume":"253","author":"Hieb","year":"2008","journal-title":"Critical Infrastructure Protection, IFIP International Federation for Information Processing"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Moral-Garcia, S., Moral-Rubio, S., Rosado, D.G., Fernandez, E.B., and Fernandez-Medina, E. (2014). Enterprise security pattern: A new type of security pattern. Secur. Commun. Netw., 1670\u20131690.","DOI":"10.1002\/sec.863"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Irshad, A., Sher, M., and Faisal, M.S. (2014). A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commum. Netw., 1210\u20131218.","DOI":"10.1002\/sec.834"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Lim, S., Lee, E., and Park, C.-M. (2014). Equivalent public keys and a key substitution attack on the schemes from vector decomposition. Secur. Commum. Netw., 1274\u20131282.","DOI":"10.1002\/sec.860"},{"key":"ref_96","unstructured":"Drahansky, M., and Balitanas, M. Cipher for Internet-based Supervisory Control and Data Acquisition Architecture. Available online: http:\/\/www.sersc.org\/journals\/JSE\/vol8_no3_2011\/1.pdf."},{"key":"ref_97","unstructured":"Shbib, R., Zhou, S., and Alkadhimi, K. (2013). Pervasive Computing and the Networked World, Springer Berlin Heidelberg."},{"key":"ref_98","unstructured":"Johnson, R.E. (2010, January 8\u201311). Survey of SCADA security challenges and potential attack vectors. Proceedings of 2010 International Conference for Internet Technology and Secured Transactions (ICITST), London, UK."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"938","DOI":"10.3390\/sym6040938","article-title":"Design of a Secure System Considering Quality of Service","volume":"6","author":"Heo","year":"2014","journal-title":"Symmetry"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"997","DOI":"10.3390\/sym6040997","article-title":"MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats","volume":"6","author":"Moon","year":"2014","journal-title":"Symmetry"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/sym7010001","article-title":"A Study on Electronic-Money Technology Using Near Field Communication","volume":"7","author":"Jung","year":"2015","journal-title":"Symmetry"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3390\/sym7010105","article-title":"Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting","volume":"7","author":"Nam","year":"2015","journal-title":"Symmetry"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1002\/sec.506","article-title":"A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography","volume":"5","author":"He","year":"2012","journal-title":"Secur. Commun. Netw."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-0-387-75462-8_9","article-title":"Security Strategies for SCADA Networks","volume":"Volume 253","author":"Chandia","year":"2008","journal-title":"Critical Infrastructure Protection, IFIP International Federation for Information Processing"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","article-title":"Beyond lightning: A survey on security challenges in cloud computing","volume":"39","author":"Rong","year":"2013","journal-title":"Comput. Electr. Eng."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1002\/sec.853","article-title":"RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions","volume":"7","author":"Chen","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/sec.701","article-title":"Securing virtual private LAN service by efficient key management","volume":"7","author":"Liyanage","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1002\/sec.852","article-title":"Privacy and integrity preserving skyline queries in tiered sensor networks","volume":"7","author":"Li","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1002\/sec.406","article-title":"Secure communication for the Internet of Things\u2014A comparison of link-layer security and IPsec for 6LoWPAN","volume":"7","author":"Raza","year":"2014","journal-title":"Secur. Commun. Netw."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/7\/3\/1176\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:48:39Z","timestamp":1760215719000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/7\/3\/1176"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,2]]},"references-count":109,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,9]]}},"alternative-id":["sym7031176"],"URL":"https:\/\/doi.org\/10.3390\/sym7031176","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,2]]}}}