Power Generation Systems Need Blockchain Security

Human society is facing the critical challenges of climate change, more frequent extreme weathers, energy shortage, and ever-increasing energy demand and these challenges drive the reconstruction of the aging energy structure. 

The recent cyber attacks against oil pipeline giant Colonial Pipeline and other organisations in the US have highlighted the critical necessity to focus on cyber security.

 Modern power generating systems are rapidly evolving into complex cyber-physical systems and the increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber security infrastructure. 

Both government and industry are having to focus  attention on their critical infrastructure and the potential exposure to cyber attacks. Internet-based operations are now used to monitor industrial systems, commerce and aspects government which are  vulnerable to denial-of-service and cyber-attacks.

  • Industrial Control Systems (ICS) which control a physical plant through the use of sensors and actuators are the backbone of critical infrastructure found in power, water, manufacturing and other industries. 
  • Supervisory Control & Data Acquisition (SCADA) uses other peripheral devices such as discrete Proportional Integral Derivative (PID) and Programmable Logic Controllers (PLC) to interface with process machinery or plant. 

Companies typically use ICS and by extension SCADA systems, to gather real-time data on all aspects of industrial production, ranging from the refining of oil to the control of waste disposal and even coordinating the transportation of goods. SCADA systems are primarily made secure through local area network (LAN) and WAN devices. These tools allow for increased monitoring of SCADA processes. However, these systems can be breached in a variety of ways. 

A blockchain framework could help prevent such attacks, especially if it encompasses Internet-of-Things, 5G and other emerging technologies. Blockchain could provide increased security for SCADA systems by acting as an instrument of authentication, authorisation and non-repudiation of critical data. 

Blockchain is focused on creating trust in an untrusting ecosystem, making it a potentially strong cyber security technology. It is basically a public database with a growing set of data records that’s continuously maintained by nodes participating in the blockchain. Rather than having a single authentication server on the network act as the only source for authentication and data integrity verification, nodes in a blockchain use a distributed model, where the participating nodes maintain a continuously growing list of ordered records called blocks. 

Two specific cases that blockchain could be used in are as a secure protocol between SCADA display units and remote terminal units, and as a verification tool to validate system firmware and software. Integrating blockchain technology with Internet-of-Things devices and 5G could add additional layers of security for SCADA systems.

While powerful in their own respects, combining these revolutionary technologies through all-encompassing tools like private networks are the best way to secure SCADA systems in both the short and long term.

Science Direct:         I-HLS:       OPTO22:       Springer

You Might Also Read: 

Selecting The Right SCADA Technology:

 

« Data Privacy Is Key To The Technology Battle With China
Royal Cyber Security Significantly Increased »

Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Security IT Summit

Security IT Summit

The Security IT Summit is a unique one-day event which allows senior IT & Cyber security professionals to meet with innovative and competitive suppliers to the industry.

Safe-T Data

Safe-T Data

At Safe-T, we have one goal; to keep your organization safe from attacks and data leakage by securing your access.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.