Power Generation Systems Need Blockchain Security

Human society is facing the critical challenges of climate change, more frequent extreme weathers, energy shortage, and ever-increasing energy demand and these challenges drive the reconstruction of the aging energy structure. 

The recent cyber attacks against oil pipeline giant Colonial Pipeline and other organisations in the US have highlighted the critical necessity to focus on cyber security.

 Modern power generating systems are rapidly evolving into complex cyber-physical systems and the increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber security infrastructure. 

Both government and industry are having to focus  attention on their critical infrastructure and the potential exposure to cyber attacks. Internet-based operations are now used to monitor industrial systems, commerce and aspects government which are  vulnerable to denial-of-service and cyber-attacks.

  • Industrial Control Systems (ICS) which control a physical plant through the use of sensors and actuators are the backbone of critical infrastructure found in power, water, manufacturing and other industries. 
  • Supervisory Control & Data Acquisition (SCADA) uses other peripheral devices such as discrete Proportional Integral Derivative (PID) and Programmable Logic Controllers (PLC) to interface with process machinery or plant. 

Companies typically use ICS and by extension SCADA systems, to gather real-time data on all aspects of industrial production, ranging from the refining of oil to the control of waste disposal and even coordinating the transportation of goods. SCADA systems are primarily made secure through local area network (LAN) and WAN devices. These tools allow for increased monitoring of SCADA processes. However, these systems can be breached in a variety of ways. 

A blockchain framework could help prevent such attacks, especially if it encompasses Internet-of-Things, 5G and other emerging technologies. Blockchain could provide increased security for SCADA systems by acting as an instrument of authentication, authorisation and non-repudiation of critical data. 

Blockchain is focused on creating trust in an untrusting ecosystem, making it a potentially strong cyber security technology. It is basically a public database with a growing set of data records that’s continuously maintained by nodes participating in the blockchain. Rather than having a single authentication server on the network act as the only source for authentication and data integrity verification, nodes in a blockchain use a distributed model, where the participating nodes maintain a continuously growing list of ordered records called blocks. 

Two specific cases that blockchain could be used in are as a secure protocol between SCADA display units and remote terminal units, and as a verification tool to validate system firmware and software. Integrating blockchain technology with Internet-of-Things devices and 5G could add additional layers of security for SCADA systems.

While powerful in their own respects, combining these revolutionary technologies through all-encompassing tools like private networks are the best way to secure SCADA systems in both the short and long term.

Science Direct:         I-HLS:       OPTO22:       Springer

You Might Also Read: 

Selecting The Right SCADA Technology:

 

« Data Privacy Is Key To The Technology Battle With China
Royal Cyber Security Significantly Increased »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Judy Security

Judy Security

Judy provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.