Power Generation Systems Need Blockchain Security

Human society is facing the critical challenges of climate change, more frequent extreme weathers, energy shortage, and ever-increasing energy demand and these challenges drive the reconstruction of the aging energy structure. 

The recent cyber attacks against oil pipeline giant Colonial Pipeline and other organisations in the US have highlighted the critical necessity to focus on cyber security.

 Modern power generating systems are rapidly evolving into complex cyber-physical systems and the increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber security infrastructure. 

Both government and industry are having to focus  attention on their critical infrastructure and the potential exposure to cyber attacks. Internet-based operations are now used to monitor industrial systems, commerce and aspects government which are  vulnerable to denial-of-service and cyber-attacks.

  • Industrial Control Systems (ICS) which control a physical plant through the use of sensors and actuators are the backbone of critical infrastructure found in power, water, manufacturing and other industries. 
  • Supervisory Control & Data Acquisition (SCADA) uses other peripheral devices such as discrete Proportional Integral Derivative (PID) and Programmable Logic Controllers (PLC) to interface with process machinery or plant. 

Companies typically use ICS and by extension SCADA systems, to gather real-time data on all aspects of industrial production, ranging from the refining of oil to the control of waste disposal and even coordinating the transportation of goods. SCADA systems are primarily made secure through local area network (LAN) and WAN devices. These tools allow for increased monitoring of SCADA processes. However, these systems can be breached in a variety of ways. 

A blockchain framework could help prevent such attacks, especially if it encompasses Internet-of-Things, 5G and other emerging technologies. Blockchain could provide increased security for SCADA systems by acting as an instrument of authentication, authorisation and non-repudiation of critical data. 

Blockchain is focused on creating trust in an untrusting ecosystem, making it a potentially strong cyber security technology. It is basically a public database with a growing set of data records that’s continuously maintained by nodes participating in the blockchain. Rather than having a single authentication server on the network act as the only source for authentication and data integrity verification, nodes in a blockchain use a distributed model, where the participating nodes maintain a continuously growing list of ordered records called blocks. 

Two specific cases that blockchain could be used in are as a secure protocol between SCADA display units and remote terminal units, and as a verification tool to validate system firmware and software. Integrating blockchain technology with Internet-of-Things devices and 5G could add additional layers of security for SCADA systems.

While powerful in their own respects, combining these revolutionary technologies through all-encompassing tools like private networks are the best way to secure SCADA systems in both the short and long term.

Science Direct:         I-HLS:       OPTO22:       Springer

You Might Also Read: 

Selecting The Right SCADA Technology:

 

« Data Privacy Is Key To The Technology Battle With China
Royal Cyber Security Significantly Increased »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Association of Information Security Professionals (AISP)

Association of Information Security Professionals (AISP)

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.