Power Generation Systems Need Blockchain Security

Human society is facing the critical challenges of climate change, more frequent extreme weathers, energy shortage, and ever-increasing energy demand and these challenges drive the reconstruction of the aging energy structure. 

The recent cyber attacks against oil pipeline giant Colonial Pipeline and other organisations in the US have highlighted the critical necessity to focus on cyber security.

 Modern power generating systems are rapidly evolving into complex cyber-physical systems and the increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber security infrastructure. 

Both government and industry are having to focus  attention on their critical infrastructure and the potential exposure to cyber attacks. Internet-based operations are now used to monitor industrial systems, commerce and aspects government which are  vulnerable to denial-of-service and cyber-attacks.

  • Industrial Control Systems (ICS) which control a physical plant through the use of sensors and actuators are the backbone of critical infrastructure found in power, water, manufacturing and other industries. 
  • Supervisory Control & Data Acquisition (SCADA) uses other peripheral devices such as discrete Proportional Integral Derivative (PID) and Programmable Logic Controllers (PLC) to interface with process machinery or plant. 

Companies typically use ICS and by extension SCADA systems, to gather real-time data on all aspects of industrial production, ranging from the refining of oil to the control of waste disposal and even coordinating the transportation of goods. SCADA systems are primarily made secure through local area network (LAN) and WAN devices. These tools allow for increased monitoring of SCADA processes. However, these systems can be breached in a variety of ways. 

A blockchain framework could help prevent such attacks, especially if it encompasses Internet-of-Things, 5G and other emerging technologies. Blockchain could provide increased security for SCADA systems by acting as an instrument of authentication, authorisation and non-repudiation of critical data. 

Blockchain is focused on creating trust in an untrusting ecosystem, making it a potentially strong cyber security technology. It is basically a public database with a growing set of data records that’s continuously maintained by nodes participating in the blockchain. Rather than having a single authentication server on the network act as the only source for authentication and data integrity verification, nodes in a blockchain use a distributed model, where the participating nodes maintain a continuously growing list of ordered records called blocks. 

Two specific cases that blockchain could be used in are as a secure protocol between SCADA display units and remote terminal units, and as a verification tool to validate system firmware and software. Integrating blockchain technology with Internet-of-Things devices and 5G could add additional layers of security for SCADA systems.

While powerful in their own respects, combining these revolutionary technologies through all-encompassing tools like private networks are the best way to secure SCADA systems in both the short and long term.

Science Direct:         I-HLS:       OPTO22:       Springer

You Might Also Read: 

Selecting The Right SCADA Technology:

 

« Data Privacy Is Key To The Technology Battle With China
Royal Cyber Security Significantly Increased »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab conducts research into predictive security analytics.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Bastion Technologies

Bastion Technologies

All your cyber defense. One platform. Keep your business assets and employees safe under one roof. Manage your cyber defense quickly, easily & efficiently.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.