Power Generation Systems Need Blockchain Security

Human society is facing the critical challenges of climate change, more frequent extreme weathers, energy shortage, and ever-increasing energy demand and these challenges drive the reconstruction of the aging energy structure. 

The recent cyber attacks against oil pipeline giant Colonial Pipeline and other organisations in the US have highlighted the critical necessity to focus on cyber security.

 Modern power generating systems are rapidly evolving into complex cyber-physical systems and the increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber security infrastructure. 

Both government and industry are having to focus  attention on their critical infrastructure and the potential exposure to cyber attacks. Internet-based operations are now used to monitor industrial systems, commerce and aspects government which are  vulnerable to denial-of-service and cyber-attacks.

  • Industrial Control Systems (ICS) which control a physical plant through the use of sensors and actuators are the backbone of critical infrastructure found in power, water, manufacturing and other industries. 
  • Supervisory Control & Data Acquisition (SCADA) uses other peripheral devices such as discrete Proportional Integral Derivative (PID) and Programmable Logic Controllers (PLC) to interface with process machinery or plant. 

Companies typically use ICS and by extension SCADA systems, to gather real-time data on all aspects of industrial production, ranging from the refining of oil to the control of waste disposal and even coordinating the transportation of goods. SCADA systems are primarily made secure through local area network (LAN) and WAN devices. These tools allow for increased monitoring of SCADA processes. However, these systems can be breached in a variety of ways. 

A blockchain framework could help prevent such attacks, especially if it encompasses Internet-of-Things, 5G and other emerging technologies. Blockchain could provide increased security for SCADA systems by acting as an instrument of authentication, authorisation and non-repudiation of critical data. 

Blockchain is focused on creating trust in an untrusting ecosystem, making it a potentially strong cyber security technology. It is basically a public database with a growing set of data records that’s continuously maintained by nodes participating in the blockchain. Rather than having a single authentication server on the network act as the only source for authentication and data integrity verification, nodes in a blockchain use a distributed model, where the participating nodes maintain a continuously growing list of ordered records called blocks. 

Two specific cases that blockchain could be used in are as a secure protocol between SCADA display units and remote terminal units, and as a verification tool to validate system firmware and software. Integrating blockchain technology with Internet-of-Things devices and 5G could add additional layers of security for SCADA systems.

While powerful in their own respects, combining these revolutionary technologies through all-encompassing tools like private networks are the best way to secure SCADA systems in both the short and long term.

Science Direct:         I-HLS:       OPTO22:       Springer

You Might Also Read: 

Selecting The Right SCADA Technology:

 

« Data Privacy Is Key To The Technology Battle With China
Royal Cyber Security Significantly Increased »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.