A Quantum-based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks
dc.contributor.author | Ghosh, Sagarika | |
dc.contributor.copyright-release | Yes | en_US |
dc.contributor.degree | Master of Computer Science | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | n/a | en_US |
dc.contributor.graduate-coordinator | Dr. Michael McAllister | en_US |
dc.contributor.manuscripts | Yes | en_US |
dc.contributor.thesis-reader | Dr. Qiang Ye | en_US |
dc.contributor.thesis-reader | Dr. Musfiq Rahman | en_US |
dc.contributor.thesis-supervisor | Dr. Srinivas Sampalli | en_US |
dc.date.accessioned | 2019-08-27T13:32:58Z | |
dc.date.available | 2019-08-27T13:32:58Z | |
dc.date.defence | 2019-08-06 | |
dc.date.issued | 2019-08-27T13:32:58Z | |
dc.description.abstract | Supervisory Control and Data Acquisition (SCADA) systems are used for monitoring industrial processes such as power grids, water supply systems, traffic control, oil and natural gas mining, space stations and nuclear plants. However, their security faces the threat of being compromised due to the increasing use of open access networks. Furthermore, the emergence of quantum computing has exposed a new type of threat to SCADA systems. Failure to secure SCADA systems can lead to catastrophic consequences. For example, a malicious attack can take control of the power supply to a city, shut down the water supply system, or cause malfunction of a nuclear reactor. The primary goal of this thesis is to classify attacks on SCADA systems, identify the new type of attack based on quantum computing, and design a novel security scheme to defend against traditional attacks as well as the quantum attack. The proposed Signcryption scheme provides both encryption and intrusion detection. In particular, it detects the man-in-the-middle attack as this intrusion can lead to others. The signcryption scheme is built on the foundation of the fundamental BB84 cryptographic scheme and does not involve computationally expensive third-party validation. We simulate the proposed scheme using the Quantum Information Toolkit in Python. Furthermore, we validate and analyze the proposed scheme using security verification tools, namely, Scyther and Prism. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/76313 | |
dc.language.iso | en | en_US |
dc.subject | Network security | en_US |
dc.subject | qubits | en_US |
dc.subject | Quantum cryptography | en_US |
dc.subject | SCADA networks | en_US |
dc.subject | Signcryption | en_US |
dc.title | A Quantum-based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Ghosh-Sagarika-MCSc-CSCI-August-2019.pdf
- Size:
- 1.36 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: