Repository logo
 

A Quantum-based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks

dc.contributor.authorGhosh, Sagarika
dc.contributor.copyright-releaseYesen_US
dc.contributor.degreeMaster of Computer Scienceen_US
dc.contributor.departmentFaculty of Computer Scienceen_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.external-examinern/aen_US
dc.contributor.graduate-coordinatorDr. Michael McAllisteren_US
dc.contributor.manuscriptsYesen_US
dc.contributor.thesis-readerDr. Qiang Yeen_US
dc.contributor.thesis-readerDr. Musfiq Rahmanen_US
dc.contributor.thesis-supervisorDr. Srinivas Sampallien_US
dc.date.accessioned2019-08-27T13:32:58Z
dc.date.available2019-08-27T13:32:58Z
dc.date.defence2019-08-06
dc.date.issued2019-08-27T13:32:58Z
dc.description.abstractSupervisory Control and Data Acquisition (SCADA) systems are used for monitoring industrial processes such as power grids, water supply systems, traffic control, oil and natural gas mining, space stations and nuclear plants. However, their security faces the threat of being compromised due to the increasing use of open access networks. Furthermore, the emergence of quantum computing has exposed a new type of threat to SCADA systems. Failure to secure SCADA systems can lead to catastrophic consequences. For example, a malicious attack can take control of the power supply to a city, shut down the water supply system, or cause malfunction of a nuclear reactor. The primary goal of this thesis is to classify attacks on SCADA systems, identify the new type of attack based on quantum computing, and design a novel security scheme to defend against traditional attacks as well as the quantum attack. The proposed Signcryption scheme provides both encryption and intrusion detection. In particular, it detects the man-in-the-middle attack as this intrusion can lead to others. The signcryption scheme is built on the foundation of the fundamental BB84 cryptographic scheme and does not involve computationally expensive third-party validation. We simulate the proposed scheme using the Quantum Information Toolkit in Python. Furthermore, we validate and analyze the proposed scheme using security verification tools, namely, Scyther and Prism.en_US
dc.identifier.urihttp://hdl.handle.net/10222/76313
dc.language.isoenen_US
dc.subjectNetwork securityen_US
dc.subjectqubitsen_US
dc.subjectQuantum cryptographyen_US
dc.subjectSCADA networksen_US
dc.subjectSigncryptionen_US
dc.titleA Quantum-based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networksen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ghosh-Sagarika-MCSc-CSCI-August-2019.pdf
Size:
1.36 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: