Article Preview
Top1.Introduction
Supervisory control and data acquisition system are such an integral part of the latest automation industries. This receives data from various sources like sensors, RTU (Remote Terminal Units) and smart meters. The major tasks performed by SCADA (Rakas et al., 2020; Tamy et al., n.d.) is to monitor the connected data fetching sources. SCADA systems are mainly used to control and monitoring purposes in various industrial applications. It can be used for a small office building to monitor environmental conditions also used to monitor complex conditions in a nuclear power plant SCADA (Ferrag et al., 2020; Khan et al., 2019; Waagsnes & Ulltveit-Moe, n.d.) . To protect control systems, systems are evaluated before being deployed in production. So the operators have a good understanding of what types of vulnerability those systems may be introducing into their environment. One of the challenges of control systems is that many of them have been developed in an environment that works very well in operations, but they don’t have all of the cybersecurity safeguards built into them (Shitharth et al., 2021; Suaboot et al., 2020). Sensor nodes which sense physical phenomenon that occur around them. These sensor nodes are majorly used for medical purposes, agriculture, industrial purposes, and so on. SCADA system uses wired or wireless sensor networks to transport the data from the master station. SCADA systems mainly use wireless sensor networks due to their frequent changing topology nature and the possibility of reconfiguration of networks. Using the wireless sensor networks this information or data is transmitted through a router, firewall, and switches. The first layer of protection is a router. The router should be configured with a VPN tunnel on the router side. Firewalls in control systems are used to protect unauthorized access (Priyanga et al., 2019; Teixeira et al., 2018). Data should be encrypted, to increase the level of information security, while accessing information through the internet. Various security threats (Gao et al., n.d.; Gao et al., 2020; Shitharth & Winston, 2016) are evolving every day like unauthorized access to the control software, virus infection and one more major threat is intruders sending malicious packets to host devices. By sending these packets anyone can control the SCADA devices.