{"id":"https://openalex.org/W4386474966","doi":"https://doi.org/10.1109/iccsce58721.2023.10237142","title":"Security Analysis of DNP3 Protocol in SCADA System","display_name":"Security Analysis of DNP3 Protocol in SCADA System","publication_year":2023,"publication_date":"2023-08-25","ids":{"openalex":"https://openalex.org/W4386474966","doi":"https://doi.org/10.1109/iccsce58721.2023.10237142"},"language":"en","primary_location":{"id":"doi:10.1109/iccsce58721.2023.10237142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccsce58721.2023.10237142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004151950","display_name":"Qais Saif Qassim","orcid":"https://orcid.org/0000-0002-6391-5246"},"institutions":[{"id":"https://openalex.org/I4210119174","display_name":"College of Applied Sciences- Ibri","ror":"https://ror.org/02h5h0a06","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210119174","https://openalex.org/I4210130707"]}],"countries":["OM"],"is_corresponding":true,"raw_author_name":"Qais Saif Qassim","raw_affiliation_strings":["University of Technology and Applied Sciences-Ibri,College of Computing and Information Sciences,Department of IT,Ibri,Oman","Department of IT, College of Computing and Information Sciences, University of Technology and Applied Sciences-Ibri, Ibri, Oman"],"affiliations":[{"raw_affiliation_string":"University of Technology and Applied Sciences-Ibri,College of Computing and Information Sciences,Department of IT,Ibri,Oman","institution_ids":["https://openalex.org/I4210119174"]},{"raw_affiliation_string":"Department of IT, College of Computing and Information Sciences, University of Technology and Applied Sciences-Ibri, Ibri, Oman","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033814807","display_name":"Musab A. M. Ali","orcid":"https://orcid.org/0000-0003-0677-5993"},"institutions":[{"id":"https://openalex.org/I4210119174","display_name":"College of Applied Sciences- Ibri","ror":"https://ror.org/02h5h0a06","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210119174","https://openalex.org/I4210130707"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Musab A. M. Ali","raw_affiliation_strings":["University of Technology and Applied Sciences-Ibri,College of Computing and Information Sciences,Department of IT,Ibri,Oman","Department of IT, College of Computing and Information Sciences, University of Technology and Applied Sciences-Ibri, Ibri, Oman"],"affiliations":[{"raw_affiliation_string":"University of Technology and Applied Sciences-Ibri,College of Computing and Information Sciences,Department of IT,Ibri,Oman","institution_ids":["https://openalex.org/I4210119174"]},{"raw_affiliation_string":"Department of IT, College of Computing and Information Sciences, University of Technology and Applied Sciences-Ibri, Ibri, Oman","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000185473","display_name":"Nooritawati Md Tahir","orcid":"https://orcid.org/0000-0002-3082-8963"},"institutions":[{"id":"https://openalex.org/I82724352","display_name":"Universiti Teknologi MARA","ror":"https://ror.org/05n8tts92","country_code":"MY","type":"education","lineage":["https://openalex.org/I82724352"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nooritawati Md Tahir","raw_affiliation_strings":["Universiti Teknologi MARA (UiTM),College of Engineering,Malaysia","College of Engineering, Universiti Teknologi MARA (UiTM), Malaysia","Institute for Big Data Analytics and Artificial Intelligence (IBDAAI), Universiti Teknologi MARA, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Teknologi MARA (UiTM),College of Engineering,Malaysia","institution_ids":["https://openalex.org/I82724352"]},{"raw_affiliation_string":"College of Engineering, Universiti Teknologi MARA (UiTM), Malaysia","institution_ids":["https://openalex.org/I82724352"]},{"raw_affiliation_string":"Institute for Big Data Analytics and Artificial Intelligence (IBDAAI), Universiti Teknologi MARA, Malaysia","institution_ids":["https://openalex.org/I82724352"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004151950"],"corresponding_institution_ids":["https://openalex.org/I4210119174"],"apc_list":null,"apc_paid":null,"fwci":2.053,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86906269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"314","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9831445813179016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7424353957176208},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.6825652718544006},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.6412882804870605},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5451397895812988},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.500969648361206},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.48220551013946533},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47857311367988586},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4327903985977173},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.369455486536026},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3311867117881775},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3072017431259155},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21737760305404663},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19650888442993164}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9831445813179016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7424353957176208},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.6825652718544006},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.6412882804870605},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5451397895812988},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.500969648361206},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.48220551013946533},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47857311367988586},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4327903985977173},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.369455486536026},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3311867117881775},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3072017431259155},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21737760305404663},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19650888442993164},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccsce58721.2023.10237142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccsce58721.2023.10237142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1546161534","https://openalex.org/W1970252573","https://openalex.org/W2244582324","https://openalex.org/W2549564909","https://openalex.org/W2727477768","https://openalex.org/W2736680659","https://openalex.org/W2898963478","https://openalex.org/W2942167793","https://openalex.org/W2963342063","https://openalex.org/W2990623250","https://openalex.org/W3080157478","https://openalex.org/W3155081803","https://openalex.org/W3173870401","https://openalex.org/W4285092692","https://openalex.org/W4295308778","https://openalex.org/W4321454754","https://openalex.org/W6755870276"],"related_works":["https://openalex.org/W2265199518","https://openalex.org/W2215365983","https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2995370509","https://openalex.org/W2187618570","https://openalex.org/W2184855233","https://openalex.org/W2198908836","https://openalex.org/W4252573951","https://openalex.org/W2060479059"],"abstract_inverted_index":{"The":[0,57,80],"safeguarding":[1],"of":[2,17,46,59,82,94,106,122,124,140],"Supervisory":[3],"Control":[4],"and":[5,10,44,73,78,120,143,153],"Data":[6],"Acquisition":[7],"(SCADA)":[8],"systems":[9,87],"their":[11,32],"cyber-security":[12],"have":[13],"been":[14],"the":[15,25,42,70,91,100,104,118,125,135,138,150],"subject":[16],"extensive":[18],"research":[19,113],"for":[20],"many":[21],"years,":[22],"owing":[23],"to":[24,102,116,148],"severe":[26],"ramifications":[27],"that":[28,40],"can":[29],"result":[30],"from":[31,52],"breach":[33],"or":[34,96],"compromise.":[35],"SCADA":[36,86,151],"is":[37,62,114],"a":[38,53,146],"system":[39],"facilitates":[41],"monitoring":[43],"control":[45,55,97],"physical":[47],"infrastructures":[48],"in":[49,64,85,130],"industrial":[50],"processes":[51],"centralized":[54],"station.":[56],"utilization":[58],"this":[60,112,141],"technology":[61],"prevalent":[63],"crucial":[65],"infrastructure":[66,109],"domains,":[67],"such":[68],"as":[69],"electricity,":[71],"oil,":[72],"gas":[74],"industries,":[75],"encompassing":[76],"production":[77],"distribution.":[79],"compromise":[81],"data":[83],"integrity":[84],"through":[88],"cyber-attacks,":[89],"specifically":[90],"unauthorized":[92],"manipulation":[93],"sensors":[95],"signals,":[98],"has":[99],"potential":[101],"disrupt":[103],"operation":[105],"critical":[107],"national":[108],"significantly.":[110],"Therefore,":[111],"intended":[115],"investigate":[117,134],"limitations":[119],"drawbacks":[121],"one":[123],"commonly":[126],"used":[127],"communication":[128],"protocols":[129],"SCADA,":[131],"namely;":[132],"DNP3,":[133],"cyber-attacks":[136],"exploiting":[137],"weaknesses":[139],"protocol,":[142],"put":[144],"forward":[145],"recommendation":[147],"protect":[149],"networks":[152],"prevent":[154],"devastating":[155],"consequences.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
