Columbus, Ohio
June 24, 2017
June 24, 2017
June 28, 2017
Engineering Technology
9
10.18260/1-2--29082
https://peer.asee.org/29082
926
I am a recent entrant into the world of academia. I am currently an Assistant Professor of Computer Science at Saint Joseph's College, Rensselaer, Indiana. Prior to this I was in industry for 23 years where my world was Embedded Systems Software applications and networking protocols. My toolbox is filled with C/RISC Assembly/C++/C# and a heady mix of processor expertise like ARM, StrongARM, PPC 603, 603e, 604, 860, 8260 for most of which I once wrote board support packages for RTOSes or device drivers. My career pinnacle so far was working with Dr.Mick Seaman of IEEE 802.1D working group and Dr.Simon Knee to implement rapid (802.1w) and multiple spanning tree (802.1s) protocols for Intel Netstructure Gigabit switches. I am currently in the closing phases of a PhD in Technology Management at Indiana State University where my dissertation is on refinements to the DNP3 (Distributed Network Protocol) using Split protocol techniques. I have written a bare bones DNP3 stack in C# to serve as the test bed for my experiments.
Using Mini Protocol stacks to guide research Authors: Dr.Patrick Appiah-Kubi, Anand Richard DNP3 (Distributed Network Protocol) is a fairly recent protocol having been standardized by the IEEE 1815 standard in 2009. It is employed predominantly in the electric utility industry and networks. The advent of DNP3 over TCP/IP made it available on the internet making it the target of several researchers and organizations who announced exploits and hacks against it. In the period 2007 to 2009 there were 27 attacks1. In this paper we present an out of the box approach for making DNP3 devices more secure using a split protocol design. Such a design can be selectively deployed in the most important and vulnerable parts of a utility network contributing to cost and time savings. We show that the split protocol design will provide a way for DNP3 network designers to use the ‘Data Server’ and ‘Connection Server’ paradigm to configure redundant DNP3 devices that can remain hidden and ready to take up tasks in the event of an attack.
1. S. East, J. Butts, M. Papa, and S. Shenoi, “A Taxonomy of Attacks on the DNP3 Protocol,” Critical Infrastructure Protection III, pp. 67–81, 2009.
Richard, A., & Appiah-Kubi, P. (2017, June), Using Mini Protocol Stacks to Guide Research Paper presented at 2017 ASEE Annual Conference & Exposition, Columbus, Ohio. 10.18260/1-2--29082
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2017 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015