Indian Science Technology and Engineering facilities Map
 
Supplier Map
Service Map
Preivious Next  

  Digital Catalogue for Technology and Products Development


   Technology and Product Development

    Basic Information

Technology developed: COPS Defender (TP19766921013)
Category: Nil
Details of Inventor(s):
Inventor Institution/Organization/Company Department Designation
B.S.Bindhumadhava C-DAC, Bangalore RTS&IoT Senior Director
R.K.Senthil Kumar C-DAC, Bangalore RTS&IoT Associate Director
Rajesh Kalluri C-DAC, Bangalore RTS&IoT Joint Director
Technical Application Area: Other
If 'Other', please specify:
Critical Infrastructure Security
Please give more details of new technical application area:
C-DAC COPS Defender is a protocol hardening solution intended to address the vulnerabilities in transmission SCADA protocols like IEC 60870-5-101 and IEC 60870-5-104 in the power systems. The solution offers to authenticate any control from the control center towards RTUs and prevent any malicious events that may take place due to man in the middle attacks. This also provides an encrypted channel between a control center and the RTUs connected to it. This is aimed to address the security concerns like data spoofing, data modification, replay attack and non-repudiation.
Organization(s):
Centre for Development of Advanced Computing (CDAC) Bengaluru
Affiliated Ministry: MeitY, Govt. of India
Type of technology development: Indigenous
Does the technology help in replacing any import items currently
procured from outside India?
Does the technology have export potential? 1
Category of Technology developed: Immediate Deployment
Stage of Development: Commercialized
Please describe in detail including the TRL Level:
C-DAC COPS Defender is a protocol hardening solution intended to address the vulnerabilities in transmission SCADA protocols like IEC 60870-5-101 and IEC 60870-5-104 in the power systems. The solution offers to authenticate any control from the control center towards RTUs and prevent any malicious events that may take place due to man-in-the-middle attacks. This also provides an encrypted channel between a control center and the RTUs connected to it. This is aimed to address the security concerns like data spoofing, data modification, replay attack and non-repudiation. 1. Hardening of IEC 60870-5-101 and IEC 60870-5-104 protocols 2. Deployable with existing SCADA environment 3. Implements encrypted channel between RTU and control center. 4. Adherence to IEC 62351 standard for providing application layer security. 5. Identifying possible man in the middle attack and preventing consequent attacks like data spoofing, data modification and replay attack.

    Abstract:

Applications: 1. Critical Infrastructure Sectors (Power Grid, Oil, Gas) where IEC 870-5-101 and IEC 870-5-104 protocols are in use 2. RTU vendors , System Integrators 3. Smart Grid and Micro Grid
Advantages: 1. Adopting Bump In the Wire methodology to protect third party Master Terminal Unit and Remote Terminal Unit 2. Application layer security adhering to IEC 62351 standards 3. Secured mutual authentication 4. Protects communication channel between RTU and MTU 5. Encryption of data over communication channel 6. Secured key exchange 7. Prevents various attacks like Man in the middle, Replay, Data Modification, Non Repudiation etc 8. Latency within limits 9. Product field tested at Karnataka Power Transmission Corporation Limited (KPTCL), Bangalore and Southern Regional Load Despatch Centre (SRLDC), Bangalore. 10. Highly interoperable due to the strict adherence to the standards. 11. Tolerable impact on the response times

    Technology Inputs:

Imported Equipment/Spare Parts:
Equipment/Spare Parts Year ITC-HS Code
NA
Indigenous Equipment/Spare Parts:
Equipment/Spare Parts Year ITC-HS Code
NA
Imported Raw Materials:
Raw Materials Year ITC-HS Code
NA
Indigenous Raw Materials:
Raw Materials Year ITC-HS Code
NA
Existing R&D Facilities used:
Facilities Year ITC-HS Code
NA

   Patents & Publications:

Patents:
Filed Patents (No.) Granted Patents (No.) Year
0 0 NA
Publications:
Submitted (No.) Published (No.) Year
0 0 NA

    Commercialization Potential:

Who are the Potential Licensees?
What commercially available products address
the same problem?
Company Product Problem Addressed
Would you like to develop this invention further with
corporate research support?
Yes
Would you be interested in participating in cluster based
programs for commercialization research or business
planning for your invention?
Yes
      Submitted by: Savitha Gowda Date of Submission: 6-8-2020



Chat Room      Write Review     Talk to Experts


THE VISION
THE MISSION
ABOUT I-STEM
It has always been the basic tenet of the Government of India, in generously funding R&D efforts at academic institutions over the years, that facilities established through such support be made available to those needing them and qualified to make use of them for their own research work
read more >>

However, this was never easy or straightforward for, among other reasons, there was no ready source of information of what facility was available and where. Thanks to the Web, it is much easier today to have a national and regional “inventory of resources”, so as to match users with the resources they need, and to do all this in an efficient and transparent manner.

This can lead to a leap in R&D productivity and greatly enhance the effectiveness of public investment. This is the motivation behind I-STEM.
read less <<
Visitor Hit Counter
Hosted at Indian Institute of Science
Copyright © 2024 I-STEM. All rights reserved.
Audited by: STQC Bengaluru.