“…Historically, SCADA systems were designed to be physically isolated from various computing resources, apart from using proprietary hardware components, software, and communication protocols. Only minor attention had been given to cyber-security [7,9,10]. As a consequence, most of the SCADA communication protocols, for instance, IEC 60870-5-104, IEC 60870-5-101, and Distributed Network Protocol (DNP3), were designed with limited or no security mechanism [11][12][13].…”