OT-ICS Protocols Cheat Sheet
OT-ICS Protocols Cheat Sheet
Communication
Protocols in
Industrial
Control
System (ICS)
Ver 2.0
Content
1. Common ICS Protocols 3-6
2. Wireless Protocols used in ICS 7
3. Vendor Specific Protocols 8
4. Data Historian Specific Protocols 9
5. IT Protocols used in ICS 10-12
6. Database Protocols used in ICS 13
Serial and
Used for communication between building 1628 (for Limited security features,
LonWorks Ethernet
automation systems and devices. TCP/UDP) encryption not standard
(TCP/UDP)
Used for communication between building Serial, Ethernet Supports encryption and
KNX 3671 (UDP)
automation systems and devices. (TCP/UDP) authentication
Protocol used in heavy-duty vehicles for N/A (non IP- Limited security features,
J1939 Serial
communication between microcontrollers. based) encryption not standard
Protocol used for communication between utility Serial and Limited security features,
Meter-Bus 10001 (TCP)
meters and data collection devices. Ethernet (TCP) encryption not standard
Communication protocol for marine electronics, N/A (non IP- Limited security features,
NMEA Serial
such as GPS devices. based) encryption not standard
Developed by Motorola, MDLC (Motorola Data Link
Serial and Supports encryption
MDLC Communication) is designed for use in industrial Various
Ethernet (AES256 and previously
automation and SCADA systems. Supports
Wireless protocol for low-power, low-data-rate AES-128 encryption, secure Commonly used in smart homes
Zigbee
communication used in industrial and home automation. key establishment and industrial sensor networks.
3S-Smart Software Protocol used for communication between Ethernet 2455, 2456, 1217
CODESYS
Solutions industrial automation systems and devices. (TCP/UDP) (TCP/UDP)
TCP 20000 or
Protocol used in the utility industry to communicate between other port Supports encryption and
DNP3
different types of equipment, including data historians. configured by authentication
the DNP3 server
Dynamic Host Configuration Protocol - Used to assign IP Limited security features; DHCP snooping
DHCP addresses and other network configuration information to UDP 67, 68 and IP source guard can be used for
devices on a network. additional security Reference
Protocol used for accessing databases, similar to ODBC but Depends on the database and driver
JDBC N/A
for Java-based applications used Reference
Link Layer Discovery Protocol - Used to advertise and Limited security features; LLDP-MED
LLDP Ethernet
discover network devices and their capabilities. provides additional security Reference
Link-Local Multicast Name Resolution - Used for name Limited security features; can be used for
LLMNR UDP 5355
resolution on local networks when DNS is not available. local name resolution Reference
Protocol used for time synchronization in networked Limited security features; NTS provides
SNTP 123
environments secure alternatives Reference
Secure communication protocol used for encrypting data Provides encryption and authentication
SSL/TLS N/A
transmitted via HTTP, SMTP, FTP, and other protocols Reference
A free and open-source, distributed, wide column Supports encryption (SSL/TLS) and
Cassandra 9042
store, NoSQL database management system. authentication Reference