Skip to main content
Technology Fact Sheet

MIMOS Supervisory Control and Data Acquisition (Mi-SCADA)


MIMOS Supervisory Control and Data Acquisition (Mi-SCADA) is a control system used to monitor and control a plant or equipment in industries such as energy, water and waste control, oil and gas refining, transportation and telecommunications. Mi-SCADA provides end-to-end authentication and encryption to protect the SCADA link from unauthorised access and control, eavesdropping and malicious attacks.

MIMOS Mi-SCADA is a bump-in-the-wire device, which allows
easy and seamless integration into an existing system to enable an ultimate security protection over the SCADA network. With the powerful SHA-256/384, AES-128/256 and the proprietary Mi-CRYPT-128/256, together with the lightweight cryptography tool suites i.e. PRESENT and PHOTON, Mi-SCADA can be configured to meet the different security strength and throughput performance requirements of the target system.

Technology Summary

The ultimate security add-on device, which is easy to integrate into any existing SCADA infrastructure.
Industries: Energy, Water & Waste Control, Oil & Gas,
Transportation, Telecommunications

  • Comprehensive security suites
  • Supports multiple SCADA protocols
  • User configurable
Technology Benefits
  • Bump-in-the-wire
  • Device-based authentication
  • End-to-end encryption
  • Strong assurance of authenticity
  • Proprietary encryption algorithm

Mi-SCADA comprises the following features:




Mi-SCADA comprises the following features:

  • Comprehensive Security Suites
    Encryption : AES-128/256
    Hash : SHA-256/384
    Key Exchange : ECDH P-384
    Digital Signature : ECDSA P-384
  • Supports Multiple SCADA Protocols
    Able to support IEC-101 (Serial) and IEC-104 (Ethernet) industrial standard SCADA protocols.
  • User Configurable
    Allows user configuration to meet different system requirements

Technology Benefits

The main impacts of Mi-SCADA are:

  • Bump-in-the-Wire
    Allows seamless integration into existing system.
  • Device-Based Authentication
    Validates user’s right to access to the Mi-SCADA system.
  • End-to-End Encryption
    Prevents eavesdropping and ensure confidentiality.
  • Strong Assurance of Authenticity
    Avoids intentional, unauthorised modification of the data.
  • Proprietary Encryption Algorithm
    Enables extra layer of security implying “security through obscurity”.