[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A testbed for secure and robust SCADA systems

Published: 01 July 2008 Publication History

Abstract

The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a need to have a SCADA testbed for checking vulnerabilities and validating security solutions. In this paper we develop such a SCADA testbed.

References

[1]
21 Steps to Improve Cyber Security of SCADA Networks. U.S. Department of Energy white paper, 2005.
[2]
Aspentech. http://www.aspentech.com/
[3]
The C2 Wind Tunnel, https://wiki.isis.vanderbilt.edu/c2w/
[4]
The Center for SCADA Security. Sandia National Labrotories, http://www. sandia.gov/scada/testbeds.htm.
[5]
Henrik Christiansson and Eric Luiijf. Creating a European SCADA Security Testbed. In IFIP International Federation for Information Processing, Springer Boston 2007.
[6]
The DETER Testbed, http://www.deterlab.net/
[7]
DNP. http://www.dnp.org/
[8]
G. Dondossola, J. Szanto, M. Masera, I. Nai Fovino. Evaluation of the effects of intentional threats to power substation control systems. In Proceedings of the International Workshop on Complex Network and Critical Infrastructure Protection, 2006.
[9]
Emulab. http://www.emulab.net/
[10]
Scott Fluhrer and Itsik Mantin and Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. Lecture Notes in Computer Science, 2259, 2001.
[11]
HART Communication Foundation. WirelessHART Technical Data Sheet, 2007. www.hartcomm.org
[12]
Carl Hartung, James Balasalle and Richard Han. Node Compromise in Sensor Networks: The Need for Secure Systems. Department of Computer Science University of Colorado at Boulder, 2005.
[13]
High-Level Architecture, IEEE Standard 1516. www.ieee.org
[14]
Vinay M. Igure, Sean A. Laughter and Ronald D. Williams, Security issues in SCADA networks. In Computers & Security Volume 25, Issue 7, October 2006, Pages 498-506.
[15]
MathWorks Simulink. http://www.mathworks.com
[16]
Modbus-IDA. http://www.modbus.org/
[17]
A. Moore, R. Ellison and R. Linger. Attack modelling for information security and survivability. In SEI, 2001.
[18]
Hamed Okhravi, Chris Grier, Matt Davis, Zeb Tate, David Nicol, and Tom Overbye. Cyber-Security Simulation Testbed. http://www.iti.uiuc.edu/ tcip/tcip_presentations.html
[19]
Omnet++. http://www.omnetpp.org/
[20]
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: SoftWare-based ATTestation for Embedded Devices. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 2004.
[21]
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Brighton, United Kingdom, October 2005.
[22]
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure Code Update By Attestation in Sensor Networks. In ACM Workshop on Wireless Security (WiSe 2006), Los Angeles, CA, September 29, 2006.
[23]
TrueTime. http://www.control.lth.se/truetime/
[24]
Bernard Zeigler, Tag Gon Kim, Herbert Praehofer (2000). Theory of Modeling and Simulation, Second Edition, Academic Press, New York. ISBN 978-0127784557.

Cited By

View all
  • (2025)Power systems and microgrids resilience enhancement strategies: A reviewRenewable and Sustainable Energy Reviews10.1016/j.rser.2024.114953207(114953)Online publication date: Jan-2025
  • (2023)SDN-Based Critical Infrastructure Resilience: A Smart Grid Perspective2023 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI62032.2023.00174(1054-1060)Online publication date: 13-Dec-2023
  • (2022)Security Considerations for Remote Terminal Units2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC)10.1109/ZINC55034.2022.9840542(47-52)Online publication date: 25-May-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGBED Review
ACM SIGBED Review  Volume 5, Issue 2
Special issue on the the 14th IEEE real-time and embedded technology and applications symposium (RTAS'08) WIP session
July 2008
22 pages
EISSN:1551-3688
DOI:10.1145/1399583
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2008
Published in SIGBED Volume 5, Issue 2

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Power systems and microgrids resilience enhancement strategies: A reviewRenewable and Sustainable Energy Reviews10.1016/j.rser.2024.114953207(114953)Online publication date: Jan-2025
  • (2023)SDN-Based Critical Infrastructure Resilience: A Smart Grid Perspective2023 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI62032.2023.00174(1054-1060)Online publication date: 13-Dec-2023
  • (2022)Security Considerations for Remote Terminal Units2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC)10.1109/ZINC55034.2022.9840542(47-52)Online publication date: 25-May-2022
  • (2022)Attacking and Defending DNP3 ICS/SCADA Systems2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS)10.1109/DCOSS54816.2022.00041(183-190)Online publication date: May-2022
  • (2022)VICSORT - A Virtualised ICS Open-source Research Testbed2022 Cyber Research Conference - Ireland (Cyber-RCI)10.1109/Cyber-RCI55324.2022.10032670(1-8)Online publication date: 25-Apr-2022
  • (2022)Analysis of Vulnerability Trends and Attacks in OT SystemsProceedings of Seventh International Congress on Information and Communication Technology10.1007/978-981-19-1610-6_12(127-142)Online publication date: 27-Jul-2022
  • (2021)A Comprehensive Survey on Cyber-Physical Smart Grid Testbed Architectures: Requirements and ChallengesElectronics10.3390/electronics1009104310:9(1043)Online publication date: 28-Apr-2021
  • (2021)An Open-Source Testbed to Visualise ICS Cybersecurity Weaknesses and Remediation Strategies – A Research Agenda Proposal2021 32nd Irish Signals and Systems Conference (ISSC)10.1109/ISSC52156.2021.9467852(1-6)Online publication date: 10-Jun-2021
  • (2021)A Survey on Industrial Control System Testbeds and Datasets for Security ResearchIEEE Communications Surveys & Tutorials10.1109/COMST.2021.309436023:4(2248-2294)Online publication date: Dec-2022
  • (2021)Cyber Security Risks of Technical Components in Industry 4.02021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)10.1109/COINS51742.2021.9524088(1-7)Online publication date: 23-Aug-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media