3 results sorted by ID
Possible spell-corrected query: scadpa
Problems and New Approaches for Crypto-Agility in Operational Technology
Tobias Frauenschläger, Jürgen Mottok
Applications
In recent years, cybersecurity has also become relevant for Operational Technology (OT). Critical systems like industrial automation systems or transportation systems are faced with new threats, and therefore require the implementation of thorough security measures. Regulations further mandate the deployment and regular verification of these security measures. However, OT systems differ from well-known systems of classic Information Technology (IT), such as mission times spanning decades,...
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
Abstract: This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM is defined in terms of authentication, authorization, correct identification, privacy:...
sSCADA: Securing SCADA Infrastructure Communications
Yongge Wang, Bei-Tseng Chu
Applications
Distributed control systems (DCS) and supervisory control and data
acquisition (SCADA) systems were developed to reduce labor costs, and
to allow system-wide monitoring and remote control from a central location.
Control systems are widely used in critical infrastructures such as electric
grid, natural gas, water, and wastewater industries.
While control systems can be vulnerable to a variety of types of cyber
attacks that could have devastating consequences, little research
has been done to...
In recent years, cybersecurity has also become relevant for Operational Technology (OT). Critical systems like industrial automation systems or transportation systems are faced with new threats, and therefore require the implementation of thorough security measures. Regulations further mandate the deployment and regular verification of these security measures. However, OT systems differ from well-known systems of classic Information Technology (IT), such as mission times spanning decades,...
Abstract: This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM is defined in terms of authentication, authorization, correct identification, privacy:...
Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labor costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water, and wastewater industries. While control systems can be vulnerable to a variety of types of cyber attacks that could have devastating consequences, little research has been done to...