Home > Research > Publications & Outputs > Increasing the resilience of critical SCADA sys...

Links

Text available via DOI:

View graph of relations

Increasing the resilience of critical SCADA systems using peer-to-peer overlays

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Increasing the resilience of critical SCADA systems using peer-to-peer overlays. / Germanus, D.; Khelil, A.; Suri, Neeraj.
Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Vol. 6150 LNCS Springer, 2010. p. 161-178.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Germanus, D, Khelil, A & Suri, N 2010, Increasing the resilience of critical SCADA systems using peer-to-peer overlays. in Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. vol. 6150 LNCS, Springer, pp. 161-178. https://doi.org/10.1007/978-3-642-13556-9_10

APA

Germanus, D., Khelil, A., & Suri, N. (2010). Increasing the resilience of critical SCADA systems using peer-to-peer overlays. In Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings (Vol. 6150 LNCS, pp. 161-178). Springer. https://doi.org/10.1007/978-3-642-13556-9_10

Vancouver

Germanus D, Khelil A, Suri N. Increasing the resilience of critical SCADA systems using peer-to-peer overlays. In Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Vol. 6150 LNCS. Springer. 2010. p. 161-178 doi: 10.1007/978-3-642-13556-9_10

Author

Germanus, D. ; Khelil, A. ; Suri, Neeraj. / Increasing the resilience of critical SCADA systems using peer-to-peer overlays. Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Vol. 6150 LNCS Springer, 2010. pp. 161-178

Bibtex

@inbook{7e5095acdefd40b880c688d0499224f2,
title = "Increasing the resilience of critical SCADA systems using peer-to-peer overlays",
abstract = "Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, while the SCADA functionality has increased, its vulnerability to cyber threats has also risen. These threats often lead to reduced system availability or compromised data integrity, eventually resulting in risks to public safety. Therefore, enhancing the reliability and security of system operation is an urgent need. Peer-to-Peer (P2P) techniques allow the design of self-organizing Internet-scale communication overlay networks. Two inherent resilience mechanisms of P2P networks are path redundancy and data replication. This paper shows how SCADA system's resilience can be improved by using P2P technologies. In particular, the two previously mentioned resilience mechanisms allow circumventing crashed nodes and detecting manipulated control data. {\textcopyright} 2010 Springer-Verlag.",
keywords = "Control data, Cyber threats, Data integrity, Data replication, Internet technology, P2P network, Peer-to-peer overlays, Peer-to-peer techniques, Public networks, Public safety, Reduced systems, Resilience mechanism, Self organizing, Supervisory control and data acquisition systems, System operation, Distributed computer systems, Internet, Overlay networks, Public risks, SCADA systems, Peer to peer networks",
author = "D. Germanus and A. Khelil and Neeraj Suri",
year = "2010",
doi = "10.1007/978-3-642-13556-9_10",
language = "English",
isbn = "3642135552 ",
volume = "6150 LNCS",
pages = "161--178",
booktitle = "Architecting Critical Systems",
publisher = "Springer",

}

RIS

TY - CHAP

T1 - Increasing the resilience of critical SCADA systems using peer-to-peer overlays

AU - Germanus, D.

AU - Khelil, A.

AU - Suri, Neeraj

PY - 2010

Y1 - 2010

N2 - Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, while the SCADA functionality has increased, its vulnerability to cyber threats has also risen. These threats often lead to reduced system availability or compromised data integrity, eventually resulting in risks to public safety. Therefore, enhancing the reliability and security of system operation is an urgent need. Peer-to-Peer (P2P) techniques allow the design of self-organizing Internet-scale communication overlay networks. Two inherent resilience mechanisms of P2P networks are path redundancy and data replication. This paper shows how SCADA system's resilience can be improved by using P2P technologies. In particular, the two previously mentioned resilience mechanisms allow circumventing crashed nodes and detecting manipulated control data. © 2010 Springer-Verlag.

AB - Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, while the SCADA functionality has increased, its vulnerability to cyber threats has also risen. These threats often lead to reduced system availability or compromised data integrity, eventually resulting in risks to public safety. Therefore, enhancing the reliability and security of system operation is an urgent need. Peer-to-Peer (P2P) techniques allow the design of self-organizing Internet-scale communication overlay networks. Two inherent resilience mechanisms of P2P networks are path redundancy and data replication. This paper shows how SCADA system's resilience can be improved by using P2P technologies. In particular, the two previously mentioned resilience mechanisms allow circumventing crashed nodes and detecting manipulated control data. © 2010 Springer-Verlag.

KW - Control data

KW - Cyber threats

KW - Data integrity

KW - Data replication

KW - Internet technology

KW - P2P network

KW - Peer-to-peer overlays

KW - Peer-to-peer techniques

KW - Public networks

KW - Public safety

KW - Reduced systems

KW - Resilience mechanism

KW - Self organizing

KW - Supervisory control and data acquisition systems

KW - System operation

KW - Distributed computer systems

KW - Internet

KW - Overlay networks

KW - Public risks

KW - SCADA systems

KW - Peer to peer networks

U2 - 10.1007/978-3-642-13556-9_10

DO - 10.1007/978-3-642-13556-9_10

M3 - Chapter

SN - 3642135552

SN - 9783642135552

VL - 6150 LNCS

SP - 161

EP - 178

BT - Architecting Critical Systems

PB - Springer

ER -