Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
}
TY - CHAP
T1 - Protection of SCADA communication channels
T2 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
AU - Khelil, A.
AU - Germanus, D.
AU - Suri, Neeraj
PY - 2012
Y1 - 2012
N2 - The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and monitoring functionality. However, the technological shift is towards commercial-off-the-shelf SCADA systems that are also increasingly interconnected with each other primarily over dedicated network but slowly tending to even Internet level connectivity. This introduces new communication-level threats and vulnerabilities to SCADA systems. Therefore, the disputed concept "security through obscurity" is no longer applicable, and previously unnoticed or ignored security issues might now be exposed. To handle such security challenges, techniques from conventional networked systems are also being adopted to the SCADA domain. This chapter discusses both adopted and newly developed techniques to secure communication in monolithic as well as highly interconnected systems. © 2012 Springer-Verlag Berlin Heidelberg.
AB - The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and monitoring functionality. However, the technological shift is towards commercial-off-the-shelf SCADA systems that are also increasingly interconnected with each other primarily over dedicated network but slowly tending to even Internet level connectivity. This introduces new communication-level threats and vulnerabilities to SCADA systems. Therefore, the disputed concept "security through obscurity" is no longer applicable, and previously unnoticed or ignored security issues might now be exposed. To handle such security challenges, techniques from conventional networked systems are also being adopted to the SCADA domain. This chapter discusses both adopted and newly developed techniques to secure communication in monolithic as well as highly interconnected systems. © 2012 Springer-Verlag Berlin Heidelberg.
KW - Commercial-off-the-shelf
KW - Control and monitoring
KW - Dedicated networks
KW - E-society
KW - Networked systems
KW - Power grids
KW - Secure communications
KW - Security challenges
KW - Security issues
KW - Threats and vulnerabilities
KW - Communication
KW - SCADA systems
U2 - 10.1007/978-3-642-28920-0_9
DO - 10.1007/978-3-642-28920-0_9
M3 - Chapter
SN - 9783642289194
VL - 7130
SP - 177
EP - 196
BT - Critical Infrastructure Protection
PB - Springer
ER -