Home > Research > Publications & Outputs > Protection of SCADA communication channels

Links

Text available via DOI:

View graph of relations

Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). / Khelil, A.; Germanus, D.; Suri, Neeraj.
Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Vol. 7130 Springer, 2012. p. 177-196.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Khelil, A, Germanus, D & Suri, N 2012, Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. vol. 7130, Springer, pp. 177-196. https://doi.org/10.1007/978-3-642-28920-0_9

APA

Khelil, A., Germanus, D., & Suri, N. (2012). Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). In Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (Vol. 7130, pp. 177-196). Springer. https://doi.org/10.1007/978-3-642-28920-0_9

Vancouver

Khelil A, Germanus D, Suri N. Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). In Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Vol. 7130. Springer. 2012. p. 177-196 doi: 10.1007/978-3-642-28920-0_9

Author

Khelil, A. ; Germanus, D. ; Suri, Neeraj. / Protection of SCADA communication channels : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Vol. 7130 Springer, 2012. pp. 177-196

Bibtex

@inbook{9ef13ed4973544cbba5621d5464b8a47,
title = "Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
abstract = "The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and monitoring functionality. However, the technological shift is towards commercial-off-the-shelf SCADA systems that are also increasingly interconnected with each other primarily over dedicated network but slowly tending to even Internet level connectivity. This introduces new communication-level threats and vulnerabilities to SCADA systems. Therefore, the disputed concept {"}security through obscurity{"} is no longer applicable, and previously unnoticed or ignored security issues might now be exposed. To handle such security challenges, techniques from conventional networked systems are also being adopted to the SCADA domain. This chapter discusses both adopted and newly developed techniques to secure communication in monolithic as well as highly interconnected systems. {\textcopyright} 2012 Springer-Verlag Berlin Heidelberg.",
keywords = "Commercial-off-the-shelf, Control and monitoring, Dedicated networks, E-society, Networked systems, Power grids, Secure communications, Security challenges, Security issues, Threats and vulnerabilities, Communication, SCADA systems",
author = "A. Khelil and D. Germanus and Neeraj Suri",
year = "2012",
doi = "10.1007/978-3-642-28920-0_9",
language = "English",
isbn = "9783642289194 ",
volume = "7130",
pages = "177--196",
booktitle = "Critical Infrastructure Protection",
publisher = "Springer",

}

RIS

TY - CHAP

T1 - Protection of SCADA communication channels

T2 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

AU - Khelil, A.

AU - Germanus, D.

AU - Suri, Neeraj

PY - 2012

Y1 - 2012

N2 - The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and monitoring functionality. However, the technological shift is towards commercial-off-the-shelf SCADA systems that are also increasingly interconnected with each other primarily over dedicated network but slowly tending to even Internet level connectivity. This introduces new communication-level threats and vulnerabilities to SCADA systems. Therefore, the disputed concept "security through obscurity" is no longer applicable, and previously unnoticed or ignored security issues might now be exposed. To handle such security challenges, techniques from conventional networked systems are also being adopted to the SCADA domain. This chapter discusses both adopted and newly developed techniques to secure communication in monolithic as well as highly interconnected systems. © 2012 Springer-Verlag Berlin Heidelberg.

AB - The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and monitoring functionality. However, the technological shift is towards commercial-off-the-shelf SCADA systems that are also increasingly interconnected with each other primarily over dedicated network but slowly tending to even Internet level connectivity. This introduces new communication-level threats and vulnerabilities to SCADA systems. Therefore, the disputed concept "security through obscurity" is no longer applicable, and previously unnoticed or ignored security issues might now be exposed. To handle such security challenges, techniques from conventional networked systems are also being adopted to the SCADA domain. This chapter discusses both adopted and newly developed techniques to secure communication in monolithic as well as highly interconnected systems. © 2012 Springer-Verlag Berlin Heidelberg.

KW - Commercial-off-the-shelf

KW - Control and monitoring

KW - Dedicated networks

KW - E-society

KW - Networked systems

KW - Power grids

KW - Secure communications

KW - Security challenges

KW - Security issues

KW - Threats and vulnerabilities

KW - Communication

KW - SCADA systems

U2 - 10.1007/978-3-642-28920-0_9

DO - 10.1007/978-3-642-28920-0_9

M3 - Chapter

SN - 9783642289194

VL - 7130

SP - 177

EP - 196

BT - Critical Infrastructure Protection

PB - Springer

ER -