Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
}
TY - CHAP
T1 - Towards benchmarking of P2P technologies from a SCADA systems protection perspective
AU - Khelil, A.
AU - Jeckel, S.
AU - Germanus, D.
AU - Suri, Neeraj
PY - 2010
Y1 - 2010
N2 - Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/ dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and largescale overlays on top of existing physical networks. In this paper, we build the base for using P2P to enhance the resilience of deployed SCADA systems. To this end, we provide a general analysis of both domains and their compatibility. In addition, we refine the existing classifications of P2P technologies w.r.t. the needs and capabilities of SCADA systems. Consequently, we identify core P2P-based protection mechanisms for SCADA systems, based on data and path replication. Our main results are generic guidelines for the exploitation of P2P technologies to enhance the SCADA resilience. © 2010 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
AB - Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/ dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and largescale overlays on top of existing physical networks. In this paper, we build the base for using P2P to enhance the resilience of deployed SCADA systems. To this end, we provide a general analysis of both domains and their compatibility. In addition, we refine the existing classifications of P2P technologies w.r.t. the needs and capabilities of SCADA systems. Consequently, we identify core P2P-based protection mechanisms for SCADA systems, based on data and path replication. Our main results are generic guidelines for the exploitation of P2P technologies to enhance the SCADA resilience. © 2010 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
KW - Critical infrastructure protection
KW - Dependability
KW - P2P
KW - SCADA
KW - Security
KW - Critical infrastructures
KW - Peer to peer networks
KW - Technology
KW - Telecommunication networks
KW - SCADA systems
U2 - 10.1007/978-3-642-16644-0_35
DO - 10.1007/978-3-642-16644-0_35
M3 - Chapter
SN - 3642166431
SN - 9783642166433
VL - 45 LNICST
SP - 400
EP - 414
BT - Mobile Lightweight Wireless Systems
PB - Springer
ER -