Home > Research > Publications & Outputs > Towards benchmarking of P2P technologies from a...

Links

Text available via DOI:

View graph of relations

Towards benchmarking of P2P technologies from a SCADA systems protection perspective

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Towards benchmarking of P2P technologies from a SCADA systems protection perspective. / Khelil, A.; Jeckel, S.; Germanus, D. et al.
Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Vol. 45 LNICST Springer, 2010. p. 400-414.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Khelil, A, Jeckel, S, Germanus, D & Suri, N 2010, Towards benchmarking of P2P technologies from a SCADA systems protection perspective. in Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. vol. 45 LNICST, Springer, pp. 400-414. https://doi.org/10.1007/978-3-642-16644-0_35

APA

Khelil, A., Jeckel, S., Germanus, D., & Suri, N. (2010). Towards benchmarking of P2P technologies from a SCADA systems protection perspective. In Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers (Vol. 45 LNICST, pp. 400-414). Springer. https://doi.org/10.1007/978-3-642-16644-0_35

Vancouver

Khelil A, Jeckel S, Germanus D, Suri N. Towards benchmarking of P2P technologies from a SCADA systems protection perspective. In Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Vol. 45 LNICST. Springer. 2010. p. 400-414 doi: 10.1007/978-3-642-16644-0_35

Author

Khelil, A. ; Jeckel, S. ; Germanus, D. et al. / Towards benchmarking of P2P technologies from a SCADA systems protection perspective. Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Vol. 45 LNICST Springer, 2010. pp. 400-414

Bibtex

@inbook{4cd09bc7fe0f43d6878591f286485929,
title = "Towards benchmarking of P2P technologies from a SCADA systems protection perspective",
abstract = "Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/ dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and largescale overlays on top of existing physical networks. In this paper, we build the base for using P2P to enhance the resilience of deployed SCADA systems. To this end, we provide a general analysis of both domains and their compatibility. In addition, we refine the existing classifications of P2P technologies w.r.t. the needs and capabilities of SCADA systems. Consequently, we identify core P2P-based protection mechanisms for SCADA systems, based on data and path replication. Our main results are generic guidelines for the exploitation of P2P technologies to enhance the SCADA resilience. {\textcopyright} 2010 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.",
keywords = "Critical infrastructure protection, Dependability, P2P, SCADA, Security, Critical infrastructures, Peer to peer networks, Technology, Telecommunication networks, SCADA systems",
author = "A. Khelil and S. Jeckel and D. Germanus and Neeraj Suri",
year = "2010",
doi = "10.1007/978-3-642-16644-0_35",
language = "English",
isbn = "3642166431 ",
volume = "45 LNICST",
pages = "400--414",
booktitle = "Mobile Lightweight Wireless Systems",
publisher = "Springer",

}

RIS

TY - CHAP

T1 - Towards benchmarking of P2P technologies from a SCADA systems protection perspective

AU - Khelil, A.

AU - Jeckel, S.

AU - Germanus, D.

AU - Suri, Neeraj

PY - 2010

Y1 - 2010

N2 - Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/ dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and largescale overlays on top of existing physical networks. In this paper, we build the base for using P2P to enhance the resilience of deployed SCADA systems. To this end, we provide a general analysis of both domains and their compatibility. In addition, we refine the existing classifications of P2P technologies w.r.t. the needs and capabilities of SCADA systems. Consequently, we identify core P2P-based protection mechanisms for SCADA systems, based on data and path replication. Our main results are generic guidelines for the exploitation of P2P technologies to enhance the SCADA resilience. © 2010 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

AB - Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/ dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and largescale overlays on top of existing physical networks. In this paper, we build the base for using P2P to enhance the resilience of deployed SCADA systems. To this end, we provide a general analysis of both domains and their compatibility. In addition, we refine the existing classifications of P2P technologies w.r.t. the needs and capabilities of SCADA systems. Consequently, we identify core P2P-based protection mechanisms for SCADA systems, based on data and path replication. Our main results are generic guidelines for the exploitation of P2P technologies to enhance the SCADA resilience. © 2010 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

KW - Critical infrastructure protection

KW - Dependability

KW - P2P

KW - SCADA

KW - Security

KW - Critical infrastructures

KW - Peer to peer networks

KW - Technology

KW - Telecommunication networks

KW - SCADA systems

U2 - 10.1007/978-3-642-16644-0_35

DO - 10.1007/978-3-642-16644-0_35

M3 - Chapter

SN - 3642166431

SN - 9783642166433

VL - 45 LNICST

SP - 400

EP - 414

BT - Mobile Lightweight Wireless Systems

PB - Springer

ER -