The relational model for database management: version 2
The relational model for database management: version 2
NOMADS: toward a strong and safe mobile agent system
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
OMNeT: Objective Modular Network Testbed
MASCOTS '93 Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
An Efficient Multicast Protocol for Content-Based Publish-Subscribe Systems
ICDCS '99 Proceedings of the 19th IEEE International Conference on Distributed Computing Systems
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Securing SCADA Systems
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
A secure modular mobile agent system
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems
Service oriented architectures: approaches, technologies and research issues
The VLDB Journal — The International Journal on Very Large Data Bases
A mobile agent based framework for web services
Proceedings of the 47th Annual Southeast Regional Conference
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
Critical Information Infrastructure Security
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Protection of SCADA communication channels
Critical Infrastructure Protection
Physical process resilience-aware network design for SCADA systems
Computers and Electrical Engineering
Hi-index | 0.00 |
Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, while the SCADA functionality has increased, its vulnerability to cyber threats has also risen. These threats often lead to reduced system availability or compromised data integrity, eventually resulting in risks to public safety. Therefore, enhancing the reliability and security of system operation is an urgent need. Peer-to-Peer (P2P) techniques allow the design of self-organizing Internet-scale communication overlay networks. Two inherent resilience mechanisms of P2P networks are path redundancy and data replication. This paper shows how SCADA system's resilience can be improved by using P2P technologies. In particular, the two previously mentioned resilience mechanisms allow circumventing crashed nodes and detecting manipulated control data.