NOMADS: toward a strong and safe mobile agent system
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
A secure modular mobile agent system
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Secure internet-based communication protocol for scada networks
Secure internet-based communication protocol for scada networks
Cryptographic Key Management for SCADA Systems-Issues and Perspectives
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Improving the cyber security of SCADA communication networks
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
A mobile agent based framework for web services
Proceedings of the 47th Annual Southeast Regional Conference
Security in Wireless Mesh Networks: Challenges and Solutions
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
Critical Information Infrastructure Security
Increasing the resilience of critical SCADA systems using peer-to-peer overlays
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
IEEE Communications Magazine
Hi-index | 0.00 |
The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and monitoring functionality. However, the technological shift is towards commercial-off-the-shelf SCADA systems that are also increasingly interconnected with each other primarily over dedicated network but slowly tending to even Internet level connectivity. This introduces new communication-level threats and vulnerabilities to SCADA systems. Therefore, the disputed concept "security through obscurity" is no longer applicable, and previously unnoticed or ignored security issues might now be exposed. To handle such security challenges, techniques from conventional networked systems are also being adopted to the SCADA domain. This chapter discusses both adopted and newly developed techniques to secure communication in monolithic as well as highly interconnected systems.