An integrated experimental environment for distributed systems and networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Building a SCADA Security Testbed
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
A Simulation Environment for SCADA Security Analysis and Assessment
ICMTMA '10 Proceedings of the 2010 International Conference on Measuring Technology and Mechatronics Automation - Volume 01
Attacks against process control systems: risk assessment, detection, and response
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A state estimator including conventional and synchronized phasor measurements
Computers and Electrical Engineering
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
Four-mobile-beacon assisted localization in three-dimensional wireless sensor networks
Computers and Electrical Engineering
Physical process resilience-aware network design for SCADA systems
Computers and Electrical Engineering
Hi-index | 0.00 |
Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.