Trust management systems for wireless sensor networks: Best practices
Computer Communications
An overview of wireless networks in control and monitoring
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
A Taxonomy of Cyber Attacks on SCADA Systems
ITHINGSCPSCOM '11 Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing
Managing Incidents in Smart Grids à la Cloud
CLOUDCOM '11 Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science
International Journal of Information Security
Security aspects of SCADA and DCS environments
Critical Infrastructure Protection
A log mining approach for process monitoring in SCADA
International Journal of Information Security - Special Issue: Supervisory control and data acquisition (SCADA)
An open virtual testbed for industrial control system security research
International Journal of Information Security - Special Issue: Supervisory control and data acquisition (SCADA)
A survey SCADA of and critical infrastructure incidents
Proceedings of the 1st Annual conference on Research in information technology
Hi-index | 0.00 |
The main objective of remote substations is to provide the central system with sensitive information from critical infrastructures, such as generation, distribution or transmission power systems. Wireless sensor networks have been recently applied in this particular context due to their attractive services and inherent benefits, such as simplicity, reliability and cost savings. However, as the number of control and data acquisition systems that use the Internet infrastructure to connect to substations increases, it is necessary to consider what connectivity model the sensor infrastructure should follow: either completely isolated from the Internet or integrated with it as part of the Internet of Things paradigm. This paper therefore addresses this question by providing a thorough analysis of both security requirements and infrastructural requirements corresponding to all those TCP/IP integration strategies that can be applicable to networks with constrained computational resources.