2019 20th International Carpathian Control Conference (ICCC) 2019
DOI: 10.1109/carpathiancc.2019.8765963
|View full text |Cite
|
Sign up to set email alerts
|

A DNP3-based SCADA Architecture Supporting Electronic Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…We believe the idea can be traced back to its first mention in the paper of Hopkinson et al [23] concerning the quality of service associated with the communication networks of utility providers. Several attempts, proposals, and risk analyses have been made in the last decade about the possibility to adopt the cloud paradigm [24], or to perform an integration or a full migration into the cloud [33] - [39], involving and using many concepts from Internet of Things (IoT), Industrial Internet of Things (IIoT) and Industry 4.0 Sajid et al [34] classify and rank the best practices and recommendations for cloud adoption. Among the recommendations made, they discuss network security best practices such as network segregation, traffic analysis and intrusion detection, logging of all activities and components within the SCADA, continuous and prompt updating the software and configurations, plus different types of security verifications, audits and monitoring (addressing memory dumps, file integrity, malicious code or components, etc.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…We believe the idea can be traced back to its first mention in the paper of Hopkinson et al [23] concerning the quality of service associated with the communication networks of utility providers. Several attempts, proposals, and risk analyses have been made in the last decade about the possibility to adopt the cloud paradigm [24], or to perform an integration or a full migration into the cloud [33] - [39], involving and using many concepts from Internet of Things (IoT), Industrial Internet of Things (IIoT) and Industry 4.0 Sajid et al [34] classify and rank the best practices and recommendations for cloud adoption. Among the recommendations made, they discuss network security best practices such as network segregation, traffic analysis and intrusion detection, logging of all activities and components within the SCADA, continuous and prompt updating the software and configurations, plus different types of security verifications, audits and monitoring (addressing memory dumps, file integrity, malicious code or components, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Marian et al [39] Investigate and propose the design of a multitenant cloud-based paradigm for a SCADA MTU. Extensions of DNP3 protocol to include end-to-end authentication (through digital signatures) are also proposed.…”
Section: ---mentioning
confidence: 99%
See 2 more Smart Citations