2021
DOI: 10.1016/j.micpro.2020.103479
|View full text |Cite
|
Sign up to set email alerts
|

A security and authentication layer for SCADA/DCS applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…According to the business and communication requirements supported, communication networks in industrial systems can be divided into four network levels (from top to bottom) [25][26][27]. 1.…”
Section: Hierarchy and Characteristics Of Communication Networkmentioning
confidence: 99%
“…According to the business and communication requirements supported, communication networks in industrial systems can be divided into four network levels (from top to bottom) [25][26][27]. 1.…”
Section: Hierarchy and Characteristics Of Communication Networkmentioning
confidence: 99%
“…Supervisory control and data acquisition (SCADA) systems have become an integral part of modern ICSs. SCADA [58], [59] are ICS used to monitor and control critical distributed systems that span large geographic areas. Examples of such systems include electric power transmission and water distribution systems, and facilities in single sites such as manufacturing industries.…”
Section: B Related Workmentioning
confidence: 99%
“…Reference (Homay et al 2020) has implemented a robust security control solution as a logic level security on DCS and SCADA systems. In order to establish trust among DCS device components, the developed model ensured message integrity, but this was not considered as the protection layer on industrial automation systems.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, unsupervised learning techniques, capable of detecting cyber-attacks without a need for labels, are deemed best for this task (Keshk et al 2021, Gumaei et al 2020. However, the most existing unsupervised techniques are not able to deal with the nonlinearity and inherent correlations of multivariate time series, which represent a considerable amount of real-world data, including data streams generated by sensors in CPSs (Hu et al 2019;Rodofile et al 2019;Homay et al 2020). Therefore, a new unsupervised technique independent from any prior knowledge of cyberattacks is needed to detect intrusions in CPSs.…”
Section: Introductionmentioning
confidence: 99%