2019
DOI: 10.1109/access.2019.2926441
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Security in SCADA Networks: Current Issues and Future Challenges

Abstract: Supervisory Control and Data Acquisition (SCADA) systems are used for monitoring industrial devices. However, their security faces the threat of being compromised due to the increasing use of open access networks. The primary objective of this survey paper is to provide a comparative study of the on-going security research in SCADA systems. The paper provides a classification of attacks based on security requirements and network protocol layers. To secure the communication between nodes of SCADA networks, vari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0
3

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 113 publications
(73 citation statements)
references
References 36 publications
0
55
0
3
Order By: Relevance
“…Classification presented in [10] starts from the fact that attacks can occur at all levels of SCADA network and assumes attacks on hardware, attacks on software, and attacks on network connections.…”
Section: Cyber Vulnerabilities and Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Classification presented in [10] starts from the fact that attacks can occur at all levels of SCADA network and assumes attacks on hardware, attacks on software, and attacks on network connections.…”
Section: Cyber Vulnerabilities and Attacksmentioning
confidence: 99%
“…They reviewed the threats that affect industrial control systems and analyzed the state, evolution and applicability of both academic and industrial intrusion detection mechanisms. Ghosh and Sampalli distinguished rule-based and anomaly-based approaches, and provided a brief overview of six techniques, developed in the period 2013-2017 [10].…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…El Gobierno de los Estados Unidos y el Gobierno británico han promovido y desarrollado tecnologías a partir de Blockchain para asegurar las ICS del sector de energía. Además, generan herramientas para proteger la confidencialidad encriptando la información y se estandariza la tecnología IoT con contratos inteligentes para prevenir el phishing haciendo uso del correo electrónico con registros inmutables [11].…”
Section: Testeo Y Auditoríasunclassified
“…Es el caso de la investigación realizada por Alves, Das, Werth y Morris [10], en la cual se hace referencia a las amenazas potenciales cuando los desarrolladores y las empresas utilizan SCADA como una forma de potenciar infraestructuras críticas sin tener en cuenta la seguridad como factor esencial. Existen diferentes tipos de ataques que pueden ocurrir en cualquiera de las capas de operación de la organización, desde el nivel de supervisión hasta el nivel de los equipos de instrumentación, donde atacan al hardware, al software y a la conexión de red [11]. Incluso se encuentran ataques dirigidos a través del motor de búsqueda Shodan, en donde los atacantes de manera regular encuentran un camino sustancial para generar daños en los procesos que se llevan a cabo al interior de las empresas.…”
Section: Introductionunclassified
See 1 more Smart Citation