2010
DOI: 10.1109/tpwrd.2009.2034830
|View full text |Cite
|
Sign up to set email alerts
|

A Trust System Architecture for SCADA Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(27 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…In conclusion, the approximate security lies in the range of 60 to 80 percent, which is comparatively low relative to the current research, which computed security results of 95 to 98 percent. Therefore, this study and others [25,[29][30][31][35][36][37][38][39][40]59,[91][92][93][94][95][96][97][98]101,102] conclude that security in any system should be significantly improved if a security mechanism can be a part of a system rather depending on an end-to-end approach. However, security developments are quite difficult to design and test inside of the protocol and the required depth knowledge of the protocol and other implementation details except security performance are more accurate and remarkable in these scenarios.…”
Section: Performance Evaluation and Comparisonmentioning
confidence: 91%
See 3 more Smart Citations
“…In conclusion, the approximate security lies in the range of 60 to 80 percent, which is comparatively low relative to the current research, which computed security results of 95 to 98 percent. Therefore, this study and others [25,[29][30][31][35][36][37][38][39][40]59,[91][92][93][94][95][96][97][98]101,102] conclude that security in any system should be significantly improved if a security mechanism can be a part of a system rather depending on an end-to-end approach. However, security developments are quite difficult to design and test inside of the protocol and the required depth knowledge of the protocol and other implementation details except security performance are more accurate and remarkable in these scenarios.…”
Section: Performance Evaluation and Comparisonmentioning
confidence: 91%
“…During transmission, the message is treated with security methods (or cryptography algorithms) to keep the message (or payload) secure from un-authorized users (or attackers) [23][24][25][26][27][28][29][30][31][32]59,99,100]. However, these security developments [25,[29][30][31][35][36][37][38][39][40] are usually end-to-end based, meaning that security developments are not part of a SCADA system and its protocols, but rather that security is treated and computed as part of external component sources. The computed results are far away from our computed results.…”
Section: Performance Evaluation and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…The Trust System proposed by Coates et al is a communication security device, which is combined together with firewall and intrusion detection abilities, designed for use with strict real-time requirements network systems [8]. The concept of this proposed trust system is to take common standalone security products (i.e., firewalls, IDSs, router ACLs, etc.)…”
Section: Trust System For Scada Networkmentioning
confidence: 99%