2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018
DOI: 10.1109/dsn.2018.00036
|View full text |Cite
|
Sign up to set email alerts
|

Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 29 publications
0
15
0
Order By: Relevance
“…Babay et al [147] developed a novel architecture called Spire, which distributes replicas of the SCADA control center across multiple locations in order to enhance the resilience against cyber attacks. In order to evaluate the efficiency of the proposed solution, the authors deployed Spire in a wide area consisting of two control centers and two data centers.…”
Section: Scada Survivability and Resiliencementioning
confidence: 99%
“…Babay et al [147] developed a novel architecture called Spire, which distributes replicas of the SCADA control center across multiple locations in order to enhance the resilience against cyber attacks. In order to evaluate the efficiency of the proposed solution, the authors deployed Spire in a wide area consisting of two control centers and two data centers.…”
Section: Scada Survivability and Resiliencementioning
confidence: 99%
“…Ref. [81] develops a survivable SCADA model based on intrusion-tolerant replication protocols. By using the model, the SCADA system can continue to operate and with minimal performance degradation even if malicious attacks compromise part of the system, which is essential for maintaining high availability in the face of cyber-attacks.…”
Section: Critical Infrastructure Protectionmentioning
confidence: 99%
“…When a timer expires, p i checks R HB [p i ] for the number of accumulated signatures on its corresponding heartbeat. If that number is ≤ 2f , p i enters the passive mode; otherwise it removes the corresponding entry from R HB [p i ] (lines [13][14][15][16][17][18][19].…”
Section: Detailed Presentation Of Pistismentioning
confidence: 99%
“…Sending and Receiving Echoes. When p i receives an Echo ( p j , sq, v , Σ), p i reacts differently depending on whether it is not already echoing for this instance (lines 8-15), already echoing v (lines [16][17][18][19][20], or already echoing a different value (lines 21-27). In all three cases, p i starts delivering a message (and stops sending echoes) as soon as at least 2f + 1 distinct signatures have been collected for that message.…”
Section: Detailed Presentation Of Pistismentioning
confidence: 99%
See 1 more Smart Citation