2022
DOI: 10.1007/s11042-022-12130-9
|View full text |Cite
|
Sign up to set email alerts
|

Secured cloud SCADA system implementation for industrial applications

Abstract: The proposed Remote SCADA System (RSS) is a smarter, faster and more reliable way to control high power machines and monitor their sensors, data, and failures. The proposed system focuses mainly on building our own complete SCADA software and not using open-source SCADA software. The proposed RSS can use unlimited number of added Remote Terminal Units (RTU) nodes and each of them can handling unlimited number of input/output and can be used under different operating systems like Windows and Android. Using RSS … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 27 publications
0
4
0
1
Order By: Relevance
“…The recent applications of IoT-based SCADA cover many areas, such as plant monitoring [17], electricity [33,34], electric power plants [35][36][37][38], industrial applications [39], wastewater treatment plant [40], telecommunication system [41], traffic control [42], education [43], oil production [44], and Smarthome [45]. The literature survey of the IoT-based SCADA systems is summarized in Table 2, where the field of application, RTU hardware, protocol, and MTU software and hardware are shown.…”
Section: Ref Parametermentioning
confidence: 99%
“…The recent applications of IoT-based SCADA cover many areas, such as plant monitoring [17], electricity [33,34], electric power plants [35][36][37][38], industrial applications [39], wastewater treatment plant [40], telecommunication system [41], traffic control [42], education [43], oil production [44], and Smarthome [45]. The literature survey of the IoT-based SCADA systems is summarized in Table 2, where the field of application, RTU hardware, protocol, and MTU software and hardware are shown.…”
Section: Ref Parametermentioning
confidence: 99%
“…The Better domain knowledge, which resulted from aforementioned research, provided a strong basis for building simulation environments that are proposed in form of various SCADA testbeds [57], [177] able to visualize the stages of a cyber attack [178], and a toolbox for attack simulation to train and test the security mechanisms [179] These simulation environments and tools have provided methods for analyzing various types of threats such as stealthy attack [180], or new family attacks such as Heuristic Inference Attacks [181], related system vulnerabilities as well as exploring new ways to protect critical infrastructures such as Blockchain [182] and implementation of AI algorithms for intrusion detection systems (IDS) such as Support vector machine (SVM) access to Modbus TCP protocol [183] Furthermore, numerous solutions have been proposed, enhancing SCADA security within various domain of implementation, such as cyber attacks on cloud SCADA systems [184], end-to-end encryption between SCADA and Open PLC [185], fuzzing SCADA protocols in smart grids [186],…”
Section: B Practical Significancementioning
confidence: 99%
“…An integration process of cloud security using SCADA is carried out for industrial application where a greater number of remote units are installed in communication path. Since more units are installed, if any SCADA network fails, then other networks will carry out the entire operation with high security features [19]. However, a bigger number of remote units increase the cost of a communication unit inside the infrastructure medium.…”
Section: Literature Surveymentioning
confidence: 99%