Big Data Analytics in Future Power Systems 2018
DOI: 10.1201/9781315105499-5
|View full text |Cite
|
Sign up to set email alerts
|

Security Methods for Critical Infrastructure Communications

Abstract: 5.1 Introduction Critical infrastructure (CI) includes any systems and assets that are so vital that their destruction or disruption threatens lives, governments, economies, ecologies, or the social/political structure of nations (Moteff & Parfomak, 2004) (Luiijf & Klaver, 2004). Thus, CI includes, but is not limited to, power grids, water and sewage, hospitals, and transportation systems (Luiijf & Klaver, 2004). To enable monitoring and control of CI systems, industrial control networks are often used (Gallow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 43 publications
(75 reference statements)
0
2
0
Order By: Relevance
“…To enable the industrial IoT, CPS devices are finding increasing use in critical infrastructure, smart metering, and home automation [2,52]. CPS devices employ either open or proprietary protocols, with open protocols offering more aftermarket security options, but possibly more threats, while proprietary protocols offer "security through obscurity," but less additional aftermarket security options [53]. Of the proprietary wireless protocols, the most commonly used are Z-wave, which is based on the International Telecommunications Union-Telecommunications (ITU-T)…”
Section: Application and Example Resultsmentioning
confidence: 99%
“…To enable the industrial IoT, CPS devices are finding increasing use in critical infrastructure, smart metering, and home automation [2,52]. CPS devices employ either open or proprietary protocols, with open protocols offering more aftermarket security options, but possibly more threats, while proprietary protocols offer "security through obscurity," but less additional aftermarket security options [53]. Of the proprietary wireless protocols, the most commonly used are Z-wave, which is based on the International Telecommunications Union-Telecommunications (ITU-T)…”
Section: Application and Example Resultsmentioning
confidence: 99%
“…e-Government cyber systems are enterprise level systems which encompass a variety of devices and standards due to the myriad of e-Government services offered. Additionally, these system are expected to be both secure and reliable in operations, accounting for and responding to a variety of cyber events [1] [2]. Enterprise cyber systems are all encompassing, which monitor and control access for any device that may use the network, from computers to Internet-of-Things (IoT) devices.…”
Section: Introductionmentioning
confidence: 99%