2014
DOI: 10.1109/tsg.2013.2269541
|View full text |Cite
|
Sign up to set email alerts
|

Survivable SCADA Via Intrusion-Tolerant Replication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
20
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(21 citation statements)
references
References 21 publications
1
20
0
Order By: Relevance
“…Traditional BFT protocols [11], [13] do not generally consider the timing attributes of the setpoints. Moreover, all BFT protocols require consensus among the replicas.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditional BFT protocols [11], [13] do not generally consider the timing attributes of the setpoints. Moreover, all BFT protocols require consensus among the replicas.…”
Section: Related Workmentioning
confidence: 99%
“…The consensus can take unbounded time [18], delaying delivery of setpoints to PAs indefinitely. This property makes them unsuitable for tolerating delay faults, even in the cases when they are designed for real-time applications [13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kirsch et al. [7] reported their experience in design and implementation of their first survivable SCADA system. Survivability means that the SCADA system, continue to work correctly with minimal degradation performance, even if malicious anomalies have jeopardized a part of the system.…”
Section: Introductionmentioning
confidence: 99%
“…We devise two novel state transfer strategies: one that prioritizes fast data retrieval and one that minimizes bandwidth usage, which can be used to restart a replica from a clean state; • A theoretical model that computes the resiliency of the system over its lifetime (e.g. 30 years) based on the rejuvenation rate, the number of replicas, and the strength of a single replica; and • The first integration of subsystems that support the assump-tions of a practical survivable data replication system: the Prime BFT protocol [8], which ensures performance guarantees even while under attack, and that recently has been integrated into the Siemens corporation commercial SCADA product for the power grid [9]; and the MultiCompiler [10] that produces different versions of the system, such that no two versions present an identical attack surface. This does not mean that the exploits have vanished, but rather that the attacker must craft a new attack for each replica.…”
Section: Introductionmentioning
confidence: 99%