2015
DOI: 10.1007/s11042-015-3050-2
|View full text |Cite
|
Sign up to set email alerts
|

The protocol design and New approach for SCADA security enhancement during sensors broadcasting system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…Thereby, the system is considered as a fully automated system and reachable to numerous smart devices, such as cellular devices, laptops, and others, using the Internet access. However, the system is not designed with the considerations of security, that is, Internet security as well as the security protection against the potential system's vulnerabilities [48,49]. So, the comprehensive security design will be a major contribution to this study aimed to draft in nearly future; nevertheless, here in the current stage, this study considers the inclusive smart setup procedure which is useful during the verification process to verify whether or not the vehicle that beings utilizing the parking service is authorized or not.…”
Section: Registration and Primary Featuresmentioning
confidence: 99%
“…Thereby, the system is considered as a fully automated system and reachable to numerous smart devices, such as cellular devices, laptops, and others, using the Internet access. However, the system is not designed with the considerations of security, that is, Internet security as well as the security protection against the potential system's vulnerabilities [48,49]. So, the comprehensive security design will be a major contribution to this study aimed to draft in nearly future; nevertheless, here in the current stage, this study considers the inclusive smart setup procedure which is useful during the verification process to verify whether or not the vehicle that beings utilizing the parking service is authorized or not.…”
Section: Registration and Primary Featuresmentioning
confidence: 99%
“…UE refers to user devices such as smart-phones among LTE entities. eNB is the base station [14,15]. eNB provides the user with wireless interface and wireless Remote Resource Management (RRM) features such as radio bearer control, wireless admission control, dynamic wireless resource allocation, load balancing, and Inter Cell Interference Control (ICIC).…”
Section: The Lte Networkmentioning
confidence: 99%
“…In data link layer, frames are constructed and passes to physical media or/and open protocols such as, TCP/IP, UDP and others [3]. As a part of SCADA system, DNP3 protocol stack is designed, and security via cryptography is deployed and tested at data link layer only, which would be a sign of protection for SCADA/DNP3 transmission over physical link, against attacks [3,14]. Furthermore, for controlling and manipulating the security development process, a new DNP3 protocol stack is designed and deployed without altering the original flow of bytes within stack (or within data link layer stack).…”
Section: Literature Surveymentioning
confidence: 99%
“…In researches [11,14], simulation based multimedia environments were designed to carry the SCADA communication in industrial environments such as, water pumping station, gas station, electrical station and other SCADA industries, but are limited to specific station, and plant . Meaning that, automation and processing are simulated between sensors and actuators, by mean of programmable logical controllers (PLCs) but fail to display the information that have been occurred in transmission.…”
Section: Proposed Design and Implementationmentioning
confidence: 99%