2012
DOI: 10.1007/978-3-642-35764-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices

Abstract: The critical infrastructure cannot operate without SCADA systems; this has made the task of securing SCADA systems a national security priority. While progress has been made in securing control networks, security at the field device level is still lacking. Field devices present unique security challenges and these challenges are compounded by the presence of legacy devices. This paper describes a technique that uses Bloom filters to implement challenge-response authentication and role-based access control in f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…As part of future work, we plan to assess the end-to-end performance of a system integrating MORRO under different evaluation settings, such as a production configuration deployed on an elastic cloud infrastructure. We also plan to optimize MORRO in terms of time efficiency by adopting cache-based enforcement [24,52], and in terms of space efficiency, by adopting the Kevoree Modeling Framework (KMF) [22], which is optimized for manipulating models at run time on large distributed systems.…”
Section: Discussionmentioning
confidence: 99%
“…As part of future work, we plan to assess the end-to-end performance of a system integrating MORRO under different evaluation settings, such as a production configuration deployed on an elastic cloud infrastructure. We also plan to optimize MORRO in terms of time efficiency by adopting cache-based enforcement [24,52], and in terms of space efficiency, by adopting the Kevoree Modeling Framework (KMF) [22], which is optimized for manipulating models at run time on large distributed systems.…”
Section: Discussionmentioning
confidence: 99%
“…However, Bloom filters have the advantage of space and time, and their space advantage is that their volume does not increase with increasing elements. The time advantage is that it does not rely on the loop structure to determine if an element is in the collection [43]. Thus, the bloom filter is utilized in our scheme.…”
Section: Combining Identity Management and Access Policymentioning
confidence: 99%
“…increasing elements. The time advantage is that it does not rely on the loop structure to determine if an element is in the collection [43]. Thus, the bloom filter is utilized in our scheme.…”
Section: Combining Identity Management and Access Policymentioning
confidence: 99%