sSCADA: securing SCADA infrastructure communications

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

sSCADA: securing SCADA infrastructure communications

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water and wastewater industries. While control systems can be vulnerable to a variety o...

متن کامل

Towards Securing Communications in Infrastructure-Poor Areas

Structured P2P networks have proven to be effective in the exchange of data between nodes whose identity and content are generally indexed in a DHT. For years, such DHT networks have allowed, among other users, third world inhabitants, such as African people, to exchange information among them and with the rest of the world without relying on a centralized infrastructure. Unfortunately, more th...

متن کامل

Infrastructure for Securing IoT

The demands on metropolitan wireless networks is likely to change dramatically over the coming years due to the emergence of new applications and devices. The network infrastructure will need to adapt to meet these changing demands. In order to design the future infrastructure, we must first understand these workload trends and the applications that create them. In this white paper, we focus on...

متن کامل

Securing Web Communications

On my honor as a University student, on this assignment I have neither given nor received unauthorized aid as defined by the Honor Guidelines for Papers in TCC Courses. Preface Succinctly stated, this thesis works towards securing regular web communications such as instant messaging and file sharing. One might ask, is this an exercise in futility? Who is going to spy on instant messaging conver...

متن کامل

Securing Bluetooth Communications

Following the increasing confidentiality of data being transferred, many concerns have been raised as to whether Bluetooth transmission is adequately secure. The Bluetooth 2.1 standard introduces a new security mechanism called Secure Simple Pairing (SSP). However, to avoid man-in-the-middle attacks, SSP uses a 6-digit number for authentication. If a human error occurs while conducting visual v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Communication Networks and Distributed Systems

سال: 2011

ISSN: 1754-3916,1754-3924

DOI: 10.1504/ijcnds.2011.037328