sSCADA: securing SCADA infrastructure communications
نویسندگان
چکیده
منابع مشابه
sSCADA: securing SCADA infrastructure communications
Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water and wastewater industries. While control systems can be vulnerable to a variety o...
متن کاملTowards Securing Communications in Infrastructure-Poor Areas
Structured P2P networks have proven to be effective in the exchange of data between nodes whose identity and content are generally indexed in a DHT. For years, such DHT networks have allowed, among other users, third world inhabitants, such as African people, to exchange information among them and with the rest of the world without relying on a centralized infrastructure. Unfortunately, more th...
متن کاملInfrastructure for Securing IoT
The demands on metropolitan wireless networks is likely to change dramatically over the coming years due to the emergence of new applications and devices. The network infrastructure will need to adapt to meet these changing demands. In order to design the future infrastructure, we must first understand these workload trends and the applications that create them. In this white paper, we focus on...
متن کاملSecuring Web Communications
On my honor as a University student, on this assignment I have neither given nor received unauthorized aid as defined by the Honor Guidelines for Papers in TCC Courses. Preface Succinctly stated, this thesis works towards securing regular web communications such as instant messaging and file sharing. One might ask, is this an exercise in futility? Who is going to spy on instant messaging conver...
متن کاملSecuring Bluetooth Communications
Following the increasing confidentiality of data being transferred, many concerns have been raised as to whether Bluetooth transmission is adequately secure. The Bluetooth 2.1 standard introduces a new security mechanism called Secure Simple Pairing (SSP). However, to avoid man-in-the-middle attacks, SSP uses a 6-digit number for authentication. If a human error occurs while conducting visual v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Networks and Distributed Systems
سال: 2011
ISSN: 1754-3916,1754-3924
DOI: 10.1504/ijcnds.2011.037328