Mechanisms to Provide Integrity in SCADA and PCS devices

نویسندگان

  • Aakash Shah
  • Adrian Perrig
  • Bruno Sinopoli
چکیده

Supervisory Control and Data Acquisition (SCADA) systems control and monitor critical infrastructure such as natural gas, oil, water, waste-water, and electric power distribution and transmission systems. SCADA systems consist of a central control center connected to Remote Terminal Units (RTUs) which directly interface with sensors and actuators connected to the physical infrastructure. Most RTUs are not designed with security in mind and consequently are vulnerable to various attacks compromising their code integrity. In this paper, we propose the use of software-only schemes that can be implemented on RTUs to provide verification of code integrity, untampered code execution and secure code updates.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using a Specification-based Intrusion Detection System to Extend the DNP3 Protocol with Security Functionalities

Modern SCADA systems are increasingly adopting Internet technologies to control distributed industrial assets. As proprietary communication protocols are increasingly being used over public networks without efficient protection mechanisms, it is increasingly easier for attackers to penetrate into the communication networks of companies that operate electrical power grids, water plants, and othe...

متن کامل

A Situational Awareness Architecture for the Smart Grid

Components of the electric power grid that were traditionally deployed in physically isolated networks, are now using IP based, interconnected networks to transmit Supervisory Control and Data Acquisition (SCADA) messages. SCADA protocols were not designed with security in mind. Therefore, in order to enhance security, access control and risk mitigation, operators need detailed and accurate inf...

متن کامل

Providing Situational Awareness for Pipeline Control Operations

A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awa...

متن کامل

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environmen...

متن کامل

Availability Based Risk Analysis for SCADA Embedded Computer Systems

Information Technology (IT) Security is often focused on Confidentiality, Integrity and Availability of software and data (information) contained in networked computers, servers and storage devices. In embedded industrial control or Supervisory Control and Data Acquisition (SCADA) systems the security focus must be on the protection of the availability of the system’s functions. This basic para...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008