نتایج جستجو برای: scada system

تعداد نتایج: 2231719  

2010
GIOVANNI CAGALABAN TAIHOON KIM SEOKSOO KIM

Cyber security threats and attacks are greatly affecting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. The emergence of Internet and World Wide Web...

Journal: :ISA transactions 2004
M Patel G R Cole T L Pryor N A Wilmot

This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed...

Journal: :CoRR 2015
Hosny A. Abbas Samir Ibrahim Shaheen Mohammed Hussein Amin

Modern supervisory control and data acquisition (SCADA) systems comprise variety of industrial equipment such as physical control processes, logical control systems, communication networks, computers, and communication protocols. They are concerned with control and supervision of production control processes. Modern SCADA networks contain highly distributed information, control, and location. M...

2007
Rodrigo Chandia Jesús González Tim Kilpatrick Mauricio Papa Sujeet Shenoi

SCADA systems have historically been isolated from other computing resources. However, the use of TCP/IP as a carrier protocol and the trend to interconnect SCADA systems with enterprise networks introduce serious security threats. This paper describes two strategies for securing SCADA networks, both of which have been implemented in a laboratory-scale Modbus network. The first utilizes a secur...

2002
Hideo Nakata Satoshi Harauchi Taizo Kojima Yasuaki Nakamura

This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. This method can be used with various SCADA systems, and provides visual editing tools for conversion rule modification. The SCADA sys...

2010
Rohan Chabukswar Bruno Sinópoli Gabor Karsai Annarita Giani Himanshu Neema Andrew Davis

Security is a major issue affecting SCADA systems, designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in heterogenous domains and simulation environments. Here, we simulate a chemical plant and its controller, communicating through an ethernet network. We simulate and obser...

2014
N. Rajesh

Industrial Control Systems (ICS) are open to security attacks when they are integrated with IT systems and wireless technologies for enhanced processing and remote control. These Critical Infrastructures (CIs) are highly important as they provide service for an entire nation and causes serious danger even when interrupted for a while. Some of the common SCADA (Supervisory Control and Data Acqui...

2008
Sugwon Hong Seung-Jae Lee

In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from research communities. The international standard organizations also have published several standard documents for secured SCADA systems. In this paper, we overview the SCADA system architecture and consider t...

2010
Rosslin John Robles Tai-hoon Kim

SCADA is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. On its early days, SCADA was designed to be in a private network utilizing line communication. As the scope becomes larger, utilizing line communication becomes impractical therefore integrating wirele...

Journal: :J. Inf. Sci. Eng. 2013
Donghyun Choi Hanjae Jeong Dongho Won Seungjoo Kim

Recently, as a demand for connecting Supervisory Control and Data Acquisition (SCADA) systems to open networks increases, the study of SCADA system security becomes an issue. Many researchers have proposed key management schemes for SCADA systems. However, previous studies lack the proper considerations for availability. In this paper, we build up cryptographic security requirements for robust ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید