Sciweavers

WSC
2004

Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems

14 years 1 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical power distribution, telecommunications, and energy refining. SCADA systems are obvious targets for cyberattacks that would seek to disrupt the physical complexities governed by a SCADA system. This paper uses a discreteevent simulation to begin to investigate the characteristics of one potential means of hardening SCADA systems against a cyber-attack. When it appears that real-time message delivery constraints are not being met (due, for example, to a denial of service attack), a peer-to-peer overlay network is used to route message floods in an effort to ensure delivery. The SCADA system, and peer-to-peer nodes all use strong hardware-based authentication techniques to prevent injection of false data or commands, and to harden the routing overlay. Our simulations help to quantify the anticipated tradeoffs of mes...
Jeffrey J. Farris, David M. Nicol
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2004
Where WSC
Authors Jeffrey J. Farris, David M. Nicol
Comments (0)