2016
DOI: 10.3390/s16010037
|View full text |Cite
|
Sign up to set email alerts
|

Design and Development of Layered Security: Future Enhancements and Directions in Transmission

Abstract: Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 57 publications
0
8
0
Order By: Relevance
“…SCADA system security issues [ 14 , 15 , 16 , 17 , 18 , 19 ] have been considered as the most prominent and important counter measures of communication [ 11 , 12 , 13 ]. Therefore, an evaluated potential method is proposed that would be significant to fight against SCADA security challenges; however, security enhancement is limited to specified goals (or security goals).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…SCADA system security issues [ 14 , 15 , 16 , 17 , 18 , 19 ] have been considered as the most prominent and important counter measures of communication [ 11 , 12 , 13 ]. Therefore, an evaluated potential method is proposed that would be significant to fight against SCADA security challenges; however, security enhancement is limited to specified goals (or security goals).…”
Section: Related Workmentioning
confidence: 99%
“…To connect the several networks points, SCADA has been employed in various wired/wireless communication media and the transmission can be accessed over modern technology platforms such as cellular phones using 2G, 3G, 4G, and general packet radio service (GPRS) [ 20 , 21 , 22 ]. However, overall SCADA communication is carried out by non-proprietary protocols which are ranked above the SCADA proprietary protocols [ 11 , 12 , 13 , 14 ].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…UE refers to user devices such as smart-phones among LTE entities. eNB is the base station [14,15]. eNB provides the user with wireless interface and wireless Remote Resource Management (RRM) features such as radio bearer control, wireless admission control, dynamic wireless resource allocation, load balancing, and Inter Cell Interference Control (ICIC).…”
Section: The Lte Networkmentioning
confidence: 99%