2019
DOI: 10.1007/978-3-030-23943-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting

Abstract: While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incorporate statistical fingerprinting. This is so, because datagrams in SCADA traffic follow a poison distribution. Although wrapping the SCADA traffic in a protective IPsec stream is an obvious choice, thin clients and unreliable communication channels make is less than ideal to use cryptographic solutions for security SCADA … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…The overall design and development of the IoT network usually track the rapid approach and inflate the current IoT practices and identification like RFID. Intercontinental research collaboration and efforts are desired to discourse the above IoT environment associated issues and challenges [50] [51] [62]. Moreover, to start the research exploration to address the discussed issues and challenges; followings, we have classified a few more research trends:…”
Section: Iot Research Trendsmentioning
confidence: 99%
“…The overall design and development of the IoT network usually track the rapid approach and inflate the current IoT practices and identification like RFID. Intercontinental research collaboration and efforts are desired to discourse the above IoT environment associated issues and challenges [50] [51] [62]. Moreover, to start the research exploration to address the discussed issues and challenges; followings, we have classified a few more research trends:…”
Section: Iot Research Trendsmentioning
confidence: 99%
“…However, the uncertain environment, wide distribution and bidirectional communication networks will make the AMI system susceptible to attacks [8]. Attacks such as man-in-the-middle (MITM) [9], jamming [10], false data injection (FDI) [11], eavesdropping [12], denial of service (DoS) [13], and message replay [14] can damage the confidentiality and availability of the AMI system. For example, hacking into smart meters compromises users' privacy, and intrusion into cloud servers causes system destruction and energy price manipulation.…”
Section: Introductionmentioning
confidence: 99%
“…In above article [1], reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2]. Therefore, the sentences in the article [1] with reference [11] should be cited [2] in this article as ''When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds [2],'' ''Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing [2] and [3],'' and ''However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted [2].…”
mentioning
confidence: 99%