2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) 2016
DOI: 10.1109/icumt.2016.7765386
|View full text |Cite
|
Sign up to set email alerts
|

Security challenges in SCADA systems over Wireless Sensor and Actuator Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…When looking at low-energy devices, WSNs have been identified as a way to increase the robustness of SCADA systems against network failures, due to their distributed and self-organizing nature [125]. However, major concerns exist regarding their ability to communicate securely, and the ability to interface with some proprietary SCADA protocols.…”
Section: E Resiliencementioning
confidence: 99%
“…When looking at low-energy devices, WSNs have been identified as a way to increase the robustness of SCADA systems against network failures, due to their distributed and self-organizing nature [125]. However, major concerns exist regarding their ability to communicate securely, and the ability to interface with some proprietary SCADA protocols.…”
Section: E Resiliencementioning
confidence: 99%
“…A SCADA system consists in a measurement system used to control and monitor the EPG and, normally, is constituted by the control network, communication infrastructure and process network. These systems are able to do manual or remote procedures through the control center, which provides real-time data about the EPG state [102,103].…”
Section: Monitoring and Fault Detectionmentioning
confidence: 99%
“…Second, security vulnerabilities of many integrated devices, as well as the criticality of the managed physical structures, increase the likelihood of targeted attacks [6,7]. Such attacks can aim to inflict inconsistencies across system components or to disrupt the timeliness and correctness of real-time applications.…”
Section: Introductionmentioning
confidence: 99%