IFIP International Federation for Information Processing
DOI: 10.1007/978-0-387-75462-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancements for Distributed Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 11 publications
0
24
0
Order By: Relevance
“…These protocols provide interconnectivity with DNP3 over the Internet. Therefore, this protocol is also defined as an open or non-proprietary protocol in SCADA systems [1][2][3][6][7][8][9][10][11].…”
Section: Dnp3mentioning
confidence: 99%
See 2 more Smart Citations
“…These protocols provide interconnectivity with DNP3 over the Internet. Therefore, this protocol is also defined as an open or non-proprietary protocol in SCADA systems [1][2][3][6][7][8][9][10][11].…”
Section: Dnp3mentioning
confidence: 99%
“…The security percentage is computed from the second scenario and this shows the significant enhancements of DNP3 security in automated polling during open connectivity with protocols such as TCP/IP. This also shows great enhancements compared to the first scenario and third scenario and with existing end-to-end developments [8][9][10][11][12][13][14][16][17][18][19]22,24,34,50,52]. …”
Section: Attack Detection and Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Note that it is necessary to extract and isolate security-related code from control system software. For example, in a field device that supports security-enhanced DNP3 [7], the code that performs authentication and message integrity checking for DNP3 messages must be removed from the main body of code and placed in its own protected compartment. The isolation of security-related code has the added benefit of reducing the complexity of control applications, especially when security-related code has to be added or upgraded.…”
Section: Security-hardened Field Devicesmentioning
confidence: 99%
“…Hieb and Graham [6] have investigated techniques for creating security-hardened RTUs with reduced commercial kernels or microkernels. Hieb, Patel and Graham [7] have discussed security enhancements for DCSs involving protocol enhancements and a minimal kernel RTU (a reduced version of LyxnOS, a commercial RTOS).…”
Section: Introductionmentioning
confidence: 99%