2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST) 2018
DOI: 10.1109/mocast.2018.8376629
|View full text |Cite
|
Sign up to set email alerts
|

Trusted hardware sensors for anomaly detection in critical infrastructure systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…They follow a broad range of different, not IT related, control protocols like ISA 100, Modbus, CAN, etc. Some of these devices and protocols have proprietary software or standards that may make IT countermeasures unfitting [2,5]. This reason along with the fact that a successful CIS attack has high impact and thus high payoff, attracts very skilled attackers that can mount very sophisticated attacks on CPSs and CIS [13].…”
Section: Critical Infrastructure Security Monitoring System Anomaly Detection Sensorsmentioning
confidence: 99%
See 2 more Smart Citations
“…They follow a broad range of different, not IT related, control protocols like ISA 100, Modbus, CAN, etc. Some of these devices and protocols have proprietary software or standards that may make IT countermeasures unfitting [2,5]. This reason along with the fact that a successful CIS attack has high impact and thus high payoff, attracts very skilled attackers that can mount very sophisticated attacks on CPSs and CIS [13].…”
Section: Critical Infrastructure Security Monitoring System Anomaly Detection Sensorsmentioning
confidence: 99%
“…There is a critical need to fortify CIs to the maximum possible, since a major cyberattack in one of them may cause severe problems not only at a technical level but also in the economy, public safety, etc. [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [41] a method for authentication of smart sensor with a router which has associated a TPM is presented, in order to provide a solution for machine-to-machine communication in an IoT Environment. Literature is also approaching the enhancement of the SCADA and automation system by using the TPM in order to ensure hardware security along with the software security, an action necessary due to the evolution of the systems towards Industry 4.0 [42,43].…”
Section: Related Workmentioning
confidence: 99%
“…The overall concept adopted in the TCG solution, and expanded, differentiated in more processor-oriented approaches is to achieve a level of isolation on the security critical operations on the smart sensor/actuator end node. Following the above directives, as described in [11], there are two approaches that may be introduced to a smart city end node to achieve trust. The first technology to be used is related to a lightweight version of TCG's TPM specification like the Device Identifier Composition Engine (DICE) proposal, which is ideal for Low energy and Low resources devices without a TPM (most commercial embedded systems do not yet have a TPM chip).…”
Section: Introducing Trust To Smart City End Nodesmentioning
confidence: 99%