Towards benchmarking of P2P technologies from a SCADA systems protection perspective

Khelil, A. and Jeckel, S. and Germanus, D. and Suri, Neeraj (2010) Towards benchmarking of P2P technologies from a SCADA systems protection perspective. In: Mobile Lightweight Wireless Systems : Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, pp. 400-414. ISBN 3642166431

Full text not available from this repository.

Abstract

Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/ dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and largescale overlays on top of existing physical networks. In this paper, we build the base for using P2P to enhance the resilience of deployed SCADA systems. To this end, we provide a general analysis of both domains and their compatibility. In addition, we refine the existing classifications of P2P technologies w.r.t. the needs and capabilities of SCADA systems. Consequently, we identify core P2P-based protection mechanisms for SCADA systems, based on data and path replication. Our main results are generic guidelines for the exploitation of P2P technologies to enhance the SCADA resilience. © 2010 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

Item Type:
Contribution in Book/Report/Proceedings
Subjects:
?? critical infrastructure protectiondependabilityp2pscadasecuritycritical infrastructurespeer to peer networkstechnologytelecommunication networksscada systems ??
ID Code:
137553
Deposited By:
Deposited On:
14 Oct 2019 13:46
Refereed?:
No
Published?:
Published
Last Modified:
16 Jul 2024 04:44