skip to main content
article

A testbed for secure and robust SCADA systems

Authors Info & Claims
Published:01 July 2008Publication History
Skip Abstract Section

Abstract

The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a need to have a SCADA testbed for checking vulnerabilities and validating security solutions. In this paper we develop such a SCADA testbed.

References

  1. 21 Steps to Improve Cyber Security of SCADA Networks. U.S. Department of Energy white paper, 2005.Google ScholarGoogle Scholar
  2. Aspentech. http://www.aspentech.com/Google ScholarGoogle Scholar
  3. The C2 Wind Tunnel, https://wiki.isis.vanderbilt.edu/c2w/Google ScholarGoogle Scholar
  4. The Center for SCADA Security. Sandia National Labrotories, http://www. sandia.gov/scada/testbeds.htm.Google ScholarGoogle Scholar
  5. Henrik Christiansson and Eric Luiijf. Creating a European SCADA Security Testbed. In IFIP International Federation for Information Processing, Springer Boston 2007.Google ScholarGoogle Scholar
  6. The DETER Testbed, http://www.deterlab.net/Google ScholarGoogle Scholar
  7. DNP. http://www.dnp.org/Google ScholarGoogle Scholar
  8. G. Dondossola, J. Szanto, M. Masera, I. Nai Fovino. Evaluation of the effects of intentional threats to power substation control systems. In Proceedings of the International Workshop on Complex Network and Critical Infrastructure Protection, 2006.Google ScholarGoogle Scholar
  9. Emulab. http://www.emulab.net/Google ScholarGoogle Scholar
  10. Scott Fluhrer and Itsik Mantin and Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. Lecture Notes in Computer Science, 2259, 2001.Google ScholarGoogle Scholar
  11. HART Communication Foundation. WirelessHART Technical Data Sheet, 2007. www.hartcomm.orgGoogle ScholarGoogle Scholar
  12. Carl Hartung, James Balasalle and Richard Han. Node Compromise in Sensor Networks: The Need for Secure Systems. Department of Computer Science University of Colorado at Boulder, 2005.Google ScholarGoogle Scholar
  13. High-Level Architecture, IEEE Standard 1516. www.ieee.orgGoogle ScholarGoogle Scholar
  14. Vinay M. Igure, Sean A. Laughter and Ronald D. Williams, Security issues in SCADA networks. In Computers & Security Volume 25, Issue 7, October 2006, Pages 498-506.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. MathWorks Simulink. http://www.mathworks.comGoogle ScholarGoogle Scholar
  16. Modbus-IDA. http://www.modbus.org/Google ScholarGoogle Scholar
  17. A. Moore, R. Ellison and R. Linger. Attack modelling for information security and survivability. In SEI, 2001.Google ScholarGoogle Scholar
  18. Hamed Okhravi, Chris Grier, Matt Davis, Zeb Tate, David Nicol, and Tom Overbye. Cyber-Security Simulation Testbed. http://www.iti.uiuc.edu/ tcip/tcip_presentations.htmlGoogle ScholarGoogle Scholar
  19. Omnet++. http://www.omnetpp.org/Google ScholarGoogle Scholar
  20. A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: SoftWare-based ATTestation for Embedded Devices. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 2004.Google ScholarGoogle ScholarCross RefCross Ref
  21. A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Brighton, United Kingdom, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure Code Update By Attestation in Sensor Networks. In ACM Workshop on Wireless Security (WiSe 2006), Los Angeles, CA, September 29, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. TrueTime. http://www.control.lth.se/truetime/Google ScholarGoogle Scholar
  24. Bernard Zeigler, Tag Gon Kim, Herbert Praehofer (2000). Theory of Modeling and Simulation, Second Edition, Academic Press, New York. ISBN 978-0127784557. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A testbed for secure and robust SCADA systems

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM SIGBED Review
                ACM SIGBED Review  Volume 5, Issue 2
                Special issue on the the 14th IEEE real-time and embedded technology and applications symposium (RTAS'08) WIP session
                July 2008
                22 pages
                EISSN:1551-3688
                DOI:10.1145/1399583
                Issue’s Table of Contents

                Copyright © 2008 Authors

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 July 2008

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader