YASIR: A low-latency, high-integrity security retrofit for legacy SCADA systems

被引:0
|
作者
Tsang, Patrick P. [1 ]
Smith, Sean W. [1 ]
机构
[1] Dartmouth Coll, Dept Comp Sci, Hanover, NH 03755 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical infrastructures such as the electric power grid rely. Previous BITW solutions do not provide the necessary security within timing constraints; the previous solution that does is not BITW. At a hardware cost comparable to existing solutions, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency.
引用
收藏
页码:445 / 459
页数:15
相关论文
共 50 条
  • [1] HIGH SECURITY WITH LOW LATENCY IN LEGACY SCADA SYSTEMS
    Solomakhin, Rouslan
    Tsang, Patrick
    Smith, Sean
    [J]. CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 63 - +
  • [2] Low-latency cryptographic protection for SCADA communications
    Wright, AK
    Kinast, JA
    McCarty, J
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 263 - 277
  • [3] Metrics for security and performance in low-latency anonymity systems
    Murdoch, Steven J.
    Watson, Robert N. M.
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2008, 5134 : 115 - 132
  • [4] ANALYZING HIGH-INTEGRITY SYSTEMS
    CLARK, JA
    MCDERMID, JA
    BURNS, A
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 1994, 5 (01): : 18 - 23
  • [5] ADA tasking for high-integrity systems
    Humphris, D
    Dobbing, B
    [J]. LESSONS IN SYSTEM SAFETY, 2000, : 113 - 133
  • [6] Ada 2005 for high-integrity systems
    Ruiz, Jose F.
    [J]. Developments in Risk-Based Approaches to Safety, 2006, : 187 - 198
  • [7] LOW-COST HIGH-INTEGRITY LOOP COMMUNICATION-SYSTEMS
    SMITH, M
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 1981, 5 (08) : 357 - 362
  • [8] Code generation & high-integrity embedded systems
    Erkkinen, T
    [J]. DR DOBBS JOURNAL, 2004, 29 (06): : 68 - 70
  • [9] Ongoing requirements discovery in high-integrity systems
    Lutz, RR
    Mikulski, IC
    [J]. IEEE SOFTWARE, 2004, 21 (02) : 19 - +
  • [10] Towards Agile Engineering of High-Integrity Systems
    Paige, Richard F.
    Charalambous, Ramon
    Ge, Xiaocheng
    Brooke, Phillip J.
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 30 - +