Skip to main content

Retracted Chapter: Supervisory Control and Data Acquisition System CAIN Issues

  • Conference paper
Information Security and Assurance (ISA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 200))

Included in the following conference series:

  • 1073 Accesses

Abstract

The industrial control and SCADA systems that are responsible for monitoring and controlling our critical infrastructures and manufacturing processes historically have operated in isolated environments. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack will heighten. There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. With the posted threats and listed vulnerabilities, a retrofit for these threats through the crossed cipher scheme is the main contribution of this study. To get the best of both types of cipher (symmetric and asymmetric) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.

An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-642-23141-4_43

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ryu, D., Balitanas, M.: Security Management for Distributed Denial of Service Attack. Journal of Security Engineering 7(2) (April 2010) ISSN: 1738-7531

    Google Scholar 

  2. McClanahan, R.H.: SCADA AND IP: Is Network Convergence Really Here? IEEE Industry Applications Magazine (March/April 2003)

    Google Scholar 

  3. GAO-04-628T. Critical infrastructure protection: challenges and efforts to secure control systems. Testimony Before the Subcommittee on Technology Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, March 30 (2004), http://www.gao.gov/new.items/d04628t.pdf

  4. e-scada.com (2002), http://hwww.e-scada.com/why.html (viewed on October 15, 2005)

  5. Bentek Systems (n.d.), Internet and Web-based SCADA, http://www.scadalink.com/technotesIP.htm (viewed on October 15, 2005)

  6. Quinn-Judge, P.: Cracks in the system. TIME Magazine (January 9, 2002)

    Google Scholar 

  7. Reed, T.: At the Abyss: An Insider’s History of the Cold War. Presidio Press (March 2004)

    Google Scholar 

  8. Balitanas, M., Robles, R.J., Kim, N., Kim, T.: Crossed Crypto-scheme in WPA PSK Mode. In: BLISS 2009. IEEE CS, Edinburgh (2009) ISBN 978-0-7695-3754-5

    Google Scholar 

  9. Roberts, P.: Zotob, PnP Worms Slam 13 DaimlerChrysler Plants, eweek.com, August 18 (2005), http://www.eweek.com/c/a/Security/Zotob-PnP-Worms-Slam-13-DaimlerChrysler-Plants/

  10. Stallings, W.: Cryptography and Network Security, 2nd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  11. http://www.scadasystems.net/

  12. e-scada.com (2002), http://www.e-scada.com/why.html (viewed on October 15, 2005)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Balitanas, M.O., Kim, Th. (2011). Retracted Chapter: Supervisory Control and Data Acquisition System CAIN Issues. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23141-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23140-7

  • Online ISBN: 978-3-642-23141-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics