Abstract
The industrial control and SCADA systems that are responsible for monitoring and controlling our critical infrastructures and manufacturing processes historically have operated in isolated environments. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack will heighten. There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. With the posted threats and listed vulnerabilities, a retrofit for these threats through the crossed cipher scheme is the main contribution of this study. To get the best of both types of cipher (symmetric and asymmetric) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.
An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-642-23141-4_43
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ryu, D., Balitanas, M.: Security Management for Distributed Denial of Service Attack. Journal of Security Engineering 7(2) (April 2010) ISSN: 1738-7531
McClanahan, R.H.: SCADA AND IP: Is Network Convergence Really Here? IEEE Industry Applications Magazine (March/April 2003)
GAO-04-628T. Critical infrastructure protection: challenges and efforts to secure control systems. Testimony Before the Subcommittee on Technology Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, March 30 (2004), http://www.gao.gov/new.items/d04628t.pdf
e-scada.com (2002), http://hwww.e-scada.com/why.html (viewed on October 15, 2005)
Bentek Systems (n.d.), Internet and Web-based SCADA, http://www.scadalink.com/technotesIP.htm (viewed on October 15, 2005)
Quinn-Judge, P.: Cracks in the system. TIME Magazine (January 9, 2002)
Reed, T.: At the Abyss: An Insider’s History of the Cold War. Presidio Press (March 2004)
Balitanas, M., Robles, R.J., Kim, N., Kim, T.: Crossed Crypto-scheme in WPA PSK Mode. In: BLISS 2009. IEEE CS, Edinburgh (2009) ISBN 978-0-7695-3754-5
Roberts, P.: Zotob, PnP Worms Slam 13 DaimlerChrysler Plants, eweek.com, August 18 (2005), http://www.eweek.com/c/a/Security/Zotob-PnP-Worms-Slam-13-DaimlerChrysler-Plants/
Stallings, W.: Cryptography and Network Security, 2nd edn. Prentice Hall, Upper Saddle River
e-scada.com (2002), http://www.e-scada.com/why.html (viewed on October 15, 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Balitanas, M.O., Kim, Th. (2011). Retracted Chapter: Supervisory Control and Data Acquisition System CAIN Issues. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)