Abstract
SCADA system is the brain of ICS. Along with more and more interconnection, many security challenges have risen up. Protection SCADA system is significant critical to national infrastructure. Based on IF-MAP scheme published by TCG, we research the integration of IF-MAP and SCADA system, present an architecture for secure SCADA system by utilizing IF-MAP function of publish, subscribe and search network metadata in real-time, to unify and coordinate all the potential loosing security and safety entities, implementing defense-in-depth and defense-in-coordination.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Stuxnet (2010) A breakthough, http://symentac.com/connect/blog/stuxnet. Accessed 29 Nov 2010
IF-MAP Binding for SOAP specification version 2.0 (2010) http://trustedcomputinggroup.org. May 2010
IF-MAP Metadata for Network Security version 1.0 (2010) http://trustedcomputinggroup.org. July 2010
Tofino, Byres Security teams with Juniper Networks to Secure SCADA with Tofino, http://tofinosecurity.com/blog/tags/tofino
TNC-RSA-2010 workshop, TNC everywhere, Pervasive Security
Eric Byres, Scott Howard, Metadata Access Point (IF-MAP), New Standards Protecting Old Technology, Oct 2010
Clifford N (2010) Understanding trust and security in SCADA systems. In: Second workshop on advances in trusted computing (WATC’10), Tokyo, Japan, Nov 2010
Okhravi H (2010) Trusted_and_High_Assurance_Systems. Dissertation, University of Illinois at Urbana-Champaign
Open source IF-MAP project, http://www.ifmapdev.com
Chuan D, Lin Y, Linru M, Yuan C Towards a practical and scalable trusted software dissemination system. JoC 2(1):53–60
Li T, Yu F, Lin Y, Kong X, Yu Y Trusted computing dynamic attestation using a static analysis based behaviour model. JoC 2(1):61–68
Kryvinska N, Van Thanh D Strauss C (2010) Integrated management platform for seamless services provisioning in converged network. IJITCC 1(1):77–91
Xie B, Kumar A, Zhao D, Reddy R, He B On secure communication in integrated heterogeneous wireless networks. IJITCC 1(1):4–23
Acknowledgments
This project work is sponsored by the National High Technology Research and Development Program of China (863 Program), under Grant No. 2009aa01z426.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Deng, C., Yang, L., Ma, L., Cao, Y. (2012). Architecture for Secure SCADA System Based on IF-MAP Scheme. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_41
Download citation
DOI: https://doi.org/10.1007/978-94-007-2792-2_41
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2791-5
Online ISBN: 978-94-007-2792-2
eBook Packages: EngineeringEngineering (R0)