Results 11 to 20 of about 20,660 (211)

TTAS: Trusted Token Authentication Service of Securing SCADA Network in Energy Management System for Industrial Internet of Things

open access: yesSensors, 2021
The vigorous development of the Industrial Internet of Things brings the advanced connection function of the new generation of industrial automation and control systems.
Yu-Sheng Yang   +5 more
doaj   +1 more source

Securing SCADA Energy Management System under DDos Attacks Using Token Verification Approach

open access: yesApplied Sciences, 2022
The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and ...
Yu-Sheng Yang   +5 more
doaj   +1 more source

A Novel Moving Target Defense Scheme With Physical Unclonable Functions-Based Authentication

open access: yesIEEE Access, 2022
Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system.
Chuan-Gang Liu
doaj   +1 more source

Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems

open access: yesSensors, 2023
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems.
Alexandra Tidrea   +2 more
doaj   +1 more source

Efficient Classification of Enciphered SCADA Network Traffic in Smart Factory Using Decision Tree Algorithm

open access: yesIEEE Access, 2021
Vulnerability detection in Supervisory Control and Data Acquisition (SCADA) network of a Smart Factory (SF) is a high-priority research area in the cyber-security domain.
Love Allen Chijioke Ahakonye   +3 more
doaj   +1 more source

Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems [PDF]

open access: yes, 2013
SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-
May, John H R   +2 more
core   +1 more source

Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems [PDF]

open access: yes, 2016
Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions.
Evangelopoulou, Maria   +2 more
core   +2 more sources

Scada Security? [PDF]

open access: yesMechanical Engineering, 2012
This article focuses on the introduction of advance security checks to counter negative publicity of supervisory control and data acquisition (SCADA) systems. The SCADA security concerns have come to be seen as a big deal because the systems can be found within power plants, refineries, pipelines, water treatment plants, and the telecommunications ...
openaire   +1 more source

Design and Development of Layered Security: Future Enhancements and Directions in Transmission

open access: yesSensors, 2016
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities.
Aamir Shahzad   +6 more
doaj   +1 more source

Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2012
An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from ...
HyungJun Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy