Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2009;9(11):9380-97.
doi: 10.3390/s91109380. Epub 2009 Nov 20.

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

Affiliations

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

José M Moya et al. Sensors (Basel). 2009.

Abstract

The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

Keywords: SCADA control system; countermeasure; critical infrastructure; cyber security; reputation system; security framework.

PubMed Disclaimer

Figures

Figure 1.
Figure 1.
Visualization Property of SOM Clustering.
Figure 2.
Figure 2.
Function for updating reputation values.
Figure 3.
Figure 3.
Reputation evolution for a sybil attack.
Figure 4.
Figure 4.
Evolution of the true/false positives/negatives for a sybil attack.
Figure 5.
Figure 5.
Evolution of the impact of the attack and the based on the sensor node redundancy.
Figure 6.
Figure 6.
Reputation evolution for a sybil attack after a badmouthing attack.

References

    1. Maynor D., Graham R. Black Hat Federal 2006. Black Hat; Washington, DC, USA: 2006. SCADA security and terrorism: we're not crying wolf; pp. 1–36.
    1. Lemos R. SCADA system makers pushed toward security. SecurityFocus. 2006 Jul 26;:1–2.
    1. Ravi S., Raghunathan A., Kocher P., Hattangady S. Security in embedded systems: design challenges. Trans. on Embed. Comput. Sys. 2004;3:461–491.
    1. Holcomb J., Perine C., Panadero X., Farinas E. Threat Modeling of NetDDE Vulnerabilities as used in Control Systems. Proceedings of the SCADA Security Scientific Symposium (S4); Miami Beach, FL, USA: Digital Bond; 2008. pp. 2:1–2:36.
    1. Udassin E. Control system attack vectors and examples: field site and corporate network; Proceedings of the SCADA Security Scientific Symposium (S4); Miami Beach, FL, USA: Digital Bond; 2008. pp. 1–11.

LinkOut - more resources