메뉴 건너뛰기




Volumn 4, Issue , 2016, Pages 1375-1384

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges

Author keywords

APT; Industrial Control System; Internet of Things (IoT); NIST; PRECYSE; SOA; Supervisory Control and Data Acquisition

Indexed keywords

BIOMEDICAL ENGINEERING; CLOUD COMPUTING; COMPLEX NETWORKS; COMPUTER SUPPORTED COOPERATIVE WORK; DATA ACQUISITION; DISTRIBUTED COMPUTER SYSTEMS; EMBEDDED SYSTEMS; FAULT TOLERANCE; INTEGRATION; INTERNET; INTERNET OF THINGS; PATIENT MONITORING; WIRELESS SENSOR NETWORKS;

EID: 84979815252     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2016.2549047     Document Type: Review
Times cited : (362)

References (43)
  • 1
    • 84906928244 scopus 로고    scopus 로고
    • Improvement of human-plant interactivity via industrial cloud-based supervisory control and data acquisition system
    • Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World Berlin, Germany: Springer
    • T. Lojka and I. Zolotová, "Improvement of human-plant interactivity via industrial cloud-based supervisory control and data acquisition system," Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World (IFIP Advances in Information and Communication Technology). Berlin, Germany: Springer, 2014, pp. 83-90.
    • (2014) IFIP Advances in Information and Communication Technology , pp. 83-90
    • Lojka, T.1    Zolotová, I.2
  • 2
    • 84979551040 scopus 로고    scopus 로고
    • Smart monitoring of potato crop: A cyber-physical system architecture model in the field of precision agriculture
    • Sep.
    • C.-R. Rad, O. Hancu, I.-A. Takacs, and G. Olteanu, "Smart monitoring of potato crop: A cyber-physical system architecture model in the field of precision agriculture," Agricult. Agricult. Sci. Procedia, vol. 6, pp. 73-79, Sep. 2015, doi: 10.1016/j.aaspro.2015.08.041.
    • (2015) Agricult. Agricult. Sci. Procedia , vol.6 , pp. 73-79
    • Rad, C.-R.1    Hancu, O.2    Takacs, I.-A.3    Olteanu, G.4
  • 4
    • 85032339833 scopus 로고    scopus 로고
    • Imperfect information dynamic stackelberg game based resource allocation using hidden Markov for cloud computing
    • Feb.
    • W. Wei, X. Fan, H. Song, X. Fan, and J. Yang, "Imperfect information dynamic stackelberg game based resource allocation using hidden Markov for cloud computing," IEEE Trans. Services Comput., vol. PP, no. 99, p. 1, Feb. 2016, doi: 10.1109/TSC.2016.2528246.
    • (2016) IEEE Trans. Services Comput. , vol.PP , Issue.99 , pp. 1
    • Wei, W.1    Fan, X.2    Song, H.3    Fan, X.4    Yang, J.5
  • 5
    • 84964260924 scopus 로고    scopus 로고
    • Cloud-centric multi-level authentication as a service for secure public safety device networks
    • I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, "Cloud-centric multi-level authentication as a service for secure public safety device networks," IEEE Commun. Mag., vol. 54, no. 4, 2016.
    • (2016) IEEE Commun. Mag. , vol.54 , Issue.4
    • Butun, I.1    Erol-Kantarci, M.2    Kantarci, B.3    Song, H.4
  • 6
    • 84979826786 scopus 로고    scopus 로고
    • Cloud computing for transportation cyber-physical systems
    • L. M. Patnaik, Ed. Boca Raton, FL, USA: CRC Press
    • H. Song, Q. Du, P. Ren, W. Li, and A. Mehmood, "Cloud computing for transportation cyber-physical systems," in Cyber-Physical Systems: A Computational Perspective, vol. 15, L. M. Patnaik, Ed. Boca Raton, FL, USA: CRC Press, 2015, pp. 351-369.
    • (2015) Cyber-Physical Systems: A Computational Perspective , vol.15 , pp. 351-369
    • Song, H.1    Du, Q.2    Ren, P.3    Li, W.4    Mehmood, A.5
  • 7
    • 84979828689 scopus 로고    scopus 로고
    • Internet of Things and big data analytics for smart and connected communities
    • Mar.
    • Y. Sun, H. Song, A. J. Jara, and R. Bie, "Internet of Things and big data analytics for smart and connected communities," IEEE Access, vol. 4, pp. 766-773, Mar. 2016, doi: 10.1109/ACCESS.2016.2529723.
    • (2016) IEEE Access , vol.4 , pp. 766-773
    • Sun, Y.1    Song, H.2    Jara, A.J.3    Bie, R.4
  • 8
    • 84959287201 scopus 로고    scopus 로고
    • Identifying an OpenID anti-phishing scheme for cyberspace
    • H. Abbas, M. Q. Mahmoodzadeh, F. A. Khan, and M. Pasha, "Identifying an OpenID anti-phishing scheme for cyberspace," Secur. Commun. Netw., vol. 9, no. 6, pp. 481-491, 2014.
    • (2014) Secur. Commun. Netw. , vol.9 , Issue.6 , pp. 481-491
    • Abbas, H.1    Mahmoodzadeh, M.Q.2    Khan, F.A.3    Pasha, M.4
  • 9
    • 79955624015 scopus 로고    scopus 로고
    • Addressing dynamic issues in information security management
    • H. Abbas, C. Magnusson, L. Yngstrom, and A. Hemani, "Addressing dynamic issues in information security management," Inf. Manage. Comput. Secur., vol. 19, no. 1, pp. 5-24, 2011.
    • (2011) Inf. Manage. Comput. Secur. , vol.19 , Issue.1 , pp. 5-24
    • Abbas, H.1    Magnusson, C.2    Yngstrom, L.3    Hemani, A.4
  • 10
    • 84955452393 scopus 로고    scopus 로고
    • Human-oriented design of secure machine-to-machine communication system for e-healthcare society
    • Oct.
    • K. Saleem, A. Derhab, J. Al-Muhtadi, and B. Shahzad, "Human-oriented design of secure machine-to-machine communication system for e-healthcare society," Comput. Human Behavior, vol. 51, pp. 977-985, Oct. 2015.
    • (2015) Comput. Human Behavior , vol.51 , pp. 977-985
    • Saleem, K.1    Derhab, A.2    Al-Muhtadi, J.3    Shahzad, B.4
  • 14
    • 79958813979 scopus 로고    scopus 로고
    • Assessment of the vulnerabilities of SCADA, control systems and critical infrastructure systems
    • R. J. Robles and M.-K. Choi, "Assessment of the vulnerabilities of SCADA, control systems and critical infrastructure systems," Int. J. Grid Distrib. Comput., vol. 2, no. 2, pp. 27-34, 2009.
    • (2009) Int. J. Grid Distrib. Comput. , vol.2 , Issue.2 , pp. 27-34
    • Robles, R.J.1    Choi, M.-K.2
  • 15
    • 31044446079 scopus 로고    scopus 로고
    • Security of distributed control systems: The concern increases
    • Dec.
    • S. Mustard, "Security of distributed control systems: The concern increases," J. Comput. Control Eng., vol. 16, no. 6, pp. 19-25, Dec. 2005.
    • (2005) J. Comput. Control Eng. , vol.16 , Issue.6 , pp. 19-25
    • Mustard, S.1
  • 16
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011.
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.P.1    Rohozinski, R.2
  • 18
    • 34250215846 scopus 로고    scopus 로고
    • SCADA systems: Vulnerabilities and remediation
    • Apr.
    • J. D. Fernandez and A. E. Fernandez, "SCADA systems: Vulnerabilities and remediation," J. Comput. Sci. Colleges Arch., vol. 20, no. 4, pp. 160-168, Apr. 2005.
    • (2005) J. Comput. Sci. Colleges Arch. , vol.20 , Issue.4 , pp. 160-168
    • Fernandez, J.D.1    Fernandez, A.E.2
  • 20
    • 84957563971 scopus 로고    scopus 로고
    • Initial investigation of industrial control system (ICS) security using artificial immune system (AIS)
    • M. Bere and H. Muyingi, "Initial investigation of industrial control system (ICS) security using artificial immune system (AIS)," in Proc. Int. Conf. Emerg. Trends Netw. Comput. Commun. (ETNCC), 2015, pp. 79-84.
    • (2015) Proc. Int. Conf. Emerg. Trends Netw. Comput. Commun. (ETNCC) , pp. 79-84
    • Bere, M.1    Muyingi, H.2
  • 22
    • 84871951474 scopus 로고    scopus 로고
    • sSCADA: Securing SCADA infrastructure communications
    • Y. Wang, "sSCADA: Securing SCADA infrastructure communications," Int. J. Commun. Netw. Distrib. Syst., vol. 6, no. 1, pp. 59-78, 2012.
    • (2012) Int. J. Commun. Netw. Distrib. Syst. , vol.6 , Issue.1 , pp. 59-78
    • Wang, Y.1
  • 24
    • 84890569414 scopus 로고    scopus 로고
    • A novel security scheme for the smart grid and SCADA networks
    • H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks," Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013.
    • (2013) Wireless Pers. Commun. , vol.73 , Issue.4 , pp. 1547-1559
    • Al Hamadi, H.M.N.1    Yeun, C.Y.2    Zemerly, M.J.3
  • 25
    • 26244452473 scopus 로고    scopus 로고
    • Security & vulnerability in electric power systems
    • Rolla, MO, USA, Oct.
    • D. Watts, "Security & vulnerability in electric power systems," in Proc. 35th North Amer. Power Symp., Rolla, MO, USA, Oct. 2003, pp. 559-566.
    • (2003) Proc. 35th North Amer. Power Symp. , pp. 559-566
    • Watts, D.1
  • 30
    • 54949110261 scopus 로고    scopus 로고
    • Securing SCADA systems
    • S. Patel and P. Sanyal, "Securing SCADA systems," Inf. Manage. Comput. Secur., vol. 16, no. 4, pp. 398-414, 2008.
    • (2008) Inf. Manage. Comput. Secur. , vol.16 , Issue.4 , pp. 398-414
    • Patel, S.1    Sanyal, P.2
  • 31
    • 84871397265 scopus 로고    scopus 로고
    • Security and vulnerability of SCADA systems over IP-based wireless sensor networks
    • Oct.
    • H. Kim, "Security and vulnerability of SCADA systems over IP-based wireless sensor networks," Int. J. Distrib. Sensor Netw., vol. 2012, Oct. 2012, Art. no. 268478, doi: 10.1155/2012/268478.
    • (2012) Int. J. Distrib. Sensor Netw. , vol.2012
    • Kim, H.1
  • 32
    • 84874470964 scopus 로고    scopus 로고
    • Protection of SCADA communication channels
    • J. Lopez, R. Setola, and S. D. Wolthusen, Eds. Berlin, Germany: Springer
    • A. Khelil, D. Germanus, and N. Suri, "Protection of SCADA communication channels," in Critical Infrastructure Protection, J. Lopez, R. Setola, and S. D. Wolthusen, Eds. Berlin, Germany: Springer, 2012, pp. 177-196.
    • (2012) Critical Infrastructure Protection , pp. 177-196
    • Khelil, A.1    Germanus, D.2    Suri, N.3
  • 36
  • 37
    • 84946126337 scopus 로고    scopus 로고
    • A review of cyber security risk assessment methods for SCADA systems
    • Feb.
    • Y. Cherdantseva et al., "A review of cyber security risk assessment methods for SCADA systems," Comput. Secur., vol. 56, pp. 1-27, Feb. 2015.
    • (2015) Comput. Secur. , vol.56 , pp. 1-27
    • Cherdantseva, Y.1
  • 40
  • 41
    • 84971348067 scopus 로고    scopus 로고
    • Security and Privacy Controls for Federal Information Systems and Organizations
    • 800-53 Revision 4, National Institute of Standards and Technology
    • Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Pub. 800-53 Revision 4, National Institute of Standards and Technology, 2013.
    • (2013) NIST Special Pub.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.