Evaluation of secure peer-to-peer overlay routing for survivable scada systems

Jeffrey J. Farris, David M. Nicol

Research output: Contribution to journalConference article

Abstract

Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical power distribution, telecommunications, and energy refining. SCADA systems are obvious targets for cyber-attacks that would seek to disrupt the physical complexities governed by a SCADA system. This paper uses a discrete-event simulation to begin to investigate the characteristics of one potential means of hardening SCADA systems against a cyber-attack. When it appears that real-time message delivery constraints are not being met (due, for example, to a denial of service attack), a peer-to-peer overlay network is used to route message floods in an effort to ensure delivery. The SCADA system, and peer-to-peer nodes all use strong hardware-based authentication techniques to prevent injection of false data or commands, and to harden the routing overlay. Our simulations help to quantify the anticipated tradeoffs of message survivability and latency minimization.

Original languageEnglish (US)
Pages (from-to)300-307
Number of pages8
JournalProceedings - Winter Simulation Conference
Volume1
StatePublished - Dec 1 2004
EventProceedings of the 2004 Winter Simulation Conference - Washington, DC, United States
Duration: Dec 5 2004Dec 8 2004

Fingerprint

SCADA systems
Supervisory Control
Peer to Peer
Data Acquisition
Overlay
Routing
Evaluation
Attack
Real-time
Survivability
Overlay networks
Denial of Service
Peer to peer networks
Power Distribution
Overlay Networks
Peer-to-peer Networks
Discrete event simulation
Real time control
Discrete Event Simulation
Hardening

ASJC Scopus subject areas

  • Software
  • Modeling and Simulation
  • Computer Science Applications

Cite this

Evaluation of secure peer-to-peer overlay routing for survivable scada systems. / Farris, Jeffrey J.; Nicol, David M.

In: Proceedings - Winter Simulation Conference, Vol. 1, 01.12.2004, p. 300-307.

Research output: Contribution to journalConference article

@article{8e31d142575c4a2a8983b97588fd2610,
title = "Evaluation of secure peer-to-peer overlay routing for survivable scada systems",
abstract = "Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical power distribution, telecommunications, and energy refining. SCADA systems are obvious targets for cyber-attacks that would seek to disrupt the physical complexities governed by a SCADA system. This paper uses a discrete-event simulation to begin to investigate the characteristics of one potential means of hardening SCADA systems against a cyber-attack. When it appears that real-time message delivery constraints are not being met (due, for example, to a denial of service attack), a peer-to-peer overlay network is used to route message floods in an effort to ensure delivery. The SCADA system, and peer-to-peer nodes all use strong hardware-based authentication techniques to prevent injection of false data or commands, and to harden the routing overlay. Our simulations help to quantify the anticipated tradeoffs of message survivability and latency minimization.",
author = "Farris, {Jeffrey J.} and Nicol, {David M.}",
year = "2004",
month = "12",
day = "1",
language = "English (US)",
volume = "1",
pages = "300--307",
journal = "Proceedings - Winter Simulation Conference",
issn = "0891-7736",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - Evaluation of secure peer-to-peer overlay routing for survivable scada systems

AU - Farris, Jeffrey J.

AU - Nicol, David M.

PY - 2004/12/1

Y1 - 2004/12/1

N2 - Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical power distribution, telecommunications, and energy refining. SCADA systems are obvious targets for cyber-attacks that would seek to disrupt the physical complexities governed by a SCADA system. This paper uses a discrete-event simulation to begin to investigate the characteristics of one potential means of hardening SCADA systems against a cyber-attack. When it appears that real-time message delivery constraints are not being met (due, for example, to a denial of service attack), a peer-to-peer overlay network is used to route message floods in an effort to ensure delivery. The SCADA system, and peer-to-peer nodes all use strong hardware-based authentication techniques to prevent injection of false data or commands, and to harden the routing overlay. Our simulations help to quantify the anticipated tradeoffs of message survivability and latency minimization.

AB - Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical power distribution, telecommunications, and energy refining. SCADA systems are obvious targets for cyber-attacks that would seek to disrupt the physical complexities governed by a SCADA system. This paper uses a discrete-event simulation to begin to investigate the characteristics of one potential means of hardening SCADA systems against a cyber-attack. When it appears that real-time message delivery constraints are not being met (due, for example, to a denial of service attack), a peer-to-peer overlay network is used to route message floods in an effort to ensure delivery. The SCADA system, and peer-to-peer nodes all use strong hardware-based authentication techniques to prevent injection of false data or commands, and to harden the routing overlay. Our simulations help to quantify the anticipated tradeoffs of message survivability and latency minimization.

UR - http://www.scopus.com/inward/record.url?scp=17744398258&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=17744398258&partnerID=8YFLogxK

M3 - Conference article

AN - SCOPUS:17744398258

VL - 1

SP - 300

EP - 307

JO - Proceedings - Winter Simulation Conference

JF - Proceedings - Winter Simulation Conference

SN - 0891-7736

ER -