Architecture and security of SCADA systems: A review

被引:79
|
作者
Yadav, Geeta [1 ]
Paul, Kolin [1 ,2 ]
机构
[1] IIT, Khosla Sch Informat Technol, Delhi, India
[2] IIT, Dept Comp Sci, Delhi, India
关键词
SCADA systems security; Critical infrastructure; Cyber-physical systems; IIoT; SCADA attacks; IDS; Testbed; INTRUSION DETECTION; MODIFICATION ATTACKS; CYBER SECURITY; METHODOLOGY; MIGRATION; LESSONS; DRIVEN; MODEL;
D O I
10.1016/j.ijcip.2021.100433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System (ICS). SCADA systems have become an essential part of automated control and monitoring of Critical Infrastructures (CI). Modern SCADA sys-tems have evolved from standalone systems into sophisticated, complex, open systems connected to the Internet. This geographically distributed modern SCADA system is more vulnerable to threats and cyber attacks than traditional SCADA. Traditional SCADA systems were less exposed to Internet threats as they operated on isolated networks. Over the years, an increase in the number of cyber-attacks against the SCADA systems seeks security researchers' attention towards their security. In this review paper, we first review the SCADA system architectures and comparative analysis of proposed/implemented communica-tion protocols, followed by attacks on such systems to understand and highlight the evolving security needs for SCADA systems. A short investigation of the current state of intrusion detection techniques in SCADA systems is done, followed by a brief study of testbeds for SCADA systems. The cloud and Internet of things (IoT) based SCADA systems are studied by analyzing modern SCADA systems' architecture. In the end, the review paper highlights the critical research problems that need to be resolved to close the security gaps in SCADA systems. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] SCADA systems deserve and are earning central security role
    Finnan, K
    PIPELINE & GAS JOURNAL, 2002, 229 (04) : 77 - 80
  • [32] Long Term Key Management Architecture for SCADA Systems
    Saputra, Hendra
    Zhao, Zhigang
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 314 - 319
  • [33] Wireless Sensor Network Architecture for SCADA System: Review
    Gelogo, Yvette E.
    Kim, Tai-hoon
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (10): : 3343 - 3350
  • [34] Hybrid Key Management Architecture for Robust SCADA Systems
    Choi, Donghyun
    Jeong, Hanjae
    Won, Dongho
    Kim, Seungjoo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (02) : 281 - 298
  • [35] Hybrid key management architecture for robust SCADA systems
    Kim, S., 1600, Institute of Information Science (29):
  • [36] A Review of SCADA Anomaly Detection Systems
    Garitano, Inaki
    Uribeetxeberria, Roberto
    Zurutuza, Urko
    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 6TH INTERNATIONAL CONFERENCE SOCO 2011, 2011, 87 : 357 - 366
  • [37] A security architecture for reputation systems
    Ismail, R
    Boyd, C
    Josang, A
    Russell, S
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 176 - 185
  • [38] SECURITY ARCHITECTURE FOR DISTRIBUTED SYSTEMS
    MUFTIC, S
    SLOMAN, M
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 492 - 500
  • [39] RESEARCH ON FNN-BASED SECURITY DEFENCE ARCHITECTURE MODEL OF SCADA NETWORK
    Yang, Li
    Cao, Xiedong
    Li, Jie
    Wang, Aomin
    Tan, Weibin
    Yu, Zhijun
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1367 - 1371
  • [40] Security gaps assessment of smart grid based SCADA systems
    Mir, Abdul Wahid
    Ramachandran, Ramkumar Ketti
    INFORMATION AND COMPUTER SECURITY, 2019, 27 (03) : 434 - 452