Data Labeling for Integrity in SCADA Systems

被引:0
|
作者
Zuo, Yanjun [1 ]
机构
[1] Univ N Dakota, Grand Forks, ND 58201 USA
关键词
control system; data integrity; labeling; algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems attain important data for critical infrastructure monitoring and control. The data is also used by various high level applications in automation engineering, decision support, operation planning and scheduling, and measurement and accounting. Due to the increasing security threats and system failures, SCADA data may be compromised, corrupted, or produced by malfunctioned devices/applications. Ensuring a high level of data integrity is critical for the operations of SCADA systems and the supported business functions. In this paper, a data labeling approach is proposed to ensure data integrity in SCADA systems. Essentially, a label records the component information of a data item as well as how the data is generated. This information is used to assess how damage to a component data could result in damage to compound data items and, more importantly, how to detect such damage and correct any affected data. For any compromised data that has been recovered, its label must be updated, called relabeling. We define relabeling strategies and communication models to propagate component updates to all the affected data items to ensure that they can be corrected, thus to maintain data integrity. To our best knowledge, our work is the first of its kind to specifically address data integrity issues in SCADA systems.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [1] Privacy and Integrity Protection of Data in SCADA Systems
    de Lima, Davi Ferreira
    Bezerra, Jose Roberto
    de Macedo Costa da Silva, Jorge Fredericson
    PROCEEDINGS OF THE 10TH LATIN AMERICAN NETWORKING CONFERENCE (LANC 2018), 2018, : 110 - 114
  • [2] Data Integrity in a Regulatory World: SCADA Systems
    Watson, Jon
    Water and Wastes Digest, 2020, 59 (05):
  • [3] Detecting Data Integrity Attacks on SCADA Systems Using Limited PMUs
    Pal, Seemita
    Sikdar, Biplab
    Chow, Joe
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2016,
  • [4] Detecting Integrity Attacks on SCADA Systems
    Mo, Yilin
    Chabukswar, Rohan
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2014, 22 (04) : 1396 - 1407
  • [5] Data Integrity Attacks and their Impacts on SCADA Control System
    Sridhar, Siddharth
    Manimaran, G.
    IEEE PES GENERAL MEETING, 2010,
  • [6] Operation of Water Systems with SCADA Data
    Parrod, Perrine
    Meyer, Heribert
    WASSERWIRTSCHAFT, 2016, 106 (10) : 54 - 55
  • [7] IDOLO:: Multimedia data deployment on SCADA systems
    Escudero, JI
    Rodríguez, JA
    Romero, MC
    Luque, J
    2004 IEEE PES POWER SYSTEMS CONFERENCE & EXPOSITION, VOLS 1 - 3, 2004, : 252 - 257
  • [8] Data Integrity and Future Systems
    Uihlein, Marci S.
    Technology Architecture and Design, 2019, 3 (02):
  • [9] Data integrity in RFID systems
    Su, Weilian
    Alchazidis, Nikolaos
    Ha, Tri T.
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 1465 - 1471
  • [10] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    COMPUTERS & SECURITY, 2014, 46 : 94 - 110