Survivable SCADA Via Intrusion-Tolerant Replication
Title | Survivable SCADA Via Intrusion-Tolerant Replication |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Kirsch, J., Goose, S., Amir, Y., Dong Wei, Skare, P. |
Journal | Smart Grid, IEEE Transactions on |
Volume | 5 |
Pagination | 60-70 |
Date Published | Jan |
ISSN | 1949-3053 |
Keywords | Clocks, cyber attack, Cyber Attacks, Fault tolerance, intrusion-tolerant protocols, intrusion-tolerant replication, Libraries, Monitoring, performance degradation, production engineering computing, Protocols, reliability, resilience, SCADA architecture, SCADA systems, security of data, Servers, survivability, survivable SCADA system, Synchronization |
Abstract | Providers of critical infrastructure services strive to maintain the high availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system-one that is able to ensure correct behavior with minimal performance degradation even during cyber attacks that compromise part of the system. We describe the challenges we faced when integrating modern intrusion-tolerant protocols with a conventional SCADA architecture and present the techniques we developed to overcome these challenges. The results illustrate that our survivable SCADA system not only functions correctly in the face of a cyber attack, but that it also processes in excess of 20 000 messages per second with a latency of less than 30 ms, making it suitable for even large-scale deployments managing thousands of remote terminal units. |
URL | https://ieeexplore.ieee.org/document/6576306/ |
DOI | 10.1109/TSG.2013.2269541 |
Citation Key | 6576306 |
- Protocols
- Synchronization
- survivable SCADA system
- Survivability
- Servers
- security of data
- SCADA systems
- SCADA architecture
- resilience
- Reliability
- Clocks
- production engineering computing
- performance degradation
- Monitoring
- Libraries
- intrusion-tolerant replication
- intrusion-tolerant protocols
- fault tolerance
- Cyber Attacks
- cyber attack