Professional Documents
Culture Documents
A Trust System Architecture For
A Trust System Architecture For
Figure illustrates the fact that the trust system can be arranged in both
master-slaves, which would be typical within utilities, as well as in
peer-to-peer arrangements, which would be likely in communication
systems connecting utilities together.
SPECIFIC CHALLENGES
Per-User Authentication and Access Control
SCADA Security Issues
Recommendations From Literature
Objections and Questions From Utilities
Trust System Solutions
Prevention of Data Interception or
Alteration
SCADA Security Issues
malicious messages.
REFERENCES
M. Grimes, “SCADA exposed,” presented at the ToorCon 7, San Diego, A, 2005.
R. Graham and D. Maynor, “SCADA security and terrorism: We’re not crying wolf,”
trust-based security mechanisms for a regional utility intranet,” IEEE Trans. Power
Syst., vol. 23, no. 3, pp. 831–844, Aug. 2008.
K. P. Birman, J. Chen, K. M. Hopkinson, R. J. Thomas, J. S. Thorp, R. Van Renesse,