Research Article
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective
489 downloads
@INPROCEEDINGS{10.1007/978-3-642-16644-0_35, author={Abdelmajid Khelil and Sebastian Jeckel and Daniel Germanus and Neeraj Suri}, title={Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective}, proceedings={Mobile Lightweight Wireless Systems. Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers}, proceedings_a={MOBILIGHT}, year={2012}, month={10}, keywords={SCADA Critical Infrastructure Protection P2P Dependability Security}, doi={10.1007/978-3-642-16644-0_35} }
- Abdelmajid Khelil
Sebastian Jeckel
Daniel Germanus
Neeraj Suri
Year: 2012
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective
MOBILIGHT
Springer
DOI: 10.1007/978-3-642-16644-0_35
Abstract
Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/dependability. Peer-to-Peer (P2P) technologies allow for the construction of self-organizing, dependable and large-scale overlays on top of existing physical networks.
Copyright © 2010–2024 ICST