Int. J. of Wireless and Mobile Computing   »   2015 Vol.8, No.1

 

 

Title: A survey of SCADA test bed

 

Authors: Zi-Jian Zhang; Zhen Yang; Lie-Huang Zhu; Lin Xiao; Lan Zhao

 

Addresses:
Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China; Shenlan Innovations Corporation, Beijing, China
School of Computer Science and Technology, Hubei University of Technology, China

 

Abstract: The proliferation of computer network technology in Supervisory Control and Data Acquisition (SCADA) makes security issues more and more prominent. In order to protect the SCADA system, researchers should analyse potential vulnerabilities and propose relevant solutions to deal with malicious attacks. However, it is difficult to evaluate the abilities of the secure solutions being developed, because most research institutes lack modelling tools. Thus, building a SCADA test bed is indispensable to carry out some necessary experiments for evaluating those solutions before deployment. Relevant experiments can be conducted with such test beds. This paper analyses the construction schemes of the SCADA test beds proposed and shows the components and protocols used to construct such test beds. We also describe a series of attack experiments and mitigation strategies. Finally, we give the future directions in this research field.

 

Keywords: SCADA test beds; vulnerability; attack mitigation strategy; supervisory control; data acquisition; malicious attacks; SCADA security.

 

DOI: 10.1504/IJWMC.2015.066754

 

Int. J. of Wireless and Mobile Computing, 2015 Vol.8, No.1, pp.9 - 14

 

Submission date: 15 Jul 2014
Date of acceptance: 17 Aug 2014
Available online: 03 Jan 2015

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article