A survey of SCADA test bed
by Zi-Jian Zhang; Zhen Yang; Lie-Huang Zhu; Lin Xiao; Lan Zhao
International Journal of Wireless and Mobile Computing (IJWMC), Vol. 8, No. 1, 2015

Abstract: The proliferation of computer network technology in Supervisory Control and Data Acquisition (SCADA) makes security issues more and more prominent. In order to protect the SCADA system, researchers should analyse potential vulnerabilities and propose relevant solutions to deal with malicious attacks. However, it is difficult to evaluate the abilities of the secure solutions being developed, because most research institutes lack modelling tools. Thus, building a SCADA test bed is indispensable to carry out some necessary experiments for evaluating those solutions before deployment. Relevant experiments can be conducted with such test beds. This paper analyses the construction schemes of the SCADA test beds proposed and shows the components and protocols used to construct such test beds. We also describe a series of attack experiments and mitigation strategies. Finally, we give the future directions in this research field.

Online publication date: Sat, 03-Jan-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Wireless and Mobile Computing (IJWMC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com