Abstract
Nowadays, many critical infrastructures are monitored by SCADA systems processing data obtained by underlying sensor networks. Modern SCADA systems are usually networked, also using wireless connections. Thus, security concerns are crucial when developing SCADA applications, as they are increasingly vulnerable to cyber attacks. In this context, the detection of misbehaving nodes is a key issue, which is in general not easy to address due to the logical and physical high distribution of nodes as well as their complex functions in the network. To deal with the above problem, approaches based on information sharing among collaborative components seem suitable. However, all the past proposals based on information sharing only focus on detecting misbehaving sensor nodes without considering all the other SCADA nodes at any level of complexity. In this paper, we present a trust-based approach to detecting high-level compromised nodes in a SCADA system that is based on a competition among agents associated to nodes. Some preliminary experiments we have performed show promising results of the proposed approach in terms of effectiveness and efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ART Testbed (2013), http://megatron.iiia.csic.es/art-testbed
Broadwin WebAccess (2013), http://broadwin.com/features.htm
Buccafurri, F., Comi, A., Lax, G., Rosaci, D.: Enhancing Trust-Based Competitive Multi Agent Systems by Certified Reputation. In: Meersman, R., Panetto, H., Dillon, T., Rinderle-Ma, S., Dadam, P., Zhou, X., Pearson, S., Ferscha, A., Bergamaschi, S., Cruz, I.F. (eds.) OTM 2012, Part II. LNCS, vol. 7566, pp. 855–862. Springer, Heidelberg (2012)
Buchegger, S., Boudec, J.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking and Computing, pp. 226–236. ACM Press, Lausanne (2002)
Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks Applications 8, 579–592 (2003)
Garruzzo, S., Rosaci, D.: The Roles of Reliability and Reputation in Competitive Multi Agent Systems. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6426, pp. 326–339. Springer, Heidelberg (2010)
Goel, A., Mishra, R.S.: Remote Data Acquisition Using Wireless - SCADA System. International Journal of Engineering 3(1), 58–65 (2008)
Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An Integrated Trust and Reputation Model for Open Multi-Agent System. Aut. Agent and Multi Agent Sys. 13, 119–154 (2006)
Kirubashankar, R., Krishnamurthy, K., Indra, J., Vignesh, B.: Design and Implementation of Web Based Remote Supervisory Control and Information System. International Journal of Soft Computing and Engineering 1(4), 43–51 (2011)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM Press, Boston (2000)
Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors 9, 9380–9397 (2009)
Patil, U.S.: Study of Wireless Sensor Network in SCADA System for Power Plant. International Journal of Smart Sensors and Ad Hoc Networks 1(2), 41–44 (2011)
Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: design challenges. Transactions on Embedded Computer Systems: Design Challenges 3, 461–491 (2004)
Rosaci, D.: Trust Measures for Competitive Agents. Knowledge and Information Systems 28(46), 38–46 (2012)
Sabater-Mir, J., Paoulucci, M.: On Open Representation and Aggregation of Social Evaluation in Computational Trust and Reputation Models. International Journal of Approximate Reasoning 46(3), 458–483 (2007)
Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review 24, 33–60 (2005)
Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE TKDE 16(7), 843–857 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Buccafurri, F., Comi, A., Lax, G., Rosaci, D. (2013). A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems. In: Klusch, M., Thimm, M., Paprzycki, M. (eds) Multiagent System Technologies. MATES 2013. Lecture Notes in Computer Science(), vol 8076. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40776-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-40776-5_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40775-8
Online ISBN: 978-3-642-40776-5
eBook Packages: Computer ScienceComputer Science (R0)