A survey of SCADA test bed

Zi Jian Zhang, Zhen Yang, Lie Huang Zhu, Lin Xiao*, Lan Zhao

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

3 Citations (Scopus)

Abstract

The proliferation of computer network technology in Supervisory Control and Data Acquisition (SCADA) makes security issues more and more prominent. In order to protect the SCADA system, researchers should analyse potential vulnerabilities and propose relevant solutions to deal with malicious attacks. However, it is difficult to evaluate the abilities of the secure solutions being developed, because most research institutes lack modelling tools. Thus, building a SCADA test bed is indispensable to carry out some necessary experiments for evaluating those solutions before deployment. Relevant experiments can be conducted with such test beds. This paper analyses the construction schemes of the SCADA test beds proposed and shows the components and protocols used to construct such test beds. We also describe a series of attack experiments and mitigation strategies. Finally, we give the future directions in this research field.

Original languageEnglish
Pages (from-to)9-14
Number of pages6
JournalInternational Journal of Wireless and Mobile Computing
Volume8
Issue number1
DOIs
Publication statusPublished - 1 Jan 2015

Keywords

  • Mitigation strategy
  • SCADA
  • Test bed
  • Vulnerability
  • Wireless mobile computing

Fingerprint

Dive into the research topics of 'A survey of SCADA test bed'. Together they form a unique fingerprint.

Cite this