Analysis, classification and detection methods of attacks via wireless sensor networks in SCADA systems
نویسندگان
چکیده
Effectiveness of information security of APCS (automated process control systems), as well as of SCADA (supervisory control and data acquisition) systems, depends on data transmission’s protection technologies applied on transport environment’s components. This article investigates the problem of detecting attacks on WSN (wireless sensor networks) of SCADA systems. As the result of analytical studies the authors developed the detailed classification of external attacks on sensor networks and brought the detailed description of attacking impacts on components of SCADA systems in accordance with selected directions of attacks. Reviewed the methods of intrusion detection in wireless sensor networks of SCADA systems and functions of WIDS (wireless intrusion detection systems). Noticed the role of anthropogenic factors in internal security threats. [Botvinkin P. V., Kamaev V.A, Nefedova I.S, Finogeev A.G., Finogeev E.A. Analysis, classification and detection methods of attacks via wireless sensor networks in SCADA systems. Life Sci J 2014;11(11s):384-388] (ISSN:1097-8135). http://www.lifesciencesite.com. 87
منابع مشابه
A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1412.2387 شماره
صفحات -
تاریخ انتشار 2014