Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices - Critical Infrastructure Protection VI
Conference Papers Year : 2012

Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices

Abstract

The critical infrastructure cannot operate without SCADA systems; this has made the task of securing SCADA systems a national security priority. While progress has been made in securing control networks, security at the field device level is still lacking. Field devices present unique security challenges and these challenges are compounded by the presence of legacy devices. This paper describes a technique that uses Bloom filters to implement challenge-response authentication and role-based access control in field devices. The approach, which is implemented in an in-line security pre-processor, provides for rapid and constant access check times. Experiments involving a prototype device demonstrate that the false positive rate can be kept arbitrarily low and that the real-time performance is acceptable for many SCADA applications.
Fichier principal
Vignette du fichier
978-3-642-35764-0_7_Chapter.pdf (1.05 Mo) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01483822 , version 1 (06-03-2017)

Licence

Identifiers

Cite

Jeffrey Hieb, Jacob Schreiver, James Graham. Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices. 6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.85-97, ⟨10.1007/978-3-642-35764-0_7⟩. ⟨hal-01483822⟩
102 View
272 Download

Altmetric

Share

More