Skip to main content

A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems

  • Conference paper
Multiagent System Technologies (MATES 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8076))

Included in the following conference series:

Abstract

Nowadays, many critical infrastructures are monitored by SCADA systems processing data obtained by underlying sensor networks. Modern SCADA systems are usually networked, also using wireless connections. Thus, security concerns are crucial when developing SCADA applications, as they are increasingly vulnerable to cyber attacks. In this context, the detection of misbehaving nodes is a key issue, which is in general not easy to address due to the logical and physical high distribution of nodes as well as their complex functions in the network. To deal with the above problem, approaches based on information sharing among collaborative components seem suitable. However, all the past proposals based on information sharing only focus on detecting misbehaving sensor nodes without considering all the other SCADA nodes at any level of complexity. In this paper, we present a trust-based approach to detecting high-level compromised nodes in a SCADA system that is based on a competition among agents associated to nodes. Some preliminary experiments we have performed show promising results of the proposed approach in terms of effectiveness and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ART Testbed (2013), http://megatron.iiia.csic.es/art-testbed

  2. Broadwin WebAccess (2013), http://broadwin.com/features.htm

  3. Buccafurri, F., Comi, A., Lax, G., Rosaci, D.: Enhancing Trust-Based Competitive Multi Agent Systems by Certified Reputation. In: Meersman, R., Panetto, H., Dillon, T., Rinderle-Ma, S., Dadam, P., Zhou, X., Pearson, S., Ferscha, A., Bergamaschi, S., Cruz, I.F. (eds.) OTM 2012, Part II. LNCS, vol. 7566, pp. 855–862. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. Buchegger, S., Boudec, J.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking and Computing, pp. 226–236. ACM Press, Lausanne (2002)

    Chapter  Google Scholar 

  5. Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks Applications 8, 579–592 (2003)

    Article  Google Scholar 

  6. Garruzzo, S., Rosaci, D.: The Roles of Reliability and Reputation in Competitive Multi Agent Systems. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6426, pp. 326–339. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Goel, A., Mishra, R.S.: Remote Data Acquisition Using Wireless - SCADA System. International Journal of Engineering 3(1), 58–65 (2008)

    Google Scholar 

  8. Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An Integrated Trust and Reputation Model for Open Multi-Agent System. Aut. Agent and Multi Agent Sys. 13, 119–154 (2006)

    Article  Google Scholar 

  9. Kirubashankar, R., Krishnamurthy, K., Indra, J., Vignesh, B.: Design and Implementation of Web Based Remote Supervisory Control and Information System. International Journal of Soft Computing and Engineering 1(4), 43–51 (2011)

    Google Scholar 

  10. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM Press, Boston (2000)

    Google Scholar 

  11. Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors 9, 9380–9397 (2009)

    Article  Google Scholar 

  12. Patil, U.S.: Study of Wireless Sensor Network in SCADA System for Power Plant. International Journal of Smart Sensors and Ad Hoc Networks 1(2), 41–44 (2011)

    Google Scholar 

  13. Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: design challenges. Transactions on Embedded Computer Systems: Design Challenges 3, 461–491 (2004)

    Article  Google Scholar 

  14. Rosaci, D.: Trust Measures for Competitive Agents. Knowledge and Information Systems 28(46), 38–46 (2012)

    Google Scholar 

  15. Sabater-Mir, J., Paoulucci, M.: On Open Representation and Aggregation of Social Evaluation in Computational Trust and Reputation Models. International Journal of Approximate Reasoning 46(3), 458–483 (2007)

    Article  Google Scholar 

  16. Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review 24, 33–60 (2005)

    Article  MATH  Google Scholar 

  17. Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE TKDE 16(7), 843–857 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Buccafurri, F., Comi, A., Lax, G., Rosaci, D. (2013). A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems. In: Klusch, M., Thimm, M., Paprzycki, M. (eds) Multiagent System Technologies. MATES 2013. Lecture Notes in Computer Science(), vol 8076. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40776-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40776-5_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40775-8

  • Online ISBN: 978-3-642-40776-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics