SECURITY SOLUTIONS FOR SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORKS IN INDUSTRIAL CONTROL SYSTEMS
dc.contributor.author | Upadhyay, Darshana | |
dc.contributor.copyright-release | No | en_US |
dc.contributor.degree | Doctor of Philosophy | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | Dr. Amiya Nayak | en_US |
dc.contributor.graduate-coordinator | Dr. Michael McAllister | en_US |
dc.contributor.manuscripts | No | en_US |
dc.contributor.thesis-reader | Dr. Nur Zincir-Heywood | en_US |
dc.contributor.thesis-reader | Dr. Jaume Manero | en_US |
dc.contributor.thesis-reader | Dr. Vlado Keselj | en_US |
dc.contributor.thesis-supervisor | Dr. Srinivas Sampalli | en_US |
dc.date.accessioned | 2023-04-14T13:07:28Z | |
dc.date.available | 2023-04-14T13:07:28Z | |
dc.date.defence | 2023-04-04 | |
dc.date.issued | 2023-04-13 | |
dc.description.abstract | Supervisory Control and Data Acquisition (SCADA) networks play a vital role in Industrial Control Systems (ICSs). Industrial organizations perform operations remotely through SCADA systems to accelerate their processes. However, these network capabilities come at the cost of exposing the systems to cyber-attacks. Consequently, effective solutions are required to detect intrusions and secure SCADA systems as cyber-attacks on industrial infrastructure can have catastrophic consequences. Furthermore, SCADA field devices are equipped with micro-controllers for processing information and have limited computational power and resources. As a result, lightweight cryptography solutions are needed to strengthen the security of industrial plants against cyber threats. The Ph.D. work focuses on three major elements to secure the SCADA-based ICSs, namely, vulnerability assessment of field-site components, Intrusion Detection Systems (IDSs) for plant floor and control center, and robust cryptographic-based secure solution for SCADA communications. The overall goal of this thesis is to cover the landscape of SCADA weaknesses by providing efficient, lightweight, and robust solutions to strengthen the security of industrial applications. The contributions of this thesis fulfill the objective of providing a full life-cycle strategy to innovate, design, and implement a security framework to protect SCADA networks against cyber-attacks in industrial control systems | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/82409 | |
dc.language.iso | en | en_US |
dc.subject | SCADA | en_US |
dc.subject | ICSs | en_US |
dc.subject | Cyber attacks | en_US |
dc.subject | Intrusion Detection Systems | en_US |
dc.subject | Vulnerability assessment | en_US |
dc.subject | Cryptography | en_US |
dc.title | SECURITY SOLUTIONS FOR SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORKS IN INDUSTRIAL CONTROL SYSTEMS | en_US |