Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
175 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Blockchain application in simulated environment for Cyber-Physical Systems Security (2110.12974v1)

Published 25 Oct 2021 in cs.CR, cs.SY, and eess.SY

Abstract: Critical Infrastructures (CIs) such as power grid, water and gas distribution are controlled by Industrial Control Systems (ICS). Sensors and actuators of a physical plant are managed by the ICS. Data and commands transmitted over the network from the Programmable Logic Controllers (PLCs) are saved and parsed within the Historian. Generally, this architecture guarantees to check for any process anomalies that may occur due to component failures and cyber attacks. The other use of this data allows activities such as forensic analysis. To secure the network is also crucial to protect the communication between devices. A cyber attack on the log devices could jeopardize any forensic analysis be it for maintenance, or discovering an attack trail. In this paper is proposed a strategy to secure plant operational data recorded in the Historian and data exchange in the network. An integrity checking mechanism, in combination with blockchain, is used to ensure data integrity. Data redundancy is achieved by applying an efficient replication mechanism and enables data recovery after an attack.

Citations (1)

Summary

We haven't generated a summary for this paper yet.