SCADA Systems Vulnerabilities and Blockchain Technology
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 4
Abstract
SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With the onset of technology and advent of network based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols brought threat to the security of these systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31586.pdf
Authors and Affiliations
Diksha Chhonkar | Garima Pandey
Evaluation of Site Suitability for Groundwater Prospecting in Langtang North, Plateau State, Nigeria
An integrated approach of Remote Sensing and GIS techniques was adopted to carry out groundwater potential evaluation for suitable siting of boreholes potential in Lang tang North LGA of Plateau state, Nigeria. SPOT5 ima...
Effect of International Financial Reporting Standard on Corporate Performance of Selected Banks Listed on Nigeria Stock Exchange
In the light of globalisation where foreign investment has become trendy, comparability of financial reports of Nigerian firms and those of other firms across the world has become a concern. Nigerian firms have been mand...
Aadhar Based Electronic Voting System
Aadhar based voting for increased productivity and efficiency is one of the primary requirements today for any organization. 0ur main aim of the proposed system is to develop a compatible voting machine with high securit...
Chaos Based Image Encryption Technique
Due to internet explosion there has been considerable rise in transmission of data such as tex, images, text, videos, etc over internet. Here security is required for transmission of data over internet so that data is se...
Digitisation in Banking
A digital shift is taking place globally over wide range of sectors to stay ahead in the competition in their respective fields to which banking industry is no exception. Digitalization is inevitable for banking industry...