A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

@inproceedings{Shahzad2016ASI,
  title={A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks},
  author={Aamir Shahzad and Malrey Lee and Naixue N. Xiong and Gisung Jeong and Young Keun Lee and Jae-Young Choi and Abdul Waheed Mahesar and Iftikhar Ahmad},
  booktitle={Sensors},
  year={2016}
}
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
2 Citations
51 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 51 references

Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement

  • A. Shahzad, S. Musa, M. Irfan, S. Asadullah
  • J. Appl. Sci
  • 2014
Highly Influential
4 Excerpts

Wireless Sensor Networks for Industrial Process Monitoring and Control with Security Architecture: A survey for Research Issues

  • P. Vyas
  • IJESRT 2013,
  • 2013
Highly Influential
4 Excerpts

Cipher for Internet-based Supervisory Control and Data Acquisition Architecture

  • D. Martin, B. Maricel
  • J. Secur. Eng. 2011,
  • 2011
Highly Influential
4 Excerpts

Public Key Cryptography Based Approach for Securing SCADA Communications, Computer Networks and Information Technologies

  • S. Anupam, P. Om, S. Zia
  • Commun. Comput. Inf. Sci
  • 2011
Highly Influential
4 Excerpts

Industrial Process Control System Security

  • I. Susanto, R. Jackson, D. L. Paul
  • Wiley Handbook of Science and Technology for…
  • 2009
Highly Influential
8 Excerpts

Similar Papers

Loading similar papers…