Show simple item record

AuthorChaudhry, Junaid
AuthorQidwai, Uvais
AuthorMiraz, Mahdi H.
Available date2020-08-18T08:34:46Z
Publication Date2019
Publication NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
ResourceScopus
ISSN18678211
URIhttp://dx.doi.org/10.1007/978-3-030-23943-5_6
URIhttp://hdl.handle.net/10576/15679
AbstractWhile data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incorporate statistical fingerprinting. This is so, because datagrams in SCADA traffic follow a poison distribution. Although wrapping the SCADA traffic in a protective IPsec stream is an obvious choice, thin clients and unreliable communication channels make is less than ideal to use cryptographic solutions for security SCADA traffic. In this paper, we propose a smart alternative of data obfuscation in the form of Impulsive Statistical Fingerprinting (ISF). We provide important insights into our research in healthcare SCADA data security and the use of ISF. We substantiate the conversion of sensor data through the ISF into HL7 format and define policies of a seamless switch to a non HL7-based non-secure HIS to a secure HIS. - 2019, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
Languageen
PublisherSpringer Verlag
SubjectContext-aware security
Cyber security
Data obfuscation
Encryption
Health Level Seven
Healthcare SCADA systems
IEEE 11073
Impulsive Statistical Fingerprinting
SCADA/ICS networks
TitleSecuring Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting
TypeConference Paper
Pagination77-89
Volume Number285


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record