kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9546-9463
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0001-7733-4939
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-1723-5741
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0003-3089-3885
Show others and affiliations
2022 (English)In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM) , 2022, p. -7, article id 74Conference paper, Published paper (Refereed)
Abstract [en]

This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of automation and control (SCADA) systems by the systems engineers. As such, security and maintaining nominal operability of such devices has prime importance, especially for the industrial automation networks such as the smart grid. A way of measuring the security of systems and networks is executing a series of cybersecurity weakness assessment tests called penetration testing. Another way of such an assessment is called vulnerability analysis by threat modelling which involves careful investigation and modelling of each and every component of a network/system under investigation. This article, aims at marrying these two methodologies for the vulnerability assessment of the RTUs in a methodological and scientific way.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2022. p. -7, article id 74
Keywords [en]
SCADA, smart grid, power grid, RTU, threat modelling, attack graph, penetration testing
National Category
Computer Systems
Research subject
Computer Science; Electrical Engineering
Identifiers
URN: urn:nbn:se:kth:diva-316684DOI: 10.1145/3538969.3544483Scopus ID: 2-s2.0-85136953128OAI: oai:DiVA.org:kth-316684DiVA, id: diva2:1690987
Conference
the 17th International Conference on Availability, Reliability and Security, August 23 to August 26, 2022. Austria
Note

QC 20220830

Available from: 2022-08-29 Created: 2022-08-29 Last updated: 2023-06-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Rencelj Ling, EnglaUrrea Cabus, Jose EduardoButun, IsmailLagerström, RobertOlegård, Johannes

Search in DiVA

By author/editor
Rencelj Ling, EnglaUrrea Cabus, Jose EduardoButun, IsmailLagerström, RobertOlegård, Johannes
By organisation
Network and Systems Engineering
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 150 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf