HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices

Abstract : The critical infrastructure cannot operate without SCADA systems; this has made the task of securing SCADA systems a national security priority. While progress has been made in securing control networks, security at the field device level is still lacking. Field devices present unique security challenges and these challenges are compounded by the presence of legacy devices. This paper describes a technique that uses Bloom filters to implement challenge-response authentication and role-based access control in field devices. The approach, which is implemented in an in-line security pre-processor, provides for rapid and constant access check times. Experiments involving a prototype device demonstrate that the false positive rate can be kept arbitrarily low and that the real-time performance is acceptable for many SCADA applications.
Document type :
Conference papers
Complete list of metadata

Cited literature [12 references]  Display  Hide  Download

Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, March 6, 2017 - 3:02:09 PM
Last modification on : Monday, March 6, 2017 - 3:05:07 PM
Long-term archiving on: : Wednesday, June 7, 2017 - 2:33:27 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Jeffrey Hieb, Jacob Schreiver, James Graham. Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices. 6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.85-97, ⟨10.1007/978-3-642-35764-0_7⟩. ⟨hal-01483822⟩



Record views


Files downloads