International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini | N. Chandra Shekar Reddy | Ch. Mukunda Reddy


Abstract: This paper discuss about the communication security device called a trust system through wireless sensor network based on node behaviors. The major goal of the trust system is to increase the security efficiency compared to firewall and also apply a novel trust evaluation algorithm defined a NBEA (Node Behavior Evaluation Algorithm). This paper concentrates on placing the trust system at the border context which creates anew trust system that increases the flexibility and also demonstrates the trust system using TCP/IP router. The main discuss in the following ways: 1) Summarizes the major threats against SCADA systems.2) Discusses about the new trust system which implements a wider array of network enabled equiqment.3) Impact of the trust system through TP/IP network communication between node and other behaviors.4) As wireless sensors network are being vulnerable and to be attacked and also compromised. In order to avoid network problem a trust evaluation algorithm is defined as NBEA (Node Behavior Evaluation Algorithm) proposed; which integrate behavior strategy.


Keywords: supervisory control and data acquisition SCADA systems, Node Behavior Evaluation Algorithm NBEA


Edition: Volume 3 Issue 5, May 2014,


Pages: 1253 - 1257


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy, "A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 1253-1257, https://www.ijsr.net/get_abstract.php?paper_id=20132060

Similar Articles with Keyword 'supervisory'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni | Harshal A Karande

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, Mexico, Volume 7 Issue 7, July 2018

Pages: 1361 - 1370

Supervision of a Hybrid Renewable Energy System by an Evolutionary Fuzzy System: Modeling and Implementation

Melendez Marisol | Quintero Malaquias | Reyes Alberto

Share this Article
Top