Computing Reviews

Security and protection of SCADA:a bigdata algorithmic approach
Shyamasundar R.  SIN 2013 (Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, Nov 26-28, 2013)20-27,2013.Type:Proceedings
Date Reviewed: 04/16/14

Embedded systems work between hardware and software to perform a specific function. These systems are usually part of a larger system, and wireless communication among the components of the larger system is common. Therefore, it is important to guarantee secure communication by ensuring the confidentiality of information. Security has not traditionally been considered a requirement in embedded systems design, and the application of specific security techniques to these devices is still incipient.

This very interesting paper treats the problem of security in a different way: it doesn’t just promote security in the overall embedded system, but focuses on the parts of the embedded system. The paper is well written and easy to read. Shyamasundar provides a good amount of information about security and vulnerabilities, which could be interesting for students and professionals that work with security and with embedded systems. The author also provides a good review of malware threats and different ways to treat them, and discusses when such solutions do and do not work.

Unfortunately, the author did not provide any experimental results. The deductions presented are very similar to previous work on conventional attack methods. The reader will not find concrete evidence on the use of big data algorithms in this paper. The paper does contain a good related works section that is suitable for beginners in the security area.

Reviewer:  Kalinka Castelo Branco Review #: CR142181 (1407-0543)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy