Cybersecurity Architecture for Telemetry Networks: Development of a Comprehensive Cybersecurity Framework for Industrial Control Systems (ICS) and SCADA Networks
Author
Odejobi, MosesAdvisor
Cole-Rhodes, ArleneDean, Richard
Moazzami, Farzad
Scott, Craig
Affiliation
Morgan State University, Electrical and Computer Engineering DepartmentIssue Date
2025-10Keywords
Telemetry SecurityIndustrial Control Systems
Cybersecurity Simulation
Purdue Model
SCADA Security
Network Segmentation
Critical Infrastructure Protection
Metadata
Show full item recordCitation
Odejobi, Moses. (2025.) Cybersecurity Architecture for Telemetry Networks: Development of a Comprehensive Cybersecurity Framework for Industrial Control Systems (ICS) and SCADA Networks. International Telemetering Conference Proceedings, 60.Additional Links
https://telemetry.org/Abstract
Telemetry systems in critical infrastructure face unprecedented cybersecurity challenges as industrial networks become increasingly interconnected. This paper presents an advanced telemetry security assessment framework implementing a comprehensive Industrial Control System (ICS) cybersecurity simulation platform based on the Purdue Model architecture. The platform provides realistic threat analysis capabilities and defense strategy validation for telemetry-enabled industrial environments. Our implementation features real-time network communication across six Purdue levels, cross-level attack propagation simulation, and interactive threat storytelling capabilities. A unique feature of the system is its ability to detect attacks that originate as internal lateral movements as well as those that are from internetfacing services, thereby demonstrating real-time attack scenarios. Validation of the experiment in this work is executed using two-dozens of simulated devices across all Purdue levels, with the results revealing 94% efficiency for security controls. Web platforms adopted include PostgreSQL database integration, OpenPLC runtime integration among others. Study results indicate the usefulness of cybersecurity training and implementationType
Proceedingstext
Language
enISSN
0884-51231546-2188
