{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:57:14Z","timestamp":1764784634157,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T00:00:00Z","timestamp":1617408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>This paper presents the modeling of the networks supporting today\u2019s telemetry. The incorporation of networking features has significantly enhanced the capability and performance of modern telemetry systems. The development of Integrated Network-Enhanced Telemetry protocols and the use of networked telemetry applications has introduced a host of potential cybersecurity risks inherent in modern networking. This paper will investigate how telemetry applications are uniquely structured with wide-, local-, and micro-area networks that represent modern telemetry solutions. The development of these models and the traffic on these networks will enable analysis into the unique threats and vulnerabilities of telemetry networks. The core of this paper is the notion that telemetry networks are unique, and modeling these networks is key to the current work. The core premise of this paper is also that telemetry networks look and function like Supervisory Command and Data Acquisition (SCADA) networks. By digging deeply into both of these structures, we have shown here that SCADA architectures can be adapted to telemetry networks. This approach opens the door to a wealth of analysis, strategies, and solutions for telemetry networks that are well developed in the SCADA realm.<\/jats:p>","DOI":"10.3390\/computers10040045","type":"journal-article","created":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T22:03:36Z","timestamp":1617487416000},"page":"45","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Networked Telemetry"],"prefix":"10.3390","volume":"10","author":[{"given":"Wondimu","family":"Zegeye","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, Morgan State University, Baltimore, MD 21251, USA"}]},{"given":"Richard","family":"Dean","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Morgan State University, Baltimore, MD 21251, USA"}]},{"given":"Mulugeta","family":"Dugda","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Morgan State University, Baltimore, MD 21251, USA"}]},{"given":"Farzad","family":"Moazzami","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Morgan State University, Baltimore, MD 21251, USA"}]},{"given":"Andargachew","family":"Bezabih","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Morgan State University, Baltimore, MD 21251, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Grace, T.B., and Abbott, B.A. (2018). Telemetry Network Standards Overview. Eur. Test Telem. Conf. ettc, 2018.","DOI":"10.5162\/ettc2018\/8.4"},{"key":"ref_2","unstructured":"Reynolds, R.S. (1969, January 15\u201317). IRIG Telemetry Standards 1969. Proceedings of the International Telemetering Conference, Washington, DC, USA."},{"key":"ref_3","unstructured":"(2017). Document 106-17 Telemetry Standards July 2017 Prepared by Telemetry Group, Secretariat Range Commanders Council."},{"key":"ref_4","unstructured":"Young, T. (2021, April 02). I integrated Network Enhanced Telemetry, iNET: Impacts to Telemetry Community, Distribution A: Approved for Public Release. Available online: https:\/\/www.itea.org\/wp-content\/uploads\/2018\/05\/Young-Tom.pdf."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Young, T. (2018, January 26\u201328). Integrated Network Enhanced Telemetry (iNET): Impact to the Telemetry Community for the ettc2018. Proceedings of the European Test and Telemetry Conference, N\u00fcrnberg, Germany.","DOI":"10.5162\/ettc2018\/8.1"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"93083","DOI":"10.1109\/ACCESS.2020.2994961","article-title":"A Review of Research Work on Network-Based SCADA Intrusion Detection Systems","volume":"8","author":"Rakas","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Urias, V., Leeuwen, B.V., and Richardson, B. (November, January 29). Supervisory Command and Data Acquisition (SCADA) system Cyber Security Analysis using a Live, virtual, and constructive (LVC) testbed. Proceedings of the 2012 IEEE Military Communications Conference, Orlando, FL, USA.","DOI":"10.1109\/MILCOM.2012.6415818"},{"key":"ref_8","first-page":"69","article-title":"An Improved Risk Assessment Method for SCADA Information Security","volume":"20","author":"Stojanovic","year":"2014","journal-title":"Elektron. Elektrotech."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1550147718794615","DOI":"10.1177\/1550147718794615","article-title":"A survey of intrusion detection on industrial control system","volume":"14","author":"Hu","year":"2018","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.cose.2017.06.010","article-title":"Assessing and augmenting SCADA cyber security: A survey of techniques","volume":"70","author":"Nazir","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"345","DOI":"10.2298\/FUEE1903345S","article-title":"SCADA systems in the cloud and fog environments: Migration scenarios and security issues","volume":"32","author":"Stojanovic","year":"2019","journal-title":"Facta Univ. Ser. Electron. Energ."},{"key":"ref_12","first-page":"13","article-title":"Countering Insider Threats","volume":"5","author":"Probst","year":"2009","journal-title":"ENISA Q. Rev."},{"key":"ref_13","unstructured":"Madon, P., Young, T., O\u2019Brien, T., and Radke, M. (2018, January 5\u20138). Spectrum Management System\u2014Frequency Assignment De-Confliction and RF Link Quality Prediction. Proceedings of the International Telemetering Conference Proceedings, Glendale, AZ, USA."},{"key":"ref_14","first-page":"11","article-title":"Spectrum sharing mac protocol applications for the proposed 3.5 GHz Band","volume":"54","author":"Oyediran","year":"2018","journal-title":"Int. Telem. Conf. Proc. Int. Found. Telem."},{"key":"ref_15","unstructured":"U.S. Army Program Executive Office for Simulation Training & Instrumentation Cyberspace Test Technology Science & Technology (CTT S&T) Test Technology Area (TTA), Broad Agency W900KK-12-R-0010 ISSUE DATE: 31 January 2012, Expiration Date: 30 September 2016."},{"key":"ref_16","unstructured":"Norman, R. (2020, August 01). Improving Distributed Test & Evaluation with JMETC & TENA. Joint Mission Environment Test Capability (JMETC) Program Overview; JMETC Program in; Test Resource Management Center (TRMC). Available online: https:\/\/ndiastorage.blob.core.usgovcloudapi.net\/ndia\/2017\/systems\/Thursday\/Track2\/19925_Norman.pdf."},{"key":"ref_17","unstructured":"Arnwine, M. (2020, August 01). Cheaper, Faster, and with Less Risk Using Distributed Testing to Accelerate T&E Capabilities Joint Mission Environment Test Capability (JMETC), Joint Mission Environment Test Capability. Available online: https:\/\/www.itea.org\/images\/pdf\/Events\/2012_Proceedings\/2012_Annual_Symposium\/track_4_arnwine_cheaperfasterandwithlessriskusingdistributedtestingtoacceleratetecapabilities.pdf."},{"key":"ref_18","unstructured":"Macdonald, T. (2020, August 01). The DoD T&E\/S&T Program, Test Resource Management Center: Net-Centric Systems Test (NST) Overview, Industry\/Academia Days. Available online: https:\/\/web.wpi.edu\/Images\/CMS\/ECE\/Test_and_Evaluation-Tom_Macdonald(1).pdf."},{"key":"ref_19","unstructured":"Rumford, G. (2011, January 21\u201323). TheDoD T&E\/S&T Program, NDIA. Proceedings of the 12th Annual Science & Engineering Technology Conference, North Charleston, SC, USA."},{"key":"ref_20","unstructured":"US-CERT (2020, November 11). Cybersecurity and Infrastructure Security Agency, Control Systems Security Program, Available online: https:\/\/us-cert.cisa.gov\/ics."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"(2020, December 01). Guide to Industrial Control Systems (ICS) Security Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC), NIST Special Publication 800-82 Revision 2. Available online: http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-82r2.","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/SURV.2012.071812.00124","article-title":"Introduction to industrial control networks","volume":"15","author":"Galloway","year":"2013","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"ref_23","unstructured":"Cardenas, A.A., Amin, S., and Sastry, S. (2008, January 29). Research Challenges for the Security of Control Systems. Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec \u201908), Associates with the 17th USENIX Security Symposium, San Jose, CA, USA."},{"key":"ref_24","unstructured":"Stouffer, K., Falco, J., and Kent, K. (2006). Guide to Supervisory Control and Data Acquisition (Scada) and Industrial Control Systems Security, NIST. Sp800-82."},{"key":"ref_25","unstructured":"(2020). Cybersecurity for Critical Infrastructure (ICS, SCADA &IIoT), Palo Alto Networks."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/4\/45\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:33:46Z","timestamp":1760362426000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/4\/45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,3]]},"references-count":25,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["computers10040045"],"URL":"https:\/\/doi.org\/10.3390\/computers10040045","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2021,4,3]]}}}