Utilization of different encryption schemes for securing SCADA component communication


Autoria(s): Choi, Minkyu; Robles, Rosslin John; Vale, Zita; Ramos, Carlos; Ko, Hoon; Marreiros, Goreti
Data(s)

21/01/2014

21/01/2014

2013

Resumo

A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.

Identificador

1343-4500

http://hdl.handle.net/10400.22/3391

Idioma(s)

eng

Publicador

International Information Institute

Relação

Information Journal; Vol. 16, Issue 2(B)

http://www.information-iii.org/contents.html

Direitos

closedAccess

Palavras-Chave #SCADA security #SCADA component communication #Encryption schemes
Tipo

article