Utilization of different encryption schemes for securing SCADA component communication
Data(s) |
21/01/2014
21/01/2014
2013
|
---|---|
Resumo |
A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated. |
Identificador |
1343-4500 |
Idioma(s) |
eng |
Publicador |
International Information Institute |
Relação |
Information Journal; Vol. 16, Issue 2(B) http://www.information-iii.org/contents.html |
Direitos |
closedAccess |
Palavras-Chave | #SCADA security #SCADA component communication #Encryption schemes |
Tipo |
article |