Utilization of different encryption schemes for securing SCADA component communication
Autor(a) principal: | |
---|---|
Data de Publicação: | 2013 |
Outros Autores: | , , , , |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10400.22/3391 |
Resumo: | A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated. |
id |
RCAP_557f035db2beed5a4e268c6465637ac3 |
---|---|
oai_identifier_str |
oai:recipp.ipp.pt:10400.22/3391 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Utilization of different encryption schemes for securing SCADA component communicationSCADA securitySCADA component communicationEncryption schemesA vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.International Information InstituteRepositório Científico do Instituto Politécnico do PortoChoi, MinkyuRobles, Rosslin JohnVale, ZitaRamos, CarlosKo, HoonMarreiros, Goreti2014-01-21T11:25:27Z20132013-01-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10400.22/3391eng1343-450010.1016/j.apenergy.2012.07.009metadata only accessinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-03-13T12:43:11Zoai:recipp.ipp.pt:10400.22/3391Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T17:24:23.625021Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Utilization of different encryption schemes for securing SCADA component communication |
title |
Utilization of different encryption schemes for securing SCADA component communication |
spellingShingle |
Utilization of different encryption schemes for securing SCADA component communication Choi, Minkyu SCADA security SCADA component communication Encryption schemes |
title_short |
Utilization of different encryption schemes for securing SCADA component communication |
title_full |
Utilization of different encryption schemes for securing SCADA component communication |
title_fullStr |
Utilization of different encryption schemes for securing SCADA component communication |
title_full_unstemmed |
Utilization of different encryption schemes for securing SCADA component communication |
title_sort |
Utilization of different encryption schemes for securing SCADA component communication |
author |
Choi, Minkyu |
author_facet |
Choi, Minkyu Robles, Rosslin John Vale, Zita Ramos, Carlos Ko, Hoon Marreiros, Goreti |
author_role |
author |
author2 |
Robles, Rosslin John Vale, Zita Ramos, Carlos Ko, Hoon Marreiros, Goreti |
author2_role |
author author author author author |
dc.contributor.none.fl_str_mv |
Repositório Científico do Instituto Politécnico do Porto |
dc.contributor.author.fl_str_mv |
Choi, Minkyu Robles, Rosslin John Vale, Zita Ramos, Carlos Ko, Hoon Marreiros, Goreti |
dc.subject.por.fl_str_mv |
SCADA security SCADA component communication Encryption schemes |
topic |
SCADA security SCADA component communication Encryption schemes |
description |
A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated. |
publishDate |
2013 |
dc.date.none.fl_str_mv |
2013 2013-01-01T00:00:00Z 2014-01-21T11:25:27Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10400.22/3391 |
url |
http://hdl.handle.net/10400.22/3391 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
1343-4500 10.1016/j.apenergy.2012.07.009 |
dc.rights.driver.fl_str_mv |
metadata only access info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
metadata only access |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
International Information Institute |
publisher.none.fl_str_mv |
International Information Institute |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799131337336029184 |