Utilization of different encryption schemes for securing SCADA component communication

Detalhes bibliográficos
Autor(a) principal: Choi, Minkyu
Data de Publicação: 2013
Outros Autores: Robles, Rosslin John, Vale, Zita, Ramos, Carlos, Ko, Hoon, Marreiros, Goreti
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/10400.22/3391
Resumo: A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.
id RCAP_557f035db2beed5a4e268c6465637ac3
oai_identifier_str oai:recipp.ipp.pt:10400.22/3391
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Utilization of different encryption schemes for securing SCADA component communicationSCADA securitySCADA component communicationEncryption schemesA vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.International Information InstituteRepositório Científico do Instituto Politécnico do PortoChoi, MinkyuRobles, Rosslin JohnVale, ZitaRamos, CarlosKo, HoonMarreiros, Goreti2014-01-21T11:25:27Z20132013-01-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10400.22/3391eng1343-450010.1016/j.apenergy.2012.07.009metadata only accessinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-03-13T12:43:11Zoai:recipp.ipp.pt:10400.22/3391Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T17:24:23.625021Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Utilization of different encryption schemes for securing SCADA component communication
title Utilization of different encryption schemes for securing SCADA component communication
spellingShingle Utilization of different encryption schemes for securing SCADA component communication
Choi, Minkyu
SCADA security
SCADA component communication
Encryption schemes
title_short Utilization of different encryption schemes for securing SCADA component communication
title_full Utilization of different encryption schemes for securing SCADA component communication
title_fullStr Utilization of different encryption schemes for securing SCADA component communication
title_full_unstemmed Utilization of different encryption schemes for securing SCADA component communication
title_sort Utilization of different encryption schemes for securing SCADA component communication
author Choi, Minkyu
author_facet Choi, Minkyu
Robles, Rosslin John
Vale, Zita
Ramos, Carlos
Ko, Hoon
Marreiros, Goreti
author_role author
author2 Robles, Rosslin John
Vale, Zita
Ramos, Carlos
Ko, Hoon
Marreiros, Goreti
author2_role author
author
author
author
author
dc.contributor.none.fl_str_mv Repositório Científico do Instituto Politécnico do Porto
dc.contributor.author.fl_str_mv Choi, Minkyu
Robles, Rosslin John
Vale, Zita
Ramos, Carlos
Ko, Hoon
Marreiros, Goreti
dc.subject.por.fl_str_mv SCADA security
SCADA component communication
Encryption schemes
topic SCADA security
SCADA component communication
Encryption schemes
description A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.
publishDate 2013
dc.date.none.fl_str_mv 2013
2013-01-01T00:00:00Z
2014-01-21T11:25:27Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10400.22/3391
url http://hdl.handle.net/10400.22/3391
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv 1343-4500
10.1016/j.apenergy.2012.07.009
dc.rights.driver.fl_str_mv metadata only access
info:eu-repo/semantics/openAccess
rights_invalid_str_mv metadata only access
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv International Information Institute
publisher.none.fl_str_mv International Information Institute
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799131337336029184