Applying encryption schemed to supervisory control and data acquisition systems for security management

نویسنده

  • Tai-hoon Kim
چکیده

Supervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication in SCADA Systems. In the case of Symmetric key encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While in the case of Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These schemes can be integrated to SCADA communication for managing security level. In this paper, author compares Encryption Schemes as used in Communication between SCADA components to show the escalation of security level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication Security for SCADA in Smart Grid Environment

Supervisory Control and Data Acquisition systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Conventionally, SCADA is connected only in a limited private network because SCADA is considered a critical infrastructure, and connecting to the internet may put the society on jeopardy, SCADA operators hold b...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Empirical Approach to Enhance the Security of DNP3 Protocol in SCADA System using Low-latency Block Cipher*

Critical infrastructures like Nuclear Power Plants (NPP), railroad networks, and water distribution / treatment systems are fundamentally important to human life. Failure of such structures endangers human lives, environment, and economy in world-wide scale. Supervisory Control And Data Acquisition (SCADA) system have been installed to operate those infrastructures efficiently and safely, but s...

متن کامل

Encryption Security in SCADA Networks

Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the leve...

متن کامل

A Survey: An Advanced Key Management Technique with Enhanced Security SCADA System

Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data acquisition (SCADA).In this paper, we analyze several security issues in SCADA systems. We classify these issues based on key management, vulnerability and survivability. Using this standardized security techniques we can easily compare & c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013