The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2012
DOI: 10.3182/20121003-3-mx-4033.00057
|View full text |Cite
|
Sign up to set email alerts
|

A model of distributed key generation for industrial control systems

Abstract: The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industria… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…After receiving k pieces from k available PKG nodes, client constructs its private key. The client can verify the key by using bilinear pairings as it is stated in [6] and [7].…”
Section: Distributed Private Key Generation For Id-based Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…After receiving k pieces from k available PKG nodes, client constructs its private key. The client can verify the key by using bilinear pairings as it is stated in [6] and [7].…”
Section: Distributed Private Key Generation For Id-based Cryptographymentioning
confidence: 99%
“…The id-based distributed private key generation protocol was proposed in [5]; an improved version is presented in [6]. In [7], a Petri net model for the protocol to be implemented on industrial control systems is presented.…”
Section: Introductionmentioning
confidence: 99%
“…This issue can be overcome by encrypting data transmissions with complex key generators. In cryptography, Kilinc [8] showed communication protocols' intrinsic shortcomings in controlling network processes. They introduced a distributed key generation model for ICS as a representation of Petri nets.…”
Section: Introductionmentioning
confidence: 99%