Abstract:The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industria… Show more
“…After receiving k pieces from k available PKG nodes, client constructs its private key. The client can verify the key by using bilinear pairings as it is stated in [6] and [7].…”
Section: Distributed Private Key Generation For Id-based Cryptographymentioning
confidence: 99%
“…The id-based distributed private key generation protocol was proposed in [5]; an improved version is presented in [6]. In [7], a Petri net model for the protocol to be implemented on industrial control systems is presented.…”
Abstract. We present a Petri net model of a protocol for the distributed generation of id-based private keys. Those keys can then be used for secure communications. The components of the system are built as refinements of a common interface, by applying a formal operation based on a class of morphisms between Elementary Net Systems. It is then shown that we can derive behavioural properties of the composed system without building it explicitly, by exploiting properties of the given morphisms.
“…After receiving k pieces from k available PKG nodes, client constructs its private key. The client can verify the key by using bilinear pairings as it is stated in [6] and [7].…”
Section: Distributed Private Key Generation For Id-based Cryptographymentioning
confidence: 99%
“…The id-based distributed private key generation protocol was proposed in [5]; an improved version is presented in [6]. In [7], a Petri net model for the protocol to be implemented on industrial control systems is presented.…”
Abstract. We present a Petri net model of a protocol for the distributed generation of id-based private keys. Those keys can then be used for secure communications. The components of the system are built as refinements of a common interface, by applying a formal operation based on a class of morphisms between Elementary Net Systems. It is then shown that we can derive behavioural properties of the composed system without building it explicitly, by exploiting properties of the given morphisms.
“…This issue can be overcome by encrypting data transmissions with complex key generators. In cryptography, Kilinc [8] showed communication protocols' intrinsic shortcomings in controlling network processes. They introduced a distributed key generation model for ICS as a representation of Petri nets.…”
Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. Therefore, ICS requires adequate data transmission security. This paper suggests improving the security of data transmission through a dynamic symmetric four-key-generators system, wherein the system anticipates cyberattacks by generating four keys before encryption. It involves four generators: a random initial key generator, a keystream generator, a key scheduling algorithm generator, and a pseudo-random number algorithm generator. In the receiver section, the system generates three keys before decryption to ensure data confidentiality and to avoid cyberattacks. The test results show that the proposed system keyspace is ≈22048 bits, meaning that the key is more secure from brute force attacks. As a result, the cipher data have a correlation value of 0.00007. The entropy value is 7.99, indicating that the cipher data is more secure. Also, speed tests show that the processing time still qualifies as realtime.
Kablosuz iletiúim teknolojilerindeki ilerlemelerle birlikte telsiz duyarga a÷larÕ (TDA) birçok sivil ve askeri uygulamalarda özellikle de hareketli hedefin takibi gibi konularda yaygÕn olarak kullanÕlmaya baúlanmÕútÕr. Bu çalÕúmada da TDA'da hÕzlÕ hareket eden nesneler için küme tabanlÕ bir hedef izleme algoritmasÕ önerilmiútir.Literatürde bulunan mevcut çalÕúmalarda lider dü÷üm, hedefin sadece t+1 anÕnda yaklaúaca÷Õ konumu tahminleyerek bu konuma en yakÕn dü÷ümü uyandÕrÕr. Hedefin çok hÕzlÕ hareket etmesi durumunda ise hedefin kÕsa süre içerisinde bir grup dü÷ümün yakÕnlarÕndan algÕlanmadan geçip gitmesi söz konusudur. Önermiú oldu÷umuz algoritma ile hedefin hÕzÕna ba÷lÕ olarak, hedefin tahmini gidece÷i yöndeki dü÷ümler önceden uyandÕrÕlarak, kümeler önceden oluúturulmaktadÕr. Böylece hedefin ani hÕzlanmasÕ durumunda, önceden oluúturmuú oldu÷umuz kümeler sayesinde hedefin kaybolma riskini azaltmÕú bulunmaktayÕz.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.