2011 International Conference on Ubiquitous Computing and Multimedia Applications 2011
DOI: 10.1109/ucma.2011.33
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Encryption Schemes as Used in Communication between SCADA Components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…First, the way in which data are made trustworthy is analyzed and discussed in Zafara et al [31], and in Qian et al [32]. The comparison of cryptographic algorithms and the unavoidable management of cryptographic keys that are used within SCADA infrastructures are discussed, and various solutions are devised as seen in Choi et al [25], Lim [26], Premnath et al [27], Robles et al [28], Rezai et al [29], [30]. These works all imply that ICS/SCADA environments of the future will need and will therefore have to find solutions to tackle the burden of cryptography and various cryptosystems on the overall operational performance of the system.…”
Section: Related Workmentioning
confidence: 99%
“…First, the way in which data are made trustworthy is analyzed and discussed in Zafara et al [31], and in Qian et al [32]. The comparison of cryptographic algorithms and the unavoidable management of cryptographic keys that are used within SCADA infrastructures are discussed, and various solutions are devised as seen in Choi et al [25], Lim [26], Premnath et al [27], Robles et al [28], Rezai et al [29], [30]. These works all imply that ICS/SCADA environments of the future will need and will therefore have to find solutions to tackle the burden of cryptography and various cryptosystems on the overall operational performance of the system.…”
Section: Related Workmentioning
confidence: 99%
“…, MD5 and SHA2) algorithms are deployed to secure the SCADA communication from networks adversaries such as message sniffers, man-in-the-middle attackers, eavesdroppers and password crackers, data interruption, and modification attackers, and others. As a consequence, cryptography based developments are considered more reliable and secure developments for SCADA systems [ 11 , 25 , 26 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 ]. In symmetric encryption, while the desired message is encrypted, this does not ensure that the message contents are not modified during transmission because a single secret can be shared between the sender and the receiver.…”
Section: Related Workmentioning
confidence: 99%
“…Homeland Security Department, Schweitzer Engineering Laboratories, Inc., the American Gas Association, and the Gas Technology Institute, have been vulnerable to security threats due to the Internet’s open connectivity [ 28 , 29 ]. These organizations and other researchers have developed several security solutions and protocols to guard against cyber-security issues, and the cryptography-based security mechanisms have been selected as the “best” security approaches for secure SCADA communications [ 26 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 ]. As a consequence, the DNP3 users group defined and described the cryptography approaches, such as the asymmetric and symmetric methods, to enhance the security of the DNP3 protocol; therefore, the details of several cryptography algorithms are available along with the information regarding their security parameters [ 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 ].…”
Section: Problem Statementmentioning
confidence: 99%