2008 International Conference on Information Security and Assurance (Isa 2008) 2008
DOI: 10.1109/isa.2008.77
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Key Management for SCADA Systems-Issues and Perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Step (5): After the client receives the message "rdata", as in step (3), it gets "redate" on the basis of the principle of digital envelope technology, hashes "redata" using the SM3 cipher algorithm, and gets redigest2. It is demonstrated that the communication process was not interfered with if redigest1 and redigest2 are identical; If redigest1 differs from redigest2, the server is considered unreliable and the communication process has been interrupted.…”
Section: Client Servermentioning
confidence: 99%
See 1 more Smart Citation
“…Step (5): After the client receives the message "rdata", as in step (3), it gets "redate" on the basis of the principle of digital envelope technology, hashes "redata" using the SM3 cipher algorithm, and gets redigest2. It is demonstrated that the communication process was not interfered with if redigest1 and redigest2 are identical; If redigest1 differs from redigest2, the server is considered unreliable and the communication process has been interrupted.…”
Section: Client Servermentioning
confidence: 99%
“…Modbus/TCP protocol is an enlarged protocol of Modbus, the mainstream fieldbus protocol used all around in ICS systems. Nevertheless, the design of this protocol give importance on the efficiency overutilization, and does not fully think about the security, all in all it is authication deficit, encryption and integrity authentication [3][4][5][6] . This allows attackers to attack Modbus/TCP network in ICS system via TCP/IP network, and steal crucial data information in ICS system by imitating or tampering with servers or clients.…”
Section: Introductionmentioning
confidence: 99%
“…These vulnerabilities can potentially inflict severe disruptions on the controlled objects. Consequently, safeguarding interconnected control networks from unauthorized access has emerged as a pivotal area of research [3][4][5][6][7][8][9], precipitating the development of dedicated security protocols [10]. For instance, traditional bus protocols like Modbus, Profibus, and CAN have been identified as particularly susceptible to cyber-attacks, especially where programmable logic controllers (PLCs) are accessed from within the control network [11].…”
Section: Introductionmentioning
confidence: 99%
“…Given the limited resources of devices in the field network, a challenging task is to address the conflict between the real-time requirements of these systems and the additional delay caused by encryption algorithms [149,150,143,121,39]. A common solution to circumvent this limitation is to encrypt the communication link between the field and control networks using a "Bump-In-The-Wire (BITW)" [149,150,143].…”
Section: General Aspectsmentioning
confidence: 99%
“…The "bump-in-the-wire" approach A related problem deals with the management of cryptographic keys. Some of the challenges in this area are discussed by Pi and Sitbon [121]. Choi et al [39] provide a SCADA specific solution that supports message broadcasting and secure communications.…”
Section: General Aspectsmentioning
confidence: 99%