2010
DOI: 10.1109/tpwrd.2009.2036181
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Secure Group Communications for SCADA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(63 citation statements)
references
References 11 publications
0
63
0
Order By: Relevance
“…The difficulties for designing appropriate key management systems for these environments are discussed in [72]. A number of studies including [73][74][75][76], proposed key management systems for industrial environments but these do not meet the diverse deployment challenges and performance requirements of plant and factory settings. In these, the key management system needs to be scalable; must work well with limited computational power; must undertake key exchange while not interfering with the the real-time availability of the process; must provide interoperability among systems and devices; and must provide automated key revocation when under attack.…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…The difficulties for designing appropriate key management systems for these environments are discussed in [72]. A number of studies including [73][74][75][76], proposed key management systems for industrial environments but these do not meet the diverse deployment challenges and performance requirements of plant and factory settings. In these, the key management system needs to be scalable; must work well with limited computational power; must undertake key exchange while not interfering with the the real-time availability of the process; must provide interoperability among systems and devices; and must provide automated key revocation when under attack.…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…With the integration of the Smart Grid with existing SCADA systems, which have been employed since the '60s, the resulting system should have a unified key management scheme for the secure communication of all components among them. There are quite a few key management schemes designed especially for SCADA: [4,8,6,17,7,12]; however, they are not adequate because they do not take into account the rest of the Smart Grid's components. An overview of each of these proposals is presented in [23].…”
Section: Related Workmentioning
confidence: 99%
“…Symmetric method has been uses to check the security performance and also specify the policies for key distribution between nodes, Formal mathematical methods for SCADA security and the uses of symmetric algorithms are future topic of current research (Kang and Kim, 2007b). Multicasting approach for key distribution and management is new approach within SCADA systems, which significantly reduces the cost and provides better performance from existing solutions (Choi et al, 2010).…”
Section: Key Management and Distribution Protocol For Scada Systemmentioning
confidence: 99%