2017
DOI: 10.1016/j.jestch.2016.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Key management issue in SCADA networks: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 50 publications
(55 citation statements)
references
References 29 publications
0
54
0
1
Order By: Relevance
“…Our computational complexity analysis shows that the average Hamming weight for nbit multiplier with K-partition in the proposed modular multiplication algorithm is 3 . However, the average Hamming weight for n-bit multiplier in the compact SD modular multiplication algorithm [17] is 3 , and the average Hamming weight for n-bit multiplier with K-partitions in the KPM3 algorithm [7] is .…”
Section: The Computational Complexity Analysismentioning
confidence: 98%
See 1 more Smart Citation
“…Our computational complexity analysis shows that the average Hamming weight for nbit multiplier with K-partition in the proposed modular multiplication algorithm is 3 . However, the average Hamming weight for n-bit multiplier in the compact SD modular multiplication algorithm [17] is 3 , and the average Hamming weight for n-bit multiplier with K-partitions in the KPM3 algorithm [7] is .…”
Section: The Computational Complexity Analysismentioning
confidence: 98%
“…Secure communication is a challenging issue in modern industries such as gas and oil and critical infrastructures such as public transport and power generation systems [1][2][3][4][5]. The core technology utilized to secure communication in these networks is cryptography [4,1].…”
Section: Introductionmentioning
confidence: 99%
“…The issue of key distribution is beyond the scope of this paper. However, other research has tackled this question, e.g., [19].…”
Section: Lightweight Attack Surface Reduction With Lasarusmentioning
confidence: 99%
“…Huang et al [14] evaluated the energy efficiency in WBAN. Rezai et al [15][16][17][18][19][20][21][22][23][24][25][26] have presented methods for security improvement and energy efficient for wireless networks that are used in the proposed key management.…”
Section: Related Workmentioning
confidence: 99%