2011
DOI: 10.1016/j.ijepes.2009.03.004
|View full text |Cite
|
Sign up to set email alerts
|

Proposal strategies of key management for data encryption in SCADA network of electric power systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0
1

Year Published

2013
2013
2016
2016

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(24 citation statements)
references
References 4 publications
0
21
0
1
Order By: Relevance
“…Timing is critical in automation and timing requirements must be satisfied (10). As a matter of course, it is impossible to neglect data and communications security (23,28,24), which requires the use of available technologies with a classic form or modern methods (31,27).…”
Section: Fig 1 Mes In Automationmentioning
confidence: 99%
“…Timing is critical in automation and timing requirements must be satisfied (10). As a matter of course, it is impossible to neglect data and communications security (23,28,24), which requires the use of available technologies with a classic form or modern methods (31,27).…”
Section: Fig 1 Mes In Automationmentioning
confidence: 99%
“…Security of SCADA systems SCADA systems are widely used for industrial processes such as electric power production and distribution, water treatment and supply, gas and oil production and distribution, telecommunications, chemistry, nuclear fusion [4], [10]. Kang, Lee, Kim and Hur [11] describe it as a twin package of software and network infrastructure into a supervision system that is used to acquire data, analyze it and send control actions.…”
Section: Risk Treatmentmentioning
confidence: 99%
“…The integration of SCADA systems with IT systems is also under way which further increases the security risks to these systems [11].There is a need for proper security measures to be put in place for the protection of these systems. Putting all the security measures at once may not be possible and may hinder the proper functioning of such systems but slowly increasing security measures is a necessity.…”
Section: Risk Treatmentmentioning
confidence: 99%
“…Supervisory control and data acquisition (SCADA) networks play an important role in critical infrastructures such as power generation system, public transports, and oil and gas industries . While conventional SCADA networks have a closed operating environment, today's modern SCADA networks are connected to the open access networks such as the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, a secure data communication is required for communication between master station and each slave station of the SCADA network. The key management scheme is essential for a secure data communication .…”
Section: Introductionmentioning
confidence: 99%