2013
DOI: 10.1016/j.isatra.2013.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Secure SCADA communication by using a modified key management scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4
1

Relationship

4
5

Authors

Journals

citations
Cited by 39 publications
(34 citation statements)
references
References 18 publications
0
34
0
Order By: Relevance
“…Huang et al [14] evaluated the energy efficiency in WBAN. Rezai et al [15][16][17][18][19][20][21][22][23][24][25][26] have presented methods for security improvement and energy efficient for wireless networks that are used in the proposed key management.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al [14] evaluated the energy efficiency in WBAN. Rezai et al [15][16][17][18][19][20][21][22][23][24][25][26] have presented methods for security improvement and energy efficient for wireless networks that are used in the proposed key management.…”
Section: Related Workmentioning
confidence: 99%
“…Open protocols/networks may suffer from several vulnerabilities during communication over the Internet [15,[22][23][24][25][26][27][28][29][30][31][32]. Therefore, the information needs to be kept as secure as possible as part of the normal operation of the system rather than depending on open and unreliable sources [22,48,49].…”
Section: Security Design and Developmentmentioning
confidence: 99%
“…Secure communication is a challenging issue in modern industries such as gas and oil and critical infrastructures such as public transport and power generation systems [1][2][3][4][5]. The core technology utilized to secure communication in these networks is cryptography [4,1].…”
Section: Introductionmentioning
confidence: 99%
“…The core technology utilized to secure communication in these networks is cryptography [4,1]. Elliptic Curve Cryptosystem (ECC) and RSA are two well-known cryptosystems, which are utilized for securing network communication [6,7].…”
Section: Introductionmentioning
confidence: 99%