2014 6th Computer Science and Electronic Engineering Conference (CEEC) 2014
DOI: 10.1109/ceec.2014.6958560
|View full text |Cite
|
Sign up to set email alerts
|

Simulating and modelling the impact of security constructs on latency for open loop control

Abstract: Open loop control has commonly been used to conduct tasks for a range of Industrial Control Systems (ICS). ICS however, are susceptible to security exploits. A possible countermeasure to the active and passive attacks on ICS is to provide cryptography to thwart the attacker by providing confidentiality and integrity for transmitted data between nodes on the ICS network; however, a drawback of applying cryptographic algorithms to ICS is the additional communication latency that is generated. The proposed soluti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…A SPI divisor of 16 is chosen to replicate bandwidth of a wireless link of 250Kbps [11] as calculated using the formula obtained from previous research [12]. It is assumed that a 100m distance is between each wireless node.…”
Section: Proposed Mathematical Throughput Modelmentioning
confidence: 99%
“…A SPI divisor of 16 is chosen to replicate bandwidth of a wireless link of 250Kbps [11] as calculated using the formula obtained from previous research [12]. It is assumed that a 100m distance is between each wireless node.…”
Section: Proposed Mathematical Throughput Modelmentioning
confidence: 99%
“…Cryptography is selected to mitigate these attacks, however, the selection of the cryptographic algorithm had influenced the performance and operation of the UAV [3], [4]. The contributions of this paper are the permutation subsitution network (PSN) block cipher design paradigm, the alternative advanced encryption standard (AAES) and the first benchmark test between the substitution permutation network (SPN) and the PSN design paradigms.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography is selected to mitigate these attacks, however, the selection of the cryptographic algorithm had influenced the performance and operation of the unmanned vehicle [3], [4]. As unmanned vehicles have limited energy supplies, the selection of standardised cryptographic approaches may not be suited for this context [5], [6].…”
Section: Introductionmentioning
confidence: 99%