2021
DOI: 10.22266/ijies2021.0228.35
|View full text |Cite
|
Sign up to set email alerts
|

The Dynamic Symmetric Four-Key-Generators System for Securing Data Transmission in the Industrial Control System

Abstract: Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. Therefore, ICS requires adequate data transmission security. This paper suggests improving the security of data transmission through a dynamic symmetric four-key-generators system, wherein the system anticipates cyberattacks by generating four keys before encryption. It… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Communication integrates all of the aspects mentioned earlier in cybersecurity systems. Use encrypted data [23], [24].…”
Section: A Cybersecurity and Cyberattacksmentioning
confidence: 99%
“…Communication integrates all of the aspects mentioned earlier in cybersecurity systems. Use encrypted data [23], [24].…”
Section: A Cybersecurity and Cyberattacksmentioning
confidence: 99%
“…Unfortunately, however, the process is slower and consumes more computer resources than symmetric encryption. The integration of several cryptographic methods is therefore proposed to provide efficient data security while simultaneously addressing the problem of key distribution, thereby overcoming each scheme's security weaknesses [55]. Some previous studies have utilized asymmetric cryptography; for example, Purevjav [56] and Harba [57] employed Rivest Shamir Adleman (RSA), while N. Hong [58] and Xin [59] used Elliptic Curve Cryptography (ECC).…”
Section: Computer Sciencementioning
confidence: 99%
“…To secure data, without compromising security, a cost-effective symmetric encryption method is often used. However, in such processes, proper key distribution is problematic [55]. An asymmetric scheme has potential.…”
Section: Computer Sciencementioning
confidence: 99%