Repository logo
 
Loading...
Thumbnail Image
Publication

Utilization of different encryption schemes for securing SCADA component communication

Use this identifier to reference this record.
Name:Description:Size:Format: 
ART_MinkyuChoi_2013_GECAD.pdf1.03 MBAdobe PDF Download

Advisor(s)

Abstract(s)

A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.

Description

Keywords

SCADA security SCADA component communication Encryption schemes

Pedagogical Context

Citation

Research Projects

Organizational Units

Journal Issue

Publisher

International Information Institute

CC License

Altmetrics