Logo do repositório
 
Publicação

Utilization of different encryption schemes for securing SCADA component communication

dc.contributor.authorChoi, Minkyu
dc.contributor.authorRobles, Rosslin John
dc.contributor.authorVale, Zita
dc.contributor.authorRamos, Carlos
dc.contributor.authorKo, Hoon
dc.contributor.authorMarreiros, Goreti
dc.date.accessioned2014-01-21T11:25:27Z
dc.date.available2014-01-21T11:25:27Z
dc.date.issued2013
dc.description.abstractA vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.por
dc.identifier.doi10.1016/j.apenergy.2012.07.009pt_PT
dc.identifier.issn1343-4500
dc.identifier.urihttp://hdl.handle.net/10400.22/3391
dc.language.isoengpor
dc.peerreviewedyespor
dc.publisherInternational Information Institutepor
dc.relation.ispartofseriesInformation Journal; Vol. 16, Issue 2(B)
dc.relation.publisherversionhttp://www.information-iii.org/contents.htmlpor
dc.subjectSCADA securitypor
dc.subjectSCADA component communicationpor
dc.subjectEncryption schemespor
dc.titleUtilization of different encryption schemes for securing SCADA component communicationpor
dc.typejournal article
dspace.entity.typePublication
oaire.citation.endPage1508por
oaire.citation.issueIssue 2(B)por
oaire.citation.startPage1503por
oaire.citation.titleInformation-An International Interdisciplinary Journalpor
oaire.citation.volumeVol. 16por
person.familyNameVale
person.familyNameRamos
person.familyNameMarreiros
person.givenNameZita
person.givenNameCarlos
person.givenNameGoreti
person.identifier632184
person.identifier.ciencia-id721B-B0EB-7141
person.identifier.ciencia-id1011-FAFC-AEBA
person.identifier.ciencia-idA412-138E-2389
person.identifier.orcid0000-0002-4560-9544
person.identifier.orcid0000-0002-5143-1711
person.identifier.orcid0000-0003-4417-8401
person.identifier.ridA-5824-2012
person.identifier.ridK-7403-2014
person.identifier.ridM-4583-2013
person.identifier.scopus-author-id7004115775
person.identifier.scopus-author-id7201559105
person.identifier.scopus-author-id9332465700
rcaap.rightsclosedAccesspor
rcaap.typearticlepor
relation.isAuthorOfPublicationff1df02d-0c0f-4db1-bf7d-78863a99420b
relation.isAuthorOfPublication43ef055e-80e6-4b31-8400-2d3592927e03
relation.isAuthorOfPublicationf084569f-09f5-4d00-b759-aa4a5802f051
relation.isAuthorOfPublication.latestForDiscoveryff1df02d-0c0f-4db1-bf7d-78863a99420b

Ficheiros

Principais
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
ART_MinkyuChoi_2013_GECAD.pdf
Tamanho:
1.03 MB
Formato:
Adobe Portable Document Format
Licença
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
license.txt
Tamanho:
1.71 KB
Formato:
Item-specific license agreed upon to submission
Descrição: