Proposal strategies of key management for data encryption in SCADA network of electric power systems
- Authors
- Kang, D. J.; Lee, J. J.; Kim, B. H.; Hur, D.
- Issue Date
- Nov-2011
- Publisher
- ELSEVIER SCI LTD
- Keywords
- Cyber security; Optimal key distribution period; Quality of service function; SCADA; Encryption
- Citation
- INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, v.33, no.9, pp.1521 - 1526
- Journal Title
- INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS
- Volume
- 33
- Number
- 9
- Start Page
- 1521
- End Page
- 1526
- URI
- https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19790
- DOI
- 10.1016/j.ijepes.2009.03.004
- ISSN
- 0142-0615
- Abstract
- SCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today's global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well. (C) 2009 Elsevier Ltd. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > School of Electronic & Electrical Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19790)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.