Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Proposal strategies of key management for data encryption in SCADA network of electric power systems

Authors
Kang, D. J.Lee, J. J.Kim, B. H.Hur, D.
Issue Date
Nov-2011
Publisher
ELSEVIER SCI LTD
Keywords
Cyber security; Optimal key distribution period; Quality of service function; SCADA; Encryption
Citation
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, v.33, no.9, pp.1521 - 1526
Journal Title
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS
Volume
33
Number
9
Start Page
1521
End Page
1526
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19790
DOI
10.1016/j.ijepes.2009.03.004
ISSN
0142-0615
Abstract
SCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today's global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well. (C) 2009 Elsevier Ltd. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electronic & Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Bal ho photo

Kim, Bal ho
Engineering (Electronic & Electrical Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE