Proposal strategies of key management for data encryption in SCADA network of electric power systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, D. J. | - |
dc.contributor.author | Lee, J. J. | - |
dc.contributor.author | Kim, B. H. | - |
dc.contributor.author | Hur, D. | - |
dc.date.accessioned | 2021-12-15T02:41:37Z | - |
dc.date.available | 2021-12-15T02:41:37Z | - |
dc.date.created | 2021-12-10 | - |
dc.date.issued | 2011-11 | - |
dc.identifier.issn | 0142-0615 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19790 | - |
dc.description.abstract | SCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today's global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well. (C) 2009 Elsevier Ltd. All rights reserved. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCI LTD | - |
dc.title | Proposal strategies of key management for data encryption in SCADA network of electric power systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, B. H. | - |
dc.identifier.doi | 10.1016/j.ijepes.2009.03.004 | - |
dc.identifier.wosid | 000295350300001 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, v.33, no.9, pp.1521 - 1526 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS | - |
dc.citation.title | INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS | - |
dc.citation.volume | 33 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1521 | - |
dc.citation.endPage | 1526 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Cyber security | - |
dc.subject.keywordAuthor | Optimal key distribution period | - |
dc.subject.keywordAuthor | Quality of service function | - |
dc.subject.keywordAuthor | SCADA | - |
dc.subject.keywordAuthor | Encryption | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.