Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Proposal strategies of key management for data encryption in SCADA network of electric power systems

Full metadata record
DC Field Value Language
dc.contributor.authorKang, D. J.-
dc.contributor.authorLee, J. J.-
dc.contributor.authorKim, B. H.-
dc.contributor.authorHur, D.-
dc.date.accessioned2021-12-15T02:41:37Z-
dc.date.available2021-12-15T02:41:37Z-
dc.date.created2021-12-10-
dc.date.issued2011-11-
dc.identifier.issn0142-0615-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19790-
dc.description.abstractSCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today's global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well. (C) 2009 Elsevier Ltd. All rights reserved.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER SCI LTD-
dc.titleProposal strategies of key management for data encryption in SCADA network of electric power systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, B. H.-
dc.identifier.doi10.1016/j.ijepes.2009.03.004-
dc.identifier.wosid000295350300001-
dc.identifier.bibliographicCitationINTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, v.33, no.9, pp.1521 - 1526-
dc.relation.isPartOfINTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS-
dc.citation.titleINTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS-
dc.citation.volume33-
dc.citation.number9-
dc.citation.startPage1521-
dc.citation.endPage1526-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorCyber security-
dc.subject.keywordAuthorOptimal key distribution period-
dc.subject.keywordAuthorQuality of service function-
dc.subject.keywordAuthorSCADA-
dc.subject.keywordAuthorEncryption-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electronic & Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Bal ho photo

Kim, Bal ho
Engineering (Electronic & Electrical Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE