Skip to main content

Security Encryption Schemes for Internet SCADA: Comparison of the Solutions

  • Conference paper
Security-Enriched Urban Computing and Smart Grid (SUComS 2011)

Abstract

SCADA has now expanded as it utilizes the Internet as communication line. SCADA communications can contain sensitive data, it is also a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Components that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. This makes these devices must not only be designed for safety but also for security. Because of so many vulnerabilities, encryption Schemes are applied to secure the communication between the components. This work compares different Encryption Schemes for Securing Internet SCADA Component Communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Reed, T.: At the Abyss: An Insider’s History of the Cold War. Presidio Press (March 2004)

    Google Scholar 

  2. Kim, T.-h.: Weather Condition Double Checking in Internet SCADA Environment. Wseas Transactions on Systems and Control 5(8), 623 (2010), ISSN: 1991-8763

    Google Scholar 

  3. Bailey, D., Wright, E.: Practical SCADA for Industry (2003)

    Google Scholar 

  4. Hildick-Smith, A.: Security for Critical Infrastructure SCADA Systems (2005)

    Google Scholar 

  5. Robles, R.J., Seo, K.-T., Kim, T.-h.: Communication Security solution for internet SCADA. In: Korean Institute of Information Technology 2010 IT Convergence Technology - Summer Workshops and Conference Proceedings, pp. 461–463 (May 2010)

    Google Scholar 

  6. Wallace, D.: Control Engineering. How to put SCADA on the Internet (2003), http://www.controleng.com/article/CA321065.html (accessed: January 2010)

  7. McClanahan, R.H.: SCADA AND IP: Is Network Convergence Really Here? IEEE Industry Applications Magazine (March/April 2003)

    Google Scholar 

  8. Robles, R.J., Choi, M.-K.: Symmetric-Key Encryption for Wireless Internet SCADA. In: Security Technology. CCIS, vol. 58, pp. 289–297, ISSN: 1865-0929

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Robles, R.J., Balitanas, M., Kim, Th. (2011). Security Encryption Schemes for Internet SCADA: Comparison of the Solutions. In: Chang, RS., Kim, Th., Peng, SL. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2011. Communications in Computer and Information Science, vol 223. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23948-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23948-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23947-2

  • Online ISBN: 978-3-642-23948-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics