Abstract
SCADA has now expanded as it utilizes the Internet as communication line. SCADA communications can contain sensitive data, it is also a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Components that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. This makes these devices must not only be designed for safety but also for security. Because of so many vulnerabilities, encryption Schemes are applied to secure the communication between the components. This work compares different Encryption Schemes for Securing Internet SCADA Component Communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Reed, T.: At the Abyss: An Insider’s History of the Cold War. Presidio Press (March 2004)
Kim, T.-h.: Weather Condition Double Checking in Internet SCADA Environment. Wseas Transactions on Systems and Control 5(8), 623 (2010), ISSN: 1991-8763
Bailey, D., Wright, E.: Practical SCADA for Industry (2003)
Hildick-Smith, A.: Security for Critical Infrastructure SCADA Systems (2005)
Robles, R.J., Seo, K.-T., Kim, T.-h.: Communication Security solution for internet SCADA. In: Korean Institute of Information Technology 2010 IT Convergence Technology - Summer Workshops and Conference Proceedings, pp. 461–463 (May 2010)
Wallace, D.: Control Engineering. How to put SCADA on the Internet (2003), http://www.controleng.com/article/CA321065.html (accessed: January 2010)
McClanahan, R.H.: SCADA AND IP: Is Network Convergence Really Here? IEEE Industry Applications Magazine (March/April 2003)
Robles, R.J., Choi, M.-K.: Symmetric-Key Encryption for Wireless Internet SCADA. In: Security Technology. CCIS, vol. 58, pp. 289–297, ISSN: 1865-0929
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Robles, R.J., Balitanas, M., Kim, Th. (2011). Security Encryption Schemes for Internet SCADA: Comparison of the Solutions. In: Chang, RS., Kim, Th., Peng, SL. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2011. Communications in Computer and Information Science, vol 223. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23948-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-23948-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23947-2
Online ISBN: 978-3-642-23948-9
eBook Packages: Computer ScienceComputer Science (R0)