원문정보
초록
영어
SCADA historically is responsible for monitoring and controlling critical infrastructures and manufacturing processes in an isolated environment. But with the requirement of a timely access of information for making decisions, large and modern companies being in a geographically diverse location take advantage of the internet as an important communication channel to allow the exchange of data. However, with SCADA being in the internet raise the issue of security. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack heighten. With the posted threats and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented. To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.
목차
1. Introduction
2. Related Studies
3. The SCADA Architecture
3.1 Typical SCADA System
3.2. Internet-Based SCADA System
4. The threats
5. The Cipher
5.1 Integration of Cipher
5.2 Testing of Cipher
5.3 Comparison
6. Conclusion
7. Future Works
References
