원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.2 No.3
2008.07
pp.31-40
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
This article focuses on cryptographic Key Management Systems (KMS) for SCADA systems environments. It first gives a generic view on the constraints, requirements and desired technical properties in SCADA contexts. Then, the most widespread solutions are presented, before discussing how they meet such conditions. The work done by different initiatives on this issue is also introduced. Finally, perspectives and research directions are proposed in consequence. The article aims at presenting open issues on the area, to foster discussion and research, according to the authors’ view.
목차
Abstract
1. Introduction
2. SCADA systems context and specificities
3. A macroscopic key management survey
3.1. The four canonical KMS
3.2. KMS comparison for SCADA systems
3.3. Good old ways for SCADA KMS?
4. KMS in power industry initiatives
4.1. IEC TC57 WG15 work and choices – IEC 62351
4.2. DNP3 User Group - Secure DNP3 v1.0
4.3. The IEEE P1689 draft
4.4. Smart meters initiatives
5. Challenges and technical perspectives
5.1. Room for specific SCADA KMS?
5.2. Some technical perspectives
6. Conclusion
7. References
1. Introduction
2. SCADA systems context and specificities
3. A macroscopic key management survey
3.1. The four canonical KMS
3.2. KMS comparison for SCADA systems
3.3. Good old ways for SCADA KMS?
4. KMS in power industry initiatives
4.1. IEC TC57 WG15 work and choices – IEC 62351
4.2. DNP3 User Group - Secure DNP3 v1.0
4.3. The IEEE P1689 draft
4.4. Smart meters initiatives
5. Challenges and technical perspectives
5.1. Room for specific SCADA KMS?
5.2. Some technical perspectives
6. Conclusion
7. References
저자정보
참고문헌
자료제공 : 네이버학술정보
