[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gelogo et al., 2014 - Google Patents

Enhance Security Mechanism for Securing SCADA Wireless Sensor Network

Gelogo et al., 2014

View PDF
Document ID
17839915949848176940
Author
Gelogo Y
Kim T
Publication year
Publication venue
Int. J. Sens. Its Appl. Control Syst

External Links

Snippet

Abstract Supervisory Control and Data Acquisition (SCADA) systems are vital components of most nation's critical infrastructures. SCADA systems are primarily control systems. They control pipelines, water and transportation systems, utilities, refineries, chemical plants, and …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation

Similar Documents

Publication Publication Date Title
Shah et al. A survey on Classification of Cyber-attacks on IoT and IIoT devices
Figueroa-Lorenzo et al. A survey of IIoT protocols: A measure of vulnerability risk analysis based on CVSS
US10348763B2 (en) Responsive deception mechanisms
EP3535657B1 (en) Extracting encryption metadata and terminating malicious connections using machine learning
US10362057B1 (en) Enterprise DNS analysis
Hossain et al. Towards an analysis of security issues, challenges, and open problems in the internet of things
US9985988B2 (en) Deception to detect network scans
Igure et al. Security issues in SCADA networks
Pereira et al. An authentication and access control framework for CoAP-based Internet of Things
Alcaraz et al. Critical control system protection in the 21st century
CN110661761B (en) Access control device, method, computer program product and computer readable medium
Masoodi et al. Security & privacy threats, attacks and countermeasures in Internet of Things
Reaves et al. Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
Aziz Al Kabir et al. Securing IOT devices against emerging security threats: Challenges and mitigation techniques
Akerberg et al. Exploring security in PROFINET IO
Mehner et al. No need to marry to change your name! attacking profinet io automation networks using dcp
de las Morenas et al. Security experiences in IoT based applications for building and factory automation
Antonini et al. A practical attack against a knx-based building automation system
Guo et al. A survey of industrial control system devices on the Internet
Alsabbagh et al. Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems
Varadharajan et al. Study of security attacks against IoT infrastructures
Matsuda et al. Cyber security risks of technical components in industry 4.0
Heeb et al. The impact of manufacturer usage description (mud) on iot security
Gelogo et al. Enhance Security Mechanism for Securing SCADA Wireless Sensor Network
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.