Gelogo et al., 2014 - Google Patents
Enhance Security Mechanism for Securing SCADA Wireless Sensor NetworkGelogo et al., 2014
View PDF- Document ID
- 17839915949848176940
- Author
- Gelogo Y
- Kim T
- Publication year
- Publication venue
- Int. J. Sens. Its Appl. Control Syst
External Links
Snippet
Abstract Supervisory Control and Data Acquisition (SCADA) systems are vital components of most nation's critical infrastructures. SCADA systems are primarily control systems. They control pipelines, water and transportation systems, utilities, refineries, chemical plants, and …
- 230000002708 enhancing 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shah et al. | A survey on Classification of Cyber-attacks on IoT and IIoT devices | |
Figueroa-Lorenzo et al. | A survey of IIoT protocols: A measure of vulnerability risk analysis based on CVSS | |
US10348763B2 (en) | Responsive deception mechanisms | |
EP3535657B1 (en) | Extracting encryption metadata and terminating malicious connections using machine learning | |
US10362057B1 (en) | Enterprise DNS analysis | |
Hossain et al. | Towards an analysis of security issues, challenges, and open problems in the internet of things | |
US9985988B2 (en) | Deception to detect network scans | |
Igure et al. | Security issues in SCADA networks | |
Pereira et al. | An authentication and access control framework for CoAP-based Internet of Things | |
Alcaraz et al. | Critical control system protection in the 21st century | |
CN110661761B (en) | Access control device, method, computer program product and computer readable medium | |
Masoodi et al. | Security & privacy threats, attacks and countermeasures in Internet of Things | |
Reaves et al. | Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems | |
Aziz Al Kabir et al. | Securing IOT devices against emerging security threats: Challenges and mitigation techniques | |
Akerberg et al. | Exploring security in PROFINET IO | |
Mehner et al. | No need to marry to change your name! attacking profinet io automation networks using dcp | |
de las Morenas et al. | Security experiences in IoT based applications for building and factory automation | |
Antonini et al. | A practical attack against a knx-based building automation system | |
Guo et al. | A survey of industrial control system devices on the Internet | |
Alsabbagh et al. | Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems | |
Varadharajan et al. | Study of security attacks against IoT infrastructures | |
Matsuda et al. | Cyber security risks of technical components in industry 4.0 | |
Heeb et al. | The impact of manufacturer usage description (mud) on iot security | |
Gelogo et al. | Enhance Security Mechanism for Securing SCADA Wireless Sensor Network | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. |