University of Tasmania
Browse

File(s) under permanent embargo

Encryption schemes applied in SCADA components communication: summary

journal contribution
posted on 2023-05-17, 16:21 authored by Robles, RJ, Kim, T-H
In the case of Symmetric key encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While in the case of Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is compared.

History

Publication title

Information

Volume

15

Pagination

1241-1252

ISSN

1344-8994

Department/School

School of Information and Communication Technology

Publisher

International Information Institute

Place of publication

Japan

Rights statement

Copyright 2012 International Information Institute

Repository Status

  • Restricted

Socio-economic Objectives

Communication technologies, systems and services not elsewhere classified

Usage metrics

    University Of Tasmania

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC