File(s) under permanent embargo
Encryption schemes applied in SCADA components communication: summary
journal contribution
posted on 2023-05-17, 16:21 authored by Robles, RJ, Kim, T-HIn the case of Symmetric key encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While in the case of Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is compared.
History
Publication title
InformationVolume
15Pagination
1241-1252ISSN
1344-8994Department/School
School of Information and Communication TechnologyPublisher
International Information InstitutePlace of publication
JapanRights statement
Copyright 2012 International Information InstituteRepository Status
- Restricted