eCite Digital Repository
Encryption schemes applied in SCADA components communication: summary
Citation
Robles, RJ and Kim, T-H, Encryption schemes applied in SCADA components communication: summary, Information, 15, (3) pp. 1241-1252. ISSN 1344-8994 (2012) [Refereed Article]
![]() | PDF Not available 1Mb |
Copyright Statement
Copyright 2012 International Information Institute
Official URL: http://www.information-iii.org/information_journal...
Abstract
In the case of Symmetric key encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While in the case of Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is compared.
Item Details
Item Type: | Refereed Article |
---|---|
Keywords: | SCADA, encryption, internet, communication, control system |
Research Division: | Information and Computing Sciences |
Research Group: | Distributed computing and systems software |
Research Field: | Networking and communications |
Objective Division: | Information and Communication Services |
Objective Group: | Communication technologies, systems and services |
Objective Field: | Communication technologies, systems and services not elsewhere classified |
UTAS Author: | Kim, T-H (Dr Tai Kim) |
ID Code: | 83094 |
Year Published: | 2012 |
Web of Science® Times Cited: | 2 |
Deposited By: | Information and Communication Technology |
Deposited On: | 2013-03-01 |
Last Modified: | 2018-03-27 |
Downloads: | 1 View Download Statistics |
Repository Staff Only: item control page