eCite Digital Repository

Applying encryption schemed to supervisory control and data acquisition systems for security management


Kim, T-H, Applying encryption schemed to supervisory control and data acquisition systems for security management, African Journal of Business Management, 7, (24) pp. 2342-2351. ISSN 1993-8233 (2013) [Refereed Article]

Not available

Copyright Statement

Copyright 2013 Academic Journals

Official URL:


Supervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication in SCADA Systems. In the case of Symmetric key encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While in the case of Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These schemes can be integrated to SCADA communication for managing security level. In this paper, author compares Encryption Schemes as used in Communication between SCADA components to show the escalation of security level.

Item Details

Item Type:Refereed Article
Keywords:Supervisory Control and Data Acquisition, encryption, internet, communication, control system
Research Division:Information and Computing Sciences
Research Group:Cybersecurity and privacy
Research Field:Cryptography
Objective Division:Information and Communication Services
Objective Group:Communication technologies, systems and services
Objective Field:Communication technologies, systems and services not elsewhere classified
UTAS Author:Kim, T-H (Dr Tai Kim)
ID Code:89234
Year Published:2013
Deposited By:Information and Communication Technology
Deposited On:2014-02-27
Last Modified:2014-06-30

Repository Staff Only: item control page