首页 | 本学科首页   官方微博 | 高级检索  
     


Proposal strategies of key management for data encryption in SCADA network of electric power systems
Authors:DJ Kang  JJ Lee  BH Kim  D Hur
Affiliation:aKorea Electrotechnology Research Institute, Fusion Technology Research Lab., 665 Naeson2-dong, Uiwang-city, Gyeonggi-province 437-808, Republic of Korea;bHong-Ik University, School of Electronic and Electrical Engineering, 72-1 Sangsu-dong, Mapo-gu, Seoul 121-791, Republic of Korea;cKwangwoon University, Dept. of Electrical Engineering, Kwangwoon Rd. 26, Nowon-gu, Seoul 139-701, Republic of Korea
Abstract:SCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today’s global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well.
Keywords:Cyber security  Optimal key distribution period  Quality of service function  SCADA  Encryption
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号