Proposal strategies of key management for data encryption in SCADA network of electric power systems |
| |
Authors: | DJ Kang JJ Lee BH Kim D Hur |
| |
Affiliation: | aKorea Electrotechnology Research Institute, Fusion Technology Research Lab., 665 Naeson2-dong, Uiwang-city, Gyeonggi-province 437-808, Republic of Korea;bHong-Ik University, School of Electronic and Electrical Engineering, 72-1 Sangsu-dong, Mapo-gu, Seoul 121-791, Republic of Korea;cKwangwoon University, Dept. of Electrical Engineering, Kwangwoon Rd. 26, Nowon-gu, Seoul 139-701, Republic of Korea |
| |
Abstract: | SCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today’s global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well. |
| |
Keywords: | Cyber security Optimal key distribution period Quality of service function SCADA Encryption |
本文献已被 ScienceDirect 等数据库收录! |
|