2022
DOI: 10.3390/sym14081625
|View full text |Cite
|
Sign up to set email alerts
|

A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks

Abstract: Supervisory Control and Data Acquisition (SCADA) systems are ubiquitous in industrial control processes, such as power grids, water supply systems, traffic control, oil and natural gas mining, space stations and nuclear plants. However, their security faces the threat of being compromised due to the increasing use of open-access networks. Furthermore, one of the research gaps involves the emergence of quantum computing, which has exposed a new type of risk to SCADA systems. Failure to secure SCADA systems can … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…In the comparison results, Reputation and its update accuracy, Effective recommendation rate (ERR), malicious user detection rate (MDR), time elapsed for the key generation and throughput for the proposed method is compared with the various existing methods such as CCRM (Lin et al, 2017), harmony (Shen & Liu, 2014), RP-CRM (Lin et al, 2014), ARTSense (Wang et al, 2013), QK-GRID (Arul et al, 2019), SKMA (Ghosh, 2019), EPPDR (Treacy & McCaffery, 2016), and TEES (Sowjanya et al, 2019). The comparative results are shown in the following figures.…”
Section: Comparison Resultsmentioning
confidence: 99%
“…In the comparison results, Reputation and its update accuracy, Effective recommendation rate (ERR), malicious user detection rate (MDR), time elapsed for the key generation and throughput for the proposed method is compared with the various existing methods such as CCRM (Lin et al, 2017), harmony (Shen & Liu, 2014), RP-CRM (Lin et al, 2014), ARTSense (Wang et al, 2013), QK-GRID (Arul et al, 2019), SKMA (Ghosh, 2019), EPPDR (Treacy & McCaffery, 2016), and TEES (Sowjanya et al, 2019). The comparative results are shown in the following figures.…”
Section: Comparison Resultsmentioning
confidence: 99%
“…Recognizing that the maturation of quantum computers in particular poses a significant risk for successful SCADA attacks, Sampalli and co-workers have developed and modelled a protocol based upon BB84 as a defense against quantum computer-based cyberattacks. [284] Moreover, sensor networks have been proposed to ensure efficient and safe operations within nuclear power plants, including wireless sensors, [285] optical fiber sensors, [286] and quantum sensors. [7a,287] As quantum sensors in particular become more widespread within nuclear power plants, quantum networking between sensors will become increasingly useful.…”
Section: Quantum Networking For Nuclear Energymentioning
confidence: 99%
“…Recognizing that the maturation of quantum computers in particular poses a significant risk for successful SCADA attacks, Sampalli and co‐workers have developed and modelled a protocol based upon BB84 as a defense against quantum computer‐based cyberattacks. [ 284 ]…”
Section: Quantum Networking For Energy Applicationsmentioning
confidence: 99%
“…This is because key generation and distribution in a cryptographic scheme may result in a security breach when SM data is transmitted through data networks [ 8 , 9 ]. To deal with this scenario, research efforts have been focused on privacy of information, security issues and countermeasures, see [ 10 , 11 , 12 , 13 , 14 ] and reference therein. In this sense, the research effort to secure public-key encryption schemes against classical computing attacks is worth mentioning.…”
Section: Introductionmentioning
confidence: 99%