2014
DOI: 10.3923/jas.2014.2498.2506
|View full text |Cite
|
Sign up to set email alerts
|

Key Encryption Method for SCADA Security Enhancement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…ICS performs several operations as part of industries and basic there components such as control loop, human-machine interface (HMI) and diagnostics and maintenance applications, which mange the ICS operations [1], [2]. In paper [4], [5], [13], security mechanism using cryptograph algorithms has deployed to enhance the security of SCADA system and also gives directions for further developments. Key encryption is a time minimized security solution, while comparing with other encryption standards.…”
Section: Fig 1 Ics Network and Operationsmentioning
confidence: 99%
See 2 more Smart Citations
“…ICS performs several operations as part of industries and basic there components such as control loop, human-machine interface (HMI) and diagnostics and maintenance applications, which mange the ICS operations [1], [2]. In paper [4], [5], [13], security mechanism using cryptograph algorithms has deployed to enhance the security of SCADA system and also gives directions for further developments. Key encryption is a time minimized security solution, while comparing with other encryption standards.…”
Section: Fig 1 Ics Network and Operationsmentioning
confidence: 99%
“…Key encryption is a time minimized security solution, while comparing with other encryption standards. Time is a very important factor, which has been counted for SCADA system [13]. Therefore, key encryption solution is proposed to secure the SCADA communication with time acquirements in mind.…”
Section: Fig 1 Ics Network and Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The layers of the SPI model are SaaS, PaaS, and IaaS. The general architecture of the cloud is the authentication server, the user, and server [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…al., in [22] discussed wireless Local Area Network Security. The Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) encryption protocols are very common but they have some weaknesses [23,24]. The predictive judgment is an attack algorithm which is tailored to the atmosphere of cloud computing.…”
Section: Literature Reviewmentioning
confidence: 99%