Title :
Protecting IP-based SCADA System with Crossed-Cipher Scheme
Author :
Balitanas, Maricel ; Robles, Rosslin John ; Caytiles, Ronnie ; Gelogo, Yvette ; Kim, Tai-Hoon
Abstract :
To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.
Keywords :
IP networks; SCADA systems; control engineering computing; data integrity; message authentication; public key cryptography; AES; IP-based SCADA system protection; advanced encryption standard; asymmetric ECC; authentication issues; confidentiality issues; crossed-cipher scheme; elliptic curve cryptography; integrity issues; nonrepudiation issues; Multimedia communication; Multimedia computing; Ubiquitous computing; Asymmetric; Cipher; SCADA; Symmetric;
Conference_Titel :
Ubiquitous Computing and Multimedia Applications (UCMA), 2011 International Conference on
Conference_Location :
Daejeon
Print_ISBN :
978-1-4577-0571-7
DOI :
10.1109/UCMA.2011.35