DocumentCode :
32839
Title :
A layered encryption mechanism for networked critical infrastructures
Author :
Huayang Cao ; Peidong Zhu ; Xicheng Lu ; Gurtov, Andrei
Author_Institution :
Nat. Univ. of Defense Technol., Changsha, China
Volume :
27
Issue :
1
fYear :
2013
fDate :
January-February 2013
Firstpage :
12
Lastpage :
18
Abstract :
Networked critical infrastructures improve our lives, but they are attractive targets for adversaries. In such infrastructures, to secure sensitive data is vital, as the information system is a foundation of today¿s critical infrastructures, and data security is a main concern in such systems. Cryptography is an approach for data security, but this method should be altered according to various features of infrastructure networks. Since complex and distributed critical infrastructures usually spread over large geographic areas, different parts of those infrastructures have different levels of perimeter defense. Devices in weakly protected zones are more likely to be captured than those in well protected zones. If an adversary captures devices, s/he can bypass cyber security measures and obtain secret information directly. Such a threat requires a layered security mechanism that can prevent adversaries from invading the whole infrastructure network from these weak zones. In this article, we propose a layered encryption mechanism based on hash chain technology for protecting sensitive data. Besides showing the layered defense, the mechanism is also lightweight and has convenient key management. It can be used independently or as a supplement to existing security measures. We evaluate performance of the proposed mechanism over different kinds of devices.
Keywords :
critical infrastructures; cryptography; data privacy; distributed processing; adversary captures devices; bypass cyber security measures; convenient key management; cryptography; data security; distributed critical infrastructures; hash chain technology; information system; large geographic areas; layered encryption mechanism; layered security mechanism; networked critical infrastructures; perimeter defense; secret information; security measurement; sensitive data protection; sensitive data secure; Authentication; Computer security; Encryption; Logic gates; Network security; Performance evaluation;
fLanguage :
English
Journal_Title :
Network, IEEE
Publisher :
ieee
ISSN :
0890-8044
Type :
jour
DOI :
10.1109/MNET.2013.6423186
Filename :
6423186
Link To Document :
بازگشت