Attributes | Values |
---|
rdf:type
| |
rdfs:seeAlso
| |
Description
| - SCADA historically is responsible for monitoring and controlling critical infrastructures and manufacturing processes in an isolated environment. But with the requirement of a timely access of information for making decisions, large and modern companies being in a geographically diverse location take advantage of the internet as an important communication channel to allow the exchange of data. However, with SCADA being in the internet raise the issue of security. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack heighten. With the posted threats and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented. To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues
- SCADA historically is responsible for monitoring and controlling critical infrastructures and manufacturing processes in an isolated environment. But with the requirement of a timely access of information for making decisions, large and modern companies being in a geographically diverse location take advantage of the internet as an important communication channel to allow the exchange of data. However, with SCADA being in the internet raise the issue of security. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack heighten. With the posted threats and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented. To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues (en)
|
Title
| - Cipher for Internet-based Supervisory Control and Data Acquisition Architecture
- Cipher for Internet-based Supervisory Control and Data Acquisition Architecture (en)
|
skos:prefLabel
| - Cipher for Internet-based Supervisory Control and Data Acquisition Architecture
- Cipher for Internet-based Supervisory Control and Data Acquisition Architecture (en)
|
skos:notation
| - RIV/00216305:26230/11:PU97873!RIV12-MPO-26230___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...iv/cisloPeriodika
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/11:PU97873
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - SCADA, crossed cipher scheme, AES, ECC (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...odStatuVydavatele
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/nazevZdroje
| - Journal of Security Engineering
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...v/svazekPeriodika
| |
http://linked.open...iv/tvurceVysledku
| - Balitanas, Maricel
- Drahanský, Martin
|
issn
| |
number of pages
| |
http://localhost/t...ganizacniJednotka
| |