메뉴 건너뛰기




Volumn , Issue , 2008, Pages 156-161

Cryptographic key management for SCADA systems - Issues and perspectives

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC KEY MANAGEMENT; INFORMATION SECURITY; INTERNATIONAL CONFERENCES;

EID: 51349131393     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISA.2008.77     Document Type: Conference Paper
Times cited : (38)

References (42)
  • 1
    • 33847400141 scopus 로고    scopus 로고
    • 1st ed, John Wiley & Sons, November, ISBN 0764597876, pp
    • st ed.), John Wiley & Sons, November 2005, ISBN 0764597876, pp. 1-22.
    • (2005) Securing Scada Systems , pp. 1-22
    • Rrutz, R.L.1
  • 2
    • 57649124790 scopus 로고    scopus 로고
    • Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems
    • US General Accounting Office, GAO-04-354, 2004
    • US General Accounting Office, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report to Congress, GAO-04-354, 2004.
    • Report to Congress
  • 3
    • 51349108057 scopus 로고    scopus 로고
    • Power system control & associated communications - Data & communication security
    • IEC International Electrotechnical Commission
    • IEC (International Electrotechnical Commission), Power system control & associated communications - Data & communication security, IEC62351 part 1 to 7, Technical Specification, 2007.
    • (2007) to 7, Technical Specification , vol.IEC62351 , Issue.PART 1
  • 5
    • 51249195967 scopus 로고    scopus 로고
    • IT Security techniques - Key management
    • IEC/ISO
    • IEC/ISO, IT Security techniques - Key management, IEC/ISO11770, International Standard.
    • IEC/ISO11770, International Standard
  • 8
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. Needham, M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers" Communications of the ACM, Vol. 21, pp. 993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 9
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • G. Lowe, "An attack on the Needham-Schroeder public key authentication protocol", Information Processing Letters, vol. 56(3), pp. 131-136, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 10
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • B. C. Neuman, Theodore Ts'o, "Kerberos: An Authentication Service for Computer Networks", IEEE Communications, volume 32/9, pp33-38, 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 12
    • 51349147794 scopus 로고    scopus 로고
    • IEC/ISO, IT - Security techniques - Entity authentication, IEC/ISO9798-5:2004, International Standard.
    • IEC/ISO, IT - Security techniques - Entity authentication, IEC/ISO9798-5:2004, International Standard.
  • 13
    • 51349154429 scopus 로고    scopus 로고
    • ITU (International Telecommunication Union), Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, ITU-T Recommendation X.509, 2005.
    • ITU (International Telecommunication Union), "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework", ITU-T Recommendation X.509, 2005.
  • 15
  • 18
    • 51349143333 scopus 로고    scopus 로고
    • Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures
    • San Francisco, USA
    • B. Kaliski, "Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures", Proc. RSA Conference, San Francisco, USA, 2007.
    • (2007) Proc. RSA Conference
    • Kaliski, B.1
  • 20
    • 51349114895 scopus 로고    scopus 로고
    • Secure DNP3 specifications
    • DNP User Group
    • DNP User Group, Secure DNP3 specifications, DNP User Group Library (www.dnp.org), 2007.
    • (2007) DNP User Group Library
  • 21
    • 51349107593 scopus 로고    scopus 로고
    • Learning from European Advanced Metering Deployments
    • June
    • J. Lund, "Learning from European Advanced Metering Deployments", Utility Automation & Engineering June 2007
    • (2007) Utility Automation & Engineering
    • Lund, J.1
  • 23
    • 51349083426 scopus 로고    scopus 로고
    • Key Management and Cryptography for Advanced Metering Infrastructures (AMI) and Other Large, Low Power Networks
    • Miami
    • G. Gilchrist & D. Highfill, "Key Management and Cryptography for Advanced Metering Infrastructures (AMI) and Other Large, Low Power Networks", Proc. of the S4 2008 Conference, Miami, 2008.
    • (2008) Proc. of the S4 2008 Conference
    • Gilchrist, G.1    Highfill, D.2
  • 24
    • 17744384943 scopus 로고    scopus 로고
    • Key management for SCADA
    • Technical Report SAND2001-3252, Sandia National Laboratories
    • C. Beaver, D. Gallup, W. Neumann & Torgerson M., "Key management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories, 2002.
    • (2002)
    • Beaver, C.1    Gallup, D.2    Neumann, W.3    Torgerson, M.4
  • 28
    • 51349104530 scopus 로고    scopus 로고
    • ECRYPT (European Network of Excellence in Cryptology), ECRYPT Yearly Report on Algorithms and Keysizes (D.SPA.10), ECRYPT IST European Project, 2005.
    • ECRYPT (European Network of Excellence in Cryptology), ECRYPT Yearly Report on Algorithms and Keysizes (D.SPA.10), ECRYPT IST European Project, 2005.
  • 29
    • 84948990367 scopus 로고
    • How to Explain Zero-Knowledge Protocols to Your Children
    • Springer, pp
    • Jean-Jacques Quisquater, Louis C. Guillou, Thomas A. Berson, "How to Explain Zero-Knowledge Protocols to Your Children", Proc. of Crypto '89, Springer, pp.628-631, 1990.
    • (1990) Proc. of Crypto '89 , pp. 628-631
    • Quisquater, J.-J.1    Guillou, L.C.2    Berson, T.A.3
  • 30
    • 0009582826 scopus 로고    scopus 로고
    • The SRP Authentication and Key Exchange System
    • IETF
    • T. Wu, "The SRP Authentication and Key Exchange System", Request for Comments (RFC) 2945, IETF, 2000.
    • (2000) Request for Comments (RFC) 2945
    • Wu, T.1
  • 32
    • 0037056208 scopus 로고    scopus 로고
    • Achievement of secure Internet access to fieldbus systems
    • Elsevier
    • T. Sauter and Ch. Schwaiger, "Achievement of secure Internet access to fieldbus systems", Microprocessors and Microsystems Journal, Elsevier, Vol. 26, Issue 7, 2002.
    • (2002) Microprocessors and Microsystems Journal , vol.26 , Issue.7
    • Sauter, T.1    Schwaiger, C.2
  • 35
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • IEEE CS
    • A. Perrig, R. Canetti, J. Tygar & D. Song, "Efficient authentication and signing of multicast streams over lossy channels", Proc. of the IEEE S&P Symp., IEEE CS, 2000.
    • (2000) Proc. of the IEEE S&P Symp
    • Perrig, A.1    Canetti, R.2    Tygar, J.3    Song, D.4
  • 36
    • 51349086981 scopus 로고    scopus 로고
    • sSCADA: Securing SCADA Infrastructure Communications
    • Y. Wang, B. Chu, "sSCADA: Securing SCADA Infrastructure Communications", IACR Eprint, 2004.
    • (2004) IACR Eprint
    • Wang, Y.1    Chu, B.2
  • 39
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing", Proc. of CRYPTO'01, Springer, 2001.
    • (2001) Proc. of CRYPTO'01
    • Boneh, D.1    Franklin, M.2
  • 40
    • 34250659309 scopus 로고    scopus 로고
    • Key management for long-lived sensor networks in hostile environments
    • M. Chorzempa, J-M. Park, M.Eltoweissy, "Key management for long-lived sensor networks in hostile environments", ACM Computer Communications, Volume 30, Issue 9, pp. 1964-1979, 2007.
    • (2007) ACM Computer Communications , vol.30 , Issue.9 , pp. 1964-1979
    • Chorzempa, M.1    Park, J.-M.2    Eltoweissy, M.3
  • 41
    • 34247224664 scopus 로고    scopus 로고
    • Key distribution mechanisms for wireless sensor networks: A survey
    • Technical Report 05-07, Rensselaer Polytechnic Institute
    • A. Camtepe, B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey", Technical Report 05-07, Rensselaer Polytechnic Institute, 2005.
    • (2005)
    • Camtepe, A.1    Yener, B.2
  • 42
    • 51249195966 scopus 로고    scopus 로고
    • Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
    • Springer
    • C. Alcaraz & R. Roman, "Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios", Proceedings of CRITIS'06 Conference, Springer, 2006.
    • (2006) Proceedings of CRITIS'06 Conference
    • Alcaraz, C.1    Roman, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.