메뉴 건너뛰기




Volumn 24, Issue 3, 2009, Pages 1154-1163

Advanced key-management architecture for secure SCADA communications

Author keywords

Key management; Power system security; Supervisory control and data acquisition (SCADA) systems

Indexed keywords

HIGH-POWER; KEY MANAGEMENT; LOW POWER; MESSAGE BROADCASTING; NATIONAL INFRASTRUCTURE; OPEN NETWORK; OPERATING ENVIRONMENT; PERFORMANCE BOTTLENECKS; POWER SYSTEM SECURITY; SECURE COMMUNICATIONS; SECURITY REQUIREMENTS; SUPERVISORY CONTROL; SUPERVISORY CONTROL AND DATA-ACQUISITION (SCADA) SYSTEMS;

EID: 67650661171     PISSN: 08858977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRD.2008.2005683     Document Type: Article
Times cited : (83)

References (21)
  • 1
    • 49949083521 scopus 로고    scopus 로고
    • DNP Users Group, Mar. 2005, Online, Available
    • C. Ken, "A DNP3 protocol primer," DNP Users Group, Mar. 2005. [Online]. Available: http://www.dnp.org/About/DNP3%20Primer%20Rev%20A.pdf
    • A DNP3 protocol primer
    • Ken, C.1
  • 3
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADA networks
    • M. I. Vinay, A. L. Sean, and D. W. Ronald, "Security issues in SCADA networks," Comput. Security, vol. 25, pp. 498-506, 2006.
    • (2006) Comput. Security , vol.25 , pp. 498-506
    • Vinay, M.I.1    Sean, A.L.2    Ronald, D.W.3
  • 5
    • 67650658956 scopus 로고    scopus 로고
    • Integrating electronic security into the manufacturing and control systems environment, Instrum. Syst. Autom. Soc., Research Triangle Park, NC, ANSI/ISA-TR99.00.02-2004, 2007.
    • "Integrating electronic security into the manufacturing and control systems environment," Instrum. Syst. Autom. Soc., Research Triangle Park, NC, ANSI/ISA-TR99.00.02-2004, 2007.
  • 6
    • 78649562070 scopus 로고    scopus 로고
    • Nat. Inst. Standards Technol, Gaithersburg, MD, Online, Available
    • "System protection profile - industrial control systems v1.0," Nat. Inst. Standards Technol., Gaithersburg, MD, 2004. [Online]. Available: http://www.isd.mel.nist.gov/projects/processcontrol/SPP-ICSv1.0.pdf
    • (2004) System protection profile - industrial control systems v1.0
  • 8
    • 45749134261 scopus 로고    scopus 로고
    • Washington, DC: American Petroleum Inst
    • API 1164: Pipeline SCADA Security. Washington, DC: American Petroleum Inst., 2004.
    • (2004) API 1164: Pipeline SCADA Security
  • 9
    • 67650690751 scopus 로고    scopus 로고
    • Cryptographic protection of SCADA communications Part 1: Background, policies and test plan. Amer. Gas Assoc., 2005. [Online]. Available: http://www.gtiservice.org/security/
    • "Cryptographic protection of SCADA communications Part 1: Background, policies and test plan. Amer. Gas Assoc., 2005. [Online]. Available: http://www.gtiservice.org/security/
  • 10
    • 67650699406 scopus 로고    scopus 로고
    • Cryptographic protection of SCADA communications; Part 2: Retrofit link encryption for asynchronous serial communications, American Gas Assoc., 2005., AGA Rep. (Part 2), Draft.
    • "Cryptographic protection of SCADA communications; Part 2: Retrofit link encryption for asynchronous serial communications," American Gas Assoc., 2005., AGA Rep. (Part 2), Draft.
  • 12
    • 67650685124 scopus 로고    scopus 로고
    • D. Robert, B. Colin, D. Ed, and M. G. N. Juan, SKMA a key management architecture for SCADA systems, in Proc. 4th Australasian Information Security Workshop, 2006, 54, pp. 138-192.
    • D. Robert, B. Colin, D. Ed, and M. G. N. Juan, "SKMA a key management architecture for SCADA systems," in Proc. 4th Australasian Information Security Workshop, 2006, vol. 54, pp. 138-192.
  • 14
    • 0242414397 scopus 로고    scopus 로고
    • Key management approaches to offer data confidentiality for secure multicast
    • Sep./Oct
    • K.-C. Chan and S.-H. G. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Netw., vol. 17, no. 5, pp. 30-39, Sep./Oct. 2003.
    • (2003) IEEE Netw , vol.17 , Issue.5 , pp. 30-39
    • Chan, K.-C.1    Chan, S.-H.G.2
  • 16
    • 67650693903 scopus 로고    scopus 로고
    • Logical key hierachy protocol
    • Task Force, Online, Available
    • H. Harney and E. Harder, "Logical key hierachy protocol," Internet Eng. Task Force, 1999. [Online]. Available: http://tools.ietf.org/html/draft-harney-sparta-lkhp-sec-00
    • (1999) Internet Eng
    • Harney, H.1    Harder, E.2
  • 17
    • 0000636954 scopus 로고    scopus 로고
    • The Versakey framework: Versatile group key management
    • Sep
    • M. Waldvogel, "The Versakey framework: Versatile group key management," IEEE J. Sel. Areas Commun., vol. 17, no. 9, pp. 1614-1631, Sep. 1999.
    • (1999) IEEE J. Sel. Areas Commun , vol.17 , Issue.9 , pp. 1614-1631
    • Waldvogel, M.1
  • 19
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A framework for scalable secure multicasting," Proc. ACM SIGCOMM, pp. 277-88, 1997.
    • (1997) Proc. ACM SIGCOMM , pp. 277-288
    • Mittra, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.