메뉴 건너뛰기




Volumn 25, Issue 2, 2010, Pages 714-722

Efficient secure group communications for SCADA

Author keywords

Key management; Power system security; Supervisory control and data acquisition (SCADA) systems

Indexed keywords

BROADCAST COMMUNICATION; COMPUTATIONAL COSTS; INDUSTRIAL FACILITIES; KEY MANAGEMENT; MESSAGE BROADCASTING; MULTICAST COMMUNICATION; MULTICASTS; OPEN NETWORK; OPERATING ENVIRONMENT; POWER SYSTEM SECURITY; REMOTE TERMINAL UNITS; SECURE COMMUNICATIONS; SECURE GROUP COMMUNICATIONS; SUPERVISORY CONTROL AND DATA ACQUISITION;

EID: 77950187346     PISSN: 08858977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRD.2009.2036181     Document Type: Article
Times cited : (67)

References (23)
  • 1
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key management architecture for secure SCADA communications
    • Jul.
    • D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key management architecture for secure SCADA communications," IEEE Trans. Power Del., vol.24, no.3, pp. 1154-1163, Jul. 2009.
    • (2009) IEEE Trans. Power Del. , vol.24 , Issue.3 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4
  • 4
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups: Using one-way function trees
    • May
    • D. A. McGrew and A. T. Sherman, "Key establishment in large dynamic groups: Using one-way function trees," IEEE Trans. Softw. Eng., vol.29, no.5, pp. 444-458, May 2003.
    • (2003) IEEE Trans. Softw. Eng. , vol.29 , Issue.5 , pp. 444-458
    • McGrew, D.A.1    Sherman, A.T.2
  • 5
  • 6
    • 18944405526 scopus 로고    scopus 로고
    • Key management for large dynamic groups: One-way function trees and amortized initialization
    • D. M. Balenson, D. A. McGrew, and A. T. Sherman, "Key management for large dynamic groups: One-way function trees and amortized initialization, " in IETF Internet Draft, 2000.
    • (2000) IETF Internet Draft
    • Balenson, D.M.1    McGrew, D.A.2    Sherman, A.T.3
  • 7
    • 77950188641 scopus 로고    scopus 로고
    • Cryptographic protection of SCADA communications part 1: Background
    • Draft 5 revision 3 Amer. Gas Assoc. [Online]. Available
    • Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan, Technical Report 12-21 Draft 5 revision 3 Amer. Gas Assoc., 2005. [Online]. Available: http://www.gtiservice. org/security/
    • (2005) Policies and Test Plan, Technical Report , pp. 12-21
  • 8
    • 0242414397 scopus 로고    scopus 로고
    • Key management approaches to offer data confidentiality for secure multicast
    • Sep./Oct.
    • K. C. Chan and S. H. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Netw. Commun. Lett., vol.17, no.5, pp. 30-39, Sep./Oct. 2003.
    • (2003) IEEE Netw. Commun. Lett. , vol.17 , Issue.5 , pp. 30-39
    • Chan, K.C.1    Chan, S.H.2
  • 10
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proc. ACM SIGCOMM, 1997, pp. 277-288
    • (1997) Proc. ACM SIGCOMM , pp. 277-288
    • Mittra, S.1
  • 11
    • 77950189421 scopus 로고    scopus 로고
    • A framework for group key management for multicast security
    • T. Hardjono, B. Cain, and B. Doraswamy, "A framework for group key management for multicast security," in IETF Internet Draft, 2001.
    • (2001) IETF Internet Draft
    • Hardjono, T.1    Cain, B.2    Doraswamy, B.3
  • 12
    • 0034838199 scopus 로고    scopus 로고
    • ELK, a new protocol for efficient large group key distribution
    • A. Perrig, D. Song, and J. D. Tygar, "ELK, a new protocol for efficient large group key distribution," in Proc. IEEE Symp. Security Privacy, 2001, pp. 247-262.
    • (2001) Proc. IEEE Symp. Security Privacy , pp. 247-262
    • Perrig, A.1    Song, D.2    Tygar, J.D.3
  • 13
    • 84957692171 scopus 로고    scopus 로고
    • From differential cryptanalysis to ciphertext- only attacks
    • A. Biryukov and E. Kushilevitz, "From differential cryptanalysis to ciphertext- only attacks," in Proc. CRYPTO, 1998, pp. 72-88.
    • (1998) Proc. CRYPTO , pp. 72-88
    • Biryukov, A.1    Kushilevitz, E.2
  • 14
    • 51249173191 scopus 로고
    • One-way functions and pseudorandom generators
    • L. A. Levin, "One-way functions and pseudorandom generators," Combinatorica, vol.7, no.4, pp. 357-363, 1987.
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 357-363
    • Levin, L.A.1
  • 15
    • 32244432466 scopus 로고    scopus 로고
    • Attack on the sun-chen-hwang's threeparty key agreement protocols using passwords
    • Jan.
    • J. Nam, S. Kim, and D. Won, "Attack on the sun-chen-hwang's threeparty key agreement protocols using passwords," IEICE Trans. Fundamentals, vol.E89-A, no.1, pp. 1154-1163, Jan. 2006.
    • (2006) IEICE Trans. Fundamentals , vol.E89-A , Issue.1 , pp. 1154-1163
    • Nam, J.1    Kim, S.2    Won, D.3
  • 17
    • 19744369256 scopus 로고    scopus 로고
    • DDH-Based group key agreement in a mobile environment
    • Oct.
    • J. Nam, J. Lee, S. Kim, and D.Won, "DDH-Based group key agreement in a mobile environment," J. Syst. Softw., vol.78, no.1, pp. 73-83, Oct. 2005.
    • (2005) J. Syst. Softw. , vol.78 , Issue.1 , pp. 73-83
    • Nam, J.1    Lee, J.2    Kim, S.3    Won, D.4
  • 19
    • 24944459002 scopus 로고    scopus 로고
    • An efficient dynamic group key agreement for low-power mobile devices
    • Singapore, May
    • S. Cho, J. Nam, S. Kim, and D.Won, "An efficient dynamic group key agreement for low-power mobile devices," in Proc. Int. Conf. Computational Science Applications, Singapore, May 2005, pp. 498-507.
    • (2005) Proc. Int. Conf. Computational Science Applications , pp. 498-507
    • Cho, S.1    Nam, J.2    Kim, S.3    Won, D.4
  • 23
    • 77950189298 scopus 로고    scopus 로고
    • [Online]. Available
    • SCADA Applications Data Flow Systems. [Online]. Available: http:// www.dataflowsys.com/services/scada-applications.php
    • SCADA Applications Data Flow Systems


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.