메뉴 건너뛰기




Volumn 29, Issue 2, 2013, Pages 281-298

Hybrid key management architecture for robust SCADA systems

Author keywords

Cryptography; Key management; Power system security; Protocol; SCADA systems

Indexed keywords

CRYPTOGRAPHIC SECURITY; HYBRID KEY MANAGEMENT; KEY MANAGEMENT; KEY MANAGEMENT SCHEMES; OPEN NETWORK; POWER SYSTEM SECURITY; SYSTEM SECURITY; TERMINAL UNITS;

EID: 84876252922     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (15)

References (28)
  • 4
    • 77950189421 scopus 로고    scopus 로고
    • A framework for group key management for multicast security
    • T. Hardjono, B. Cain, and B. Doraswamy, "A framework for group key management for multicast security, " IETF Internet Draft, 2001.
    • (2001) IETF Internet Draft
    • Hardjono, T.1    Cain, B.2    Doraswamy, B.3
  • 11
    • 84876222909 scopus 로고    scopus 로고
    • Communication Technologies, "Supervisory control and data acquisition (SCADA) systems
    • Communication Technologies, "Supervisory control and data acquisition (SCADA) systems, " NCS Technical Information Bulletin 04-1, 2004.
    • (2004) NCS Technical Information Bulletin 04-1
  • 12
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key management architecture for secure SCADA communications
    • D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key management architecture for secure SCADA communications, " IEEE Transactions on Power Delivery, Vol. 24, 2009, pp. 1154-1163.
    • (2009) IEEE Transactions on Power Delivery , vol.24 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4
  • 15
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method of obtaining digital signature and public key cryptosystem, " Communications of the ACM, Vol. 21, 1978, pp. 120- 126. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 18
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • LNCS, Vol. 950
    • M. Burmester and T. Desmedt, "A secure and efficient conference key distribution system, " in Proceedings of EUROCRYPT '94, LNCS, Vol. 950, 1995, pp. 275-286.
    • (1995) Proceedings of EUROCRYPT '94 , pp. 275-286
    • Burmester, M.1    Desmedt, T.2
  • 19
    • 24944449952 scopus 로고    scopus 로고
    • An authenticated group key agreement for wireless networks
    • NET37-4, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
    • C. H. Tan and J. C. M. Teo, "An authenticated group key agreement for wireless networks, " in Proceedings of IEEE Wireless Communications and Networking Conference, Vol. 4, 2005, pp. 2100-2105. (Pubitemid 41310820)
    • (2005) IEEE Wireless Communications and Networking Conference, WCNC , vol.4 , pp. 2100-2105
    • Tan, C.H.1    Teo, J.C.M.2
  • 23
    • 80052113604 scopus 로고    scopus 로고
    • Proposal strategies of key management for data encryption in SCADA network of electric power systems
    • D. J. Kang, J. J. Lee, B. H. Kim, and D. Hur, "Proposal strategies of key management for data encryption in SCADA network of electric power systems, " International Journal of Electrical Power and Energy Systems, Vol. 33, 2011, pp. 1521- 1526.
    • (2011) International Journal of Electrical Power and Energy Systems , vol.33 , pp. 1521-1526
    • Kang, D.J.1    Lee, J.J.2    Kim, B.H.3    Hur, D.4
  • 26
    • 84876221249 scopus 로고    scopus 로고
    • Cliques, http://sprout.ics.uci.edu/past-projects/cliques/download.html.
    • Cliques


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.