Loading…
Key management issue in SCADA networks: A review
Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs)...
Saved in:
Published in: | Engineering science and technology, an international journal an international journal, 2017-02, Vol.20 (1), p.354-363 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823 |
---|---|
cites | cdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823 |
container_end_page | 363 |
container_issue | 1 |
container_start_page | 354 |
container_title | Engineering science and technology, an international journal |
container_volume | 20 |
creator | Rezai, Abdalhossein Keshavarzi, Parviz Moravej, Zahra |
description | Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field. |
doi_str_mv | 10.1016/j.jestch.2016.08.011 |
format | article |
fullrecord | <record><control><sourceid>elsevier_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_25884d0b62f942d8b8874fd4d58c47e0</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S2215098616303482</els_id><doaj_id>oai_doaj_org_article_25884d0b62f942d8b8874fd4d58c47e0</doaj_id><sourcerecordid>S2215098616303482</sourcerecordid><originalsourceid>FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EElXpH7DIDyTYjp04LJCi8qqoxAJYW35MikObIDtQ9e9xCEKsWM1Lc2buReic4IxgUly0WQthMK8ZjVWGRYYJOUIzSglPcSWK4z_5KVqE0GKMSUUJ4cUM4Qc4JDvVqQ3soBsSF8IHJK5Lnpb1dZ10MOx7_xYukzrx8Olgf4ZOGrUNsPiJc_Rye_O8vE_Xj3erZb1ODSNiSG3ZaJpTwWzOhSoVxcIyTbTmpc3zkglaFkZzoKYQvIp1zq3NtWWWmnGaz9Fq4tpetfLdu53yB9krJ78bvd9I5QdntiApF_EO1gVtKkat0EKUrIkoLgwrAUcWm1jG9yF4aH55BMvRRNnKyUQ5miixkNHEuHY1rUHUGbV7GYyDzoB1HswQH3H_A74ACs95eA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Key management issue in SCADA networks: A review</title><source>ScienceDirect Journals</source><creator>Rezai, Abdalhossein ; Keshavarzi, Parviz ; Moravej, Zahra</creator><creatorcontrib>Rezai, Abdalhossein ; Keshavarzi, Parviz ; Moravej, Zahra</creatorcontrib><description>Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.</description><identifier>ISSN: 2215-0986</identifier><identifier>EISSN: 2215-0986</identifier><identifier>DOI: 10.1016/j.jestch.2016.08.011</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Critical infrastructure security ; Key management scheme ; Network security ; Power system security ; SCADA network</subject><ispartof>Engineering science and technology, an international journal, 2017-02, Vol.20 (1), p.354-363</ispartof><rights>2016 Karabuk University</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</citedby><cites>FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S2215098616303482$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,3549,27924,27925,45780</link.rule.ids></links><search><creatorcontrib>Rezai, Abdalhossein</creatorcontrib><creatorcontrib>Keshavarzi, Parviz</creatorcontrib><creatorcontrib>Moravej, Zahra</creatorcontrib><title>Key management issue in SCADA networks: A review</title><title>Engineering science and technology, an international journal</title><description>Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.</description><subject>Critical infrastructure security</subject><subject>Key management scheme</subject><subject>Network security</subject><subject>Power system security</subject><subject>SCADA network</subject><issn>2215-0986</issn><issn>2215-0986</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNp9kMtOwzAQRS0EElXpH7DIDyTYjp04LJCi8qqoxAJYW35MikObIDtQ9e9xCEKsWM1Lc2buReic4IxgUly0WQthMK8ZjVWGRYYJOUIzSglPcSWK4z_5KVqE0GKMSUUJ4cUM4Qc4JDvVqQ3soBsSF8IHJK5Lnpb1dZ10MOx7_xYukzrx8Olgf4ZOGrUNsPiJc_Rye_O8vE_Xj3erZb1ODSNiSG3ZaJpTwWzOhSoVxcIyTbTmpc3zkglaFkZzoKYQvIp1zq3NtWWWmnGaz9Fq4tpetfLdu53yB9krJ78bvd9I5QdntiApF_EO1gVtKkat0EKUrIkoLgwrAUcWm1jG9yF4aH55BMvRRNnKyUQ5miixkNHEuHY1rUHUGbV7GYyDzoB1HswQH3H_A74ACs95eA</recordid><startdate>201702</startdate><enddate>201702</enddate><creator>Rezai, Abdalhossein</creator><creator>Keshavarzi, Parviz</creator><creator>Moravej, Zahra</creator><general>Elsevier B.V</general><general>Elsevier</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>201702</creationdate><title>Key management issue in SCADA networks: A review</title><author>Rezai, Abdalhossein ; Keshavarzi, Parviz ; Moravej, Zahra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Critical infrastructure security</topic><topic>Key management scheme</topic><topic>Network security</topic><topic>Power system security</topic><topic>SCADA network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rezai, Abdalhossein</creatorcontrib><creatorcontrib>Keshavarzi, Parviz</creatorcontrib><creatorcontrib>Moravej, Zahra</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Directory of Open Access Journals</collection><jtitle>Engineering science and technology, an international journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rezai, Abdalhossein</au><au>Keshavarzi, Parviz</au><au>Moravej, Zahra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Key management issue in SCADA networks: A review</atitle><jtitle>Engineering science and technology, an international journal</jtitle><date>2017-02</date><risdate>2017</risdate><volume>20</volume><issue>1</issue><spage>354</spage><epage>363</epage><pages>354-363</pages><issn>2215-0986</issn><eissn>2215-0986</eissn><abstract>Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.jestch.2016.08.011</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2215-0986 |
ispartof | Engineering science and technology, an international journal, 2017-02, Vol.20 (1), p.354-363 |
issn | 2215-0986 2215-0986 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_25884d0b62f942d8b8874fd4d58c47e0 |
source | ScienceDirect Journals |
subjects | Critical infrastructure security Key management scheme Network security Power system security SCADA network |
title | Key management issue in SCADA networks: A review |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T05%3A08%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Key%20management%20issue%20in%20SCADA%20networks:%20A%20review&rft.jtitle=Engineering%20science%20and%20technology,%20an%20international%20journal&rft.au=Rezai,%20Abdalhossein&rft.date=2017-02&rft.volume=20&rft.issue=1&rft.spage=354&rft.epage=363&rft.pages=354-363&rft.issn=2215-0986&rft.eissn=2215-0986&rft_id=info:doi/10.1016/j.jestch.2016.08.011&rft_dat=%3Celsevier_doaj_%3ES2215098616303482%3C/elsevier_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |