Loading…

Key management issue in SCADA networks: A review

Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs)...

Full description

Saved in:
Bibliographic Details
Published in:Engineering science and technology, an international journal an international journal, 2017-02, Vol.20 (1), p.354-363
Main Authors: Rezai, Abdalhossein, Keshavarzi, Parviz, Moravej, Zahra
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823
cites cdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823
container_end_page 363
container_issue 1
container_start_page 354
container_title Engineering science and technology, an international journal
container_volume 20
creator Rezai, Abdalhossein
Keshavarzi, Parviz
Moravej, Zahra
description Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.
doi_str_mv 10.1016/j.jestch.2016.08.011
format article
fullrecord <record><control><sourceid>elsevier_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_25884d0b62f942d8b8874fd4d58c47e0</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S2215098616303482</els_id><doaj_id>oai_doaj_org_article_25884d0b62f942d8b8874fd4d58c47e0</doaj_id><sourcerecordid>S2215098616303482</sourcerecordid><originalsourceid>FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EElXpH7DIDyTYjp04LJCi8qqoxAJYW35MikObIDtQ9e9xCEKsWM1Lc2buReic4IxgUly0WQthMK8ZjVWGRYYJOUIzSglPcSWK4z_5KVqE0GKMSUUJ4cUM4Qc4JDvVqQ3soBsSF8IHJK5Lnpb1dZ10MOx7_xYukzrx8Olgf4ZOGrUNsPiJc_Rye_O8vE_Xj3erZb1ODSNiSG3ZaJpTwWzOhSoVxcIyTbTmpc3zkglaFkZzoKYQvIp1zq3NtWWWmnGaz9Fq4tpetfLdu53yB9krJ78bvd9I5QdntiApF_EO1gVtKkat0EKUrIkoLgwrAUcWm1jG9yF4aH55BMvRRNnKyUQ5miixkNHEuHY1rUHUGbV7GYyDzoB1HswQH3H_A74ACs95eA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Key management issue in SCADA networks: A review</title><source>ScienceDirect Journals</source><creator>Rezai, Abdalhossein ; Keshavarzi, Parviz ; Moravej, Zahra</creator><creatorcontrib>Rezai, Abdalhossein ; Keshavarzi, Parviz ; Moravej, Zahra</creatorcontrib><description>Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.</description><identifier>ISSN: 2215-0986</identifier><identifier>EISSN: 2215-0986</identifier><identifier>DOI: 10.1016/j.jestch.2016.08.011</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Critical infrastructure security ; Key management scheme ; Network security ; Power system security ; SCADA network</subject><ispartof>Engineering science and technology, an international journal, 2017-02, Vol.20 (1), p.354-363</ispartof><rights>2016 Karabuk University</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</citedby><cites>FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S2215098616303482$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,3549,27924,27925,45780</link.rule.ids></links><search><creatorcontrib>Rezai, Abdalhossein</creatorcontrib><creatorcontrib>Keshavarzi, Parviz</creatorcontrib><creatorcontrib>Moravej, Zahra</creatorcontrib><title>Key management issue in SCADA networks: A review</title><title>Engineering science and technology, an international journal</title><description>Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.</description><subject>Critical infrastructure security</subject><subject>Key management scheme</subject><subject>Network security</subject><subject>Power system security</subject><subject>SCADA network</subject><issn>2215-0986</issn><issn>2215-0986</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNp9kMtOwzAQRS0EElXpH7DIDyTYjp04LJCi8qqoxAJYW35MikObIDtQ9e9xCEKsWM1Lc2buReic4IxgUly0WQthMK8ZjVWGRYYJOUIzSglPcSWK4z_5KVqE0GKMSUUJ4cUM4Qc4JDvVqQ3soBsSF8IHJK5Lnpb1dZ10MOx7_xYukzrx8Olgf4ZOGrUNsPiJc_Rye_O8vE_Xj3erZb1ODSNiSG3ZaJpTwWzOhSoVxcIyTbTmpc3zkglaFkZzoKYQvIp1zq3NtWWWmnGaz9Fq4tpetfLdu53yB9krJ78bvd9I5QdntiApF_EO1gVtKkat0EKUrIkoLgwrAUcWm1jG9yF4aH55BMvRRNnKyUQ5miixkNHEuHY1rUHUGbV7GYyDzoB1HswQH3H_A74ACs95eA</recordid><startdate>201702</startdate><enddate>201702</enddate><creator>Rezai, Abdalhossein</creator><creator>Keshavarzi, Parviz</creator><creator>Moravej, Zahra</creator><general>Elsevier B.V</general><general>Elsevier</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>201702</creationdate><title>Key management issue in SCADA networks: A review</title><author>Rezai, Abdalhossein ; Keshavarzi, Parviz ; Moravej, Zahra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Critical infrastructure security</topic><topic>Key management scheme</topic><topic>Network security</topic><topic>Power system security</topic><topic>SCADA network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rezai, Abdalhossein</creatorcontrib><creatorcontrib>Keshavarzi, Parviz</creatorcontrib><creatorcontrib>Moravej, Zahra</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Directory of Open Access Journals</collection><jtitle>Engineering science and technology, an international journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rezai, Abdalhossein</au><au>Keshavarzi, Parviz</au><au>Moravej, Zahra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Key management issue in SCADA networks: A review</atitle><jtitle>Engineering science and technology, an international journal</jtitle><date>2017-02</date><risdate>2017</risdate><volume>20</volume><issue>1</issue><spage>354</spage><epage>363</epage><pages>354-363</pages><issn>2215-0986</issn><eissn>2215-0986</eissn><abstract>Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.jestch.2016.08.011</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2215-0986
ispartof Engineering science and technology, an international journal, 2017-02, Vol.20 (1), p.354-363
issn 2215-0986
2215-0986
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_25884d0b62f942d8b8874fd4d58c47e0
source ScienceDirect Journals
subjects Critical infrastructure security
Key management scheme
Network security
Power system security
SCADA network
title Key management issue in SCADA networks: A review
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T05%3A08%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Key%20management%20issue%20in%20SCADA%20networks:%20A%20review&rft.jtitle=Engineering%20science%20and%20technology,%20an%20international%20journal&rft.au=Rezai,%20Abdalhossein&rft.date=2017-02&rft.volume=20&rft.issue=1&rft.spage=354&rft.epage=363&rft.pages=354-363&rft.issn=2215-0986&rft.eissn=2215-0986&rft_id=info:doi/10.1016/j.jestch.2016.08.011&rft_dat=%3Celsevier_doaj_%3ES2215098616303482%3C/elsevier_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c418t-d7fb23284d358a7a208d4b1bb57d33748276cb5e2c685974835dd3bd4d2c74823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true