Public Key Cryptography Based Approach for Securing SCADA Communications

SCADA (supervisory Control and Data Acquisition) security has become a challenge in today’s scenario because of its connectivity with the world and remote access to the system. Major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) i...

Full description

Saved in:
Bibliographic Details
Published inComputer Networks and Information Technologies pp. 56 - 62
Main Authors Saxena, Anupam, Pal, Om, Saquib, Zia
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2011
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN3642195415
9783642195419
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-19542-6_10

Cover

Abstract SCADA (supervisory Control and Data Acquisition) security has become a challenge in today’s scenario because of its connectivity with the world and remote access to the system. Major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is an established framework to make the communication secure. SCADA systems, normally have limited bandwidth and low computation power of RTUs (Remote Terminal Units); through the customization of general PKI we can reduce its openness, frequent transfer of certificates and possibility of DOS (Denial of Service) attacks at MTUs (Master Terminal Units) and RTUs. This paper intends for securing data over communication channel in SCADA systems and presents the novel solutions pivoted on key distribution and key management schemes.
AbstractList SCADA (supervisory Control and Data Acquisition) security has become a challenge in today’s scenario because of its connectivity with the world and remote access to the system. Major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is an established framework to make the communication secure. SCADA systems, normally have limited bandwidth and low computation power of RTUs (Remote Terminal Units); through the customization of general PKI we can reduce its openness, frequent transfer of certificates and possibility of DOS (Denial of Service) attacks at MTUs (Master Terminal Units) and RTUs. This paper intends for securing data over communication channel in SCADA systems and presents the novel solutions pivoted on key distribution and key management schemes.
Author Pal, Om
Saquib, Zia
Saxena, Anupam
Author_xml – sequence: 1
  givenname: Anupam
  surname: Saxena
  fullname: Saxena, Anupam
  email: anupam@cdacmumbai.in
  organization: Centre for Development of Advanced Computing, Mumbai, India
– sequence: 2
  givenname: Om
  surname: Pal
  fullname: Pal, Om
  email: ompal@cdacmumbai.in
  organization: Centre for Development of Advanced Computing, Mumbai, India
– sequence: 3
  givenname: Zia
  surname: Saquib
  fullname: Saquib, Zia
  email: saquib@cdacmumbai.in
  organization: Centre for Development of Advanced Computing, Mumbai, India
BookMark eNpFkMtOwzAQRQ0Uibb0D1j4Bwx-P5YhPIqoBFJhbSWO3QbaOIrbRf8eFxDMYka6VxrdeyZg1MXOA3BF8DXBWN0YpRFDklNEjMhbWoJPwIRl5Vtgp2BMtBQIG6bO_g0iRn8GNRdgltIHziM01kaMwfx1X29aB5_9AZbDod_F1VD16wO8rZJvYNH3Q6zcGoY4wKV3-6HtVnBZFncFLON2u-9aV-3a2KVLcB6qTfKz3zsF7w_3b-UcLV4en8pigRIhDCNHaoodlqoJunEcGxEoIzlO0FzX3DeMUU-Cl4ZyR7gJkqjgtFS4EYp7yaaA_vxN_TGLH2wd42fKOOwRlM2gLLO5vf3mYo-g2BfME1eM
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2011
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2011
DOI 10.1007/978-3-642-19542-6_10
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 3642195423
9783642195426
EISSN 1865-0937
Editor Das, Vinu V
Stephen, Janahanlal
Chaba, Yogesh
Editor_xml – sequence: 1
  givenname: Vinu V
  surname: Das
  fullname: Das, Vinu V
  email: vinuvdas@gmail.com
– sequence: 2
  givenname: Janahanlal
  surname: Stephen
  fullname: Stephen, Janahanlal
  email: drlalps@gmail.com
– sequence: 3
  givenname: Yogesh
  surname: Chaba
  fullname: Chaba, Yogesh
  email: yogeshchaba@yahoo.com
EndPage 62
GroupedDBID 29F
ALMA_UNASSIGNED_HOLDINGS
RSU
ID FETCH-LOGICAL-s1130-c1b20c067df8dc4095f231058f848b4ed332e1fe6924c149f617fc8670d574e63
ISBN 3642195415
9783642195419
ISSN 1865-0929
IngestDate Tue Jul 29 19:59:40 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1130-c1b20c067df8dc4095f231058f848b4ed332e1fe6924c149f617fc8670d574e63
PageCount 7
ParticipantIDs springer_books_10_1007_978_3_642_19542_6_10
PublicationCentury 2000
PublicationDate 2011
PublicationDateYYYYMMDD 2011-01-01
PublicationDate_xml – year: 2011
  text: 2011
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, Bangalore, India, March 10-11, 2011. Proceedings
PublicationTitle Computer Networks and Information Technologies
PublicationYear 2011
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
SSID ssj0000580895
ssj0000535301
ssib054953581
Score 1.4098287
Snippet SCADA (supervisory Control and Data Acquisition) security has become a challenge in today’s scenario because of its connectivity with the world and remote...
SourceID springer
SourceType Publisher
StartPage 56
SubjectTerms Broadcast
Broadcasting
Key Distribution and Management
Multicasting
Public Key Infrastructure
SCADA security
Title Public Key Cryptography Based Approach for Securing SCADA Communications
URI http://link.springer.com/10.1007/978-3-642-19542-6_10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaW5QI9AAVEeckHbpFRHraTHltUtCqvQ1tUcYkSP1APXdpmVyr8An52Z_zYeNsKqVyirJVd2_PNjsfj-SaEvOOml6buK1ZvC8N4WVrWqbpiUhlltOFau6OYL1_l7IjvH4vjyeRvkrW0XPTv1Z9beSX_gyq0Aa7Ikr0DsqsfhQa4B3zhCgjD9Zrzux5m9XUFwvsYkLOL2VVDSO1d0RHHsHmSKHjQXRpPA9uZL8-60_EIycWCv52OD54vT9xhzY-TLlUsH-jLPqExufh9tgg1r7NdWA81erWeo4XpiyGY_zM7AMCR_56QUfyIUExmWKepDJ6JGGZ3fVLBGKXRCsfZS6MVMVqZ_aOYlyOW8BJL0QVr6k1zIwXLt0N8xKRtvmxMMMFCJou5t_Q3lok0MwS6YthXyWSLXL170P2U3N_Z2__8PVomgVm4sVCcrxpfiSpPPzd5417xsxomEoniNIQv9TROKyFx3jaKG8fyzts5fEw2kAFDkZoCCDwhEzPfJI8iIjQgsEkeJsUsn5KZVwwKikFTxaBOMWhUDApQ0qgY1CkGXYf_GTn6uHf4YcbCezrYUIALxFTRl7kCt0fbRisOTrvFXYNobMObnhtdVaUprJGw11ewI7fgNVvVyDrXouZGVs_JdP5rbl4QqrmF_UsJbqnquTYKviEK2dmi550C13KLZFEwLf7zhjaW3QYxtlULYmydGFsU48s7Pf2KPBg19jWZLi6W5g14nIv-bVCHK2bvdn8
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Computer+Networks+and+Information+Technologies&rft.au=Saxena%2C+Anupam&rft.au=Pal%2C+Om&rft.au=Saquib%2C+Zia&rft.atitle=Public+Key+Cryptography+Based+Approach+for+Securing+SCADA+Communications&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2011-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642195419&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=56&rft.epage=62&rft_id=info:doi/10.1007%2F978-3-642-19542-6_10
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon