File(s) under permanent embargo
Applying encryption schemed to supervisory control and data acquisition systems for security management
journal contribution
posted on 2023-05-17, 22:41 authored by Kim, T-HSupervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication in SCADA Systems. In the case of Symmetric key encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While in the case of Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These schemes can be integrated to SCADA communication for managing security level. In this paper, author compares Encryption Schemes as used in Communication between SCADA components to show the escalation of security level.
History
Publication title
African Journal of Business ManagementVolume
7Issue
24Pagination
2342-2351ISSN
1993-8233Department/School
School of Information and Communication TechnologyPublisher
Academic JournalsPlace of publication
Victoria Island, Lagos NigeriaRights statement
Copyright 2013 Academic JournalsRepository Status
- Restricted