Proposal strategies of key management for data encryption in SCADA network of electric power systems

被引:40
作者
Kang, D. J. [2 ]
Lee, J. J. [2 ]
Kim, B. H. [3 ]
Hur, D. [1 ]
机构
[1] Kwangwoon Univ, Dept Elect Engn, Seoul 139701, South Korea
[2] Korea Electrotechnol Res Inst, Fus Technol Res Lab, Uiwang City 437808, Gyeonggi Provin, South Korea
[3] Hongik Univ, Sch Elect & Elect Engn, Seoul 121791, South Korea
基金
新加坡国家研究基金会;
关键词
Cyber security; Optimal key distribution period; Quality of service function; SCADA; Encryption;
D O I
10.1016/j.ijepes.2009.03.004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
SCADA (Supervisory Control and Data Acquisition) systems have been used for remote measurement and control over both critical infrastructures and modern industrial facilities. The electric power system is thought of as a typical model using the SCADA network for its remote control and monitoring. Integration between many networks is one of today's global trends. In fact, the integration of the SCADA network into Information Technology (IT) networks is favorably under way in terms of automation and economics of power systems, which makes the SCADA network vulnerable to increased cyber assaults. In so far as cyber security is concerned, there exist several methods to secure the system such as encryption, firewall, authentication, and so on. In this paper, we primarily address the unique security environment and inherent problems in the radial SCADA network of electric power systems. Our approach here is informed by the symmetric encryption method. For the most part this paper will be limited to the key management for encryption and provide a solution to the optimal key distribution period as well. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1521 / 1526
页数:6
相关论文
共 12 条
[1]  
Byres E., MYTHS FACTS CYBER SE
[2]  
CLEVELAND F, 2007, IEC TC57 SECURITY ST
[3]  
DOUGLAS J, 2005, EPRI J SUM, P29
[4]   Security for industrial communications systems [J].
Dzung, D ;
Naedele, M ;
Von Hoff, TP ;
Crevatin, MC .
PROCEEDINGS OF THE IEEE, 2005, 93 (06) :1152-1177
[5]  
Eisenhauer J., 2006, ROADMAP SECURE CONTR
[6]   A new optimization model for distribution substation siting, sizing, and timing [J].
El-Fouly, T. H. M. ;
Zeineldin, H. H. ;
El-Saadany, E. F. ;
Salama, M. M. A. .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2008, 30 (05) :308-315
[7]   Recent development in open systems for EMS/SCADA [J].
Kokai, Y ;
Masuda, F ;
Horiike, S ;
Sekine, Y .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 1998, 20 (02) :111-123
[8]  
LEMAY M, SCADA PROTOCOLS OVER
[9]  
Ross S.M., 2007, INTRO PROBABILITY MO
[10]   Electric utility responses to grid security issues [J].
Security Program Department, Electric Power Research Institute ;
不详 ;
不详 .
IEEE Power Energ. Mag., 2006, 2 (30-37) :30-37