By Topic

A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Dong-Joo Kang ; Korea Electrotechnol. Res. Inst., Changwon ; Hak-Man Kim

SCADA (supervisory control and data acquisition) SCADA refers to the combination of telemetry and data acquisition. SCADA system has been used for remote measurement and control on the critical infrastructures as well as modern industrial facilities. Electric power system is a representative system using SCADA network for its communication. Integration between many networks and increasing threatens of terrorism have made the potential risk by cyber attacks real and bigger in power system. Recently, many researching efforts have been made on SCADA network for improving its security. In general aspect, there are already several ways to secure the system like encryption, firewall, authentication, etc. In this paper, we focus on symmetric encryption method and propose the proper key distribution method to reflect the unique characteristics of SCADA network communication.

Published in:

Future Generation Communication and Networking (FGCN 2007)  (Volume:2 )

Date of Conference:

6-8 Dec. 2007