Detecting the Replay Attack in Key-Management Over SCADA Communication Network
Supervisory Control And Data Acquisition (SCADA) systems are control systems for many national infrastructures. In the past, SCADA systems were designed without security functionality because of the closed operating environment. However, the security of SCADA systems has become an issue with connection to open networks becoming more common. Any damage to the SCADA system can have a widespread negative effect to society. It needs to review the security requirements for SCADA systems and then investigate whether the existing key-management protocols for the SCADA systems satisfy these requirements. Afterward, the authors propose a Time-stamp technique to detect the Replay attack in key-Management for secure SCADA communications.