Detecting the Replay Attack in Key-Management Over SCADA Communication Network

Supervisory Control And Data Acquisition (SCADA) systems are control systems for many national infrastructures. In the past, SCADA systems were designed without security functionality because of the closed operating environment. However, the security of SCADA systems has become an issue with connection to open networks becoming more common. Any damage to the SCADA system can have a widespread negative effect to society. It needs to review the security requirements for SCADA systems and then investigate whether the existing key-management protocols for the SCADA systems satisfy these requirements. Afterward, the authors propose a Time-stamp technique to detect the Replay attack in key-Management for secure SCADA communications.

Provided by: International Journal of Computer Applications in Engineering Sciences (IJCAES) Topic: Mobility Date Added: Mar 2011 Format: PDF

Find By Topic