Browse > Article
http://dx.doi.org/10.17662/ksdim.2020.16.4.029

Research on key management for supervisory control and data acquisition system  

Lee, Keonjik (대구대학교 자유전공학부)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.16, no.4, 2020 , pp. 29-42 More about this Journal
Abstract
SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.
Keywords
Key Management; Critical Infrastructure; ID-based Cryptosystem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Xie and L. Wang, "One-round identity-based key exchange with perfect forward security," Inf. Process. Lett. 2012, 112(14), pp.587-591.   DOI
2 S.S. Vivek, S.S.D. Selvi, L.R. Venkatesan, and C.P. Rangan, Proceedings of the ProvSec, in: LNCS, vol. 8209, Springer-Verlag, 2013, pp.38-58
3 H. Sun, Q. Wen, H. Zhang, and Z. Jin, "A strongly secure identity-based authenticated key agree- ment protocol without pairings under the GDH assumption," Secur Comm. Netw., 2015, 8(17), pp.3167-3179.   DOI
4 L. Ni, G. Chen, J. Li, and Y. Hao, "Strongly secure identity-based authenticated key agreement protocols without bilinear pairings," Inform Sciences., 2016, Vol.367, pp.176-193.
5 M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., 1990, Vol.8, No.1, pp.18-36.   DOI
6 오중타잉.최태영, "A Robust Three-Factor User Authentication Scheme based on Elliptic Curve Cryptography and Fuzzy Extractor," 정보과학회논문지, 제46권, 제6호, 2019, pp.587-597.
7 B. Cheryl, G. Donald, N. William and T. Mark, "Key management for SCADA," Sandia National Laboratory, Mar. 2002.
8 R. Dawson, C. Boyd, E. Dawson, and J. Nieto, "SKMA: A Key Management Architecture for SCADA Systems," 4th Australasian Information Secur- ity Workshop, 2006.
9 J. Gao, J. Liu, and B. Rajan, "SCADA communication and security issues," Security and Communication Networks, 2014, 7(1), pp.175-194.   DOI
10 A. Rezai, P. Keshvarzi, and Z. Moravej, "Secure SCADA communication by using a modified key management scheme," ISA Trans., 2013, 52(4), pp.517-524.   DOI
11 D. Boneh and M. Franklin, "Identity-Based encryption from the Weil pairing," SIAM Journal of Computing, 2003, Vol.32, No.3, pp.586-615.   DOI
12 B. Lynn, "Authenticated Identity-Based Encryption," available at http://eprint.iacr.org/2002/72, 2002.
13 D.H. Choi, H.M. Kim, D.H. Won, and S.J. Kim, "Advanced Key Management Architecture for Secure SCADA Communications," IEEE Trans. Power Deliv., 2009, 24(3), pp.1154-1163   DOI
14 L. Dang, J. Xu, X. Cao, H. Li, J. Chen, Y. Zhang, and X. Fu, "Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks," Int. J. Distrib. Sensor Netw., 2018, 14(4), pp.1-17.
15 오두환.최두식.나은성.김상철.하재철, "ID기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안," 정보보호학회논문지, 제2권, 제3호, 2012, pp.427-437.
16 A. Rezai, P. Keshavarzi, and Z. Moravej, "Key management issue in SCADA networks: a review," Eng. Sci. Technol., Int. J., 20(1), 2017, pp.354-363.   DOI
17 L. Martirano, M. Kermani, F. Manzo, A. Bayatma- koo, and U. Graselli, "Implementation of SCADA Systems for a Real Microgrid Lab Testbed," In Proceedings of 2019 IEEE Milan PowerTech, Italy, 2019, pp.1-6.