Title :
Comparison of Encryption Schemes as Used in Communication between SCADA Components
Author :
Robles, Rosslin John ; Balitanas, Maricel ; Caytiles, Ronnie ; Gelogo, Yvette ; Kim, Tai-Hoon
Author_Institution :
Dept. of Multimedia Eng., Hannam Univ., Daejeon, South Korea
Abstract :
In Symmetric encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While is Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is discussed.
Keywords :
Internet; SCADA systems; control engineering computing; private key cryptography; public key cryptography; Internet SCADA facility; SCADA component communication; Web SCADA; asymmetric encryption; private key; public key; secret key; supervisory control and data acquisition; Multimedia communication; Multimedia computing; Ubiquitous computing; Communication; Control System; Encryption; Internet; SCADA;
Conference_Titel :
Ubiquitous Computing and Multimedia Applications (UCMA), 2011 International Conference on
Conference_Location :
Daejeon
Print_ISBN :
978-1-4577-0571-7
DOI :
10.1109/UCMA.2011.33