Protecting IP-based SCADA System with Crossed-Cipher Scheme

2011 
To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    4
    References
    0
    Citations
    NaN
    KQI
    []