Maricel O. Balitanas, R. J. Robles, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim
{"title":"Protecting IP-based SCADA System with Crossed-Cipher Scheme","authors":"Maricel O. Balitanas, R. J. Robles, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim","doi":"10.1109/UCMA.2011.35","DOIUrl":null,"url":null,"abstract":"To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UCMA.2011.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.